Technology in Today’s Society
Michaella says that “Our generation is one of technology. While we may be critiqued for our short attention spans, lack of face to face communication and procrastinating abilities, we will change the world.”1 What she means by this is that the generation before criticize us about using all this technology and not doing things hands on. What they don’t understand is that one day everything is going to be based on technology and science. So why not practice this now. Technology has its pros and cons, everyone knows that. But face it technology is going to take over everything in the future.
Security and Protection Innovations
Security and protection system, any of various means or devices designed to guard persons and property against a broad range of hazards, including crime, fire, accidents, espionage, sabotage, subversion, and attack. Most security and protection systems emphasize certain hazards more than others. In a retail store, for example, the principal security concerns are shoplifting and employee dishonesty (e.g., pilferage, embezzlement, and fraud). A typical set of categories to be protected includes the personal safety of people in the organization, such as employees, customers, or residents; tangible property, such as the plant, equipment, finished products, cash, and securities; and intangible property, such as highly classified national-security information or “proprietary” information (e.g., trade secrets) of private organizations. An important distinction between a security and protection system and public services such as police and fire departments is that the former employs means that emphasize passive and preventive measures.
With 19th century, security was blind (not knowing) of the potential threat as far as computer security, as like now in the 21st century, where a lot more people are banking and paying bills online with all their personal information. Identity theft is on the up rise from the 19th century, where the criminal stole your mail or happened to come across a lost/stolen wallet with credit cards. In the 21st century, criminals are hacking into you computers for personal information. Criminals are using electronic devices to gather digital imprints of credit card numbers. This is why governments and private companies are adapting with the change by introducing numerous was to fight back.
The desire for increased protection has caused an increase in the allocation of tax dollars to fight crime, but more and more Americans are dipping into their own pockets to buy additional security. With the lack of police presents (due to budgeting cost), home owners are not only installing security systems to deter crime. Home owners are paying for the monitoring of these systems too. Along with the economic struggles going on across the United States, several police agencies are not showing up to just alarms going off. Police want more than ringing bells and alarm companies calling to report break-ins. This is even costing the consumer more money, because the monitoring company now has to send out a guard to verify a broken window or kicked in door before the police will even to decide to dispatch officers. These are just a couple of items that have changed over time in the world of security.
One of the early security models was The Home Front Security model which used citizens to volunteer for plane watching, shore patrol, civil defense and emergency medical services. Citizens were also trained to report any questioning activities around railroad yards, factories, and defense plants. The contract watch and guard services model provided monitoring and physical patrol of company perimeters, buildings, and parking lots. These services are provided by national and regional contract security companies. The contract investigative services model provided investigation services to obtain information on criminal incidents, civil lawsuits, domestic...
http://magicvalley.com/news/opinion/columns/youth-perspective-pros-cons-to-a-generation-raised-on-technology/article_e9c7dc96-4499-5fd1-8ced-f645d4f52413.html January 05, 2014 1:00 am • Michaella Owens
AVG. (2012, January 1). Company . Retrieved July 24, 2012, from AVG Technologies: http://www.avg.com/us-en/avg-company-profile
Kaspersky. (1997-2012, January 1). Company Overview. Retrieved July 24, 2012, from Kaspersky Labs: http://usa.kaspersky.com/about-us/company-overview
Please join StudyMode to read the full document