11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

384 procedures <strong>and</strong> functionsagencies. Later, federal laws have attempted to address particulartypes <strong>of</strong> information, including school records, medicalrecords, <strong>and</strong> video rentals.However, much <strong>of</strong> the information collected from peopleresults from commercial transactions or other interactionswith businesses, particularly via the Internet. Althoughencrypted processing systems have reduced the chance thata credit card number submitted to a store will be stolen, socalledidentity thieves may be able to obtain credit reportsunder false pretenses or collect enough information abouta person from various databases (including Social Securitynumbers). With that information, the thief can take outcredit cards in the person’s name <strong>and</strong> run up huge bills (seeidentity theft <strong>and</strong> phishing <strong>and</strong> spo<strong>of</strong>ing). While thedirect financial liability from identity theft is capped, thepsychological impact <strong>and</strong> the effort required for victims torehabilitate their credit st<strong>and</strong>ing can be considerable. In afew cases the same techniques have been used by stalkers,sometimes with tragic consequences.The ability <strong>of</strong> Web sites to track where a visitor clicksby means <strong>of</strong> small files called “cookies” has also disturbedmany people (see cookies). As with the recording <strong>of</strong>purchase information by supermarkets <strong>and</strong> other stores,businesses justify the practice as allowing for targetedmarketing that can provide consumers with informationlikely to be <strong>of</strong> interest to them. (Many e-mail addresses arealso gathered to be sold for use for unsolicited e-mail—seespam.) An even more intrusive technique involves the surreptitiousinstallation <strong>of</strong> s<strong>of</strong>tware on the user’s computerfor purposes <strong>of</strong> displaying advertising content or gatheringinformation. In turn, programmers have distributed freeutilities for identifying <strong>and</strong> removing such “adware” or“spyware.”While such consumer tracking is not as dangerous asidentity theft, it feels like an invasion <strong>of</strong> privacy to manypeople as well as a source <strong>of</strong> insecurity, particularly becausethere are as yet few regulations governing such practices.However, in response to such concerns many businesseshave put “privacy statements” on their Web sites, explainingwhat information about visitors will be collected <strong>and</strong>how it may be used. Businesses that meet st<strong>and</strong>ards for disclosure<strong>of</strong> their privacy practices can also display the seal <strong>of</strong>approval <strong>of</strong> organizations such as TRUSTe.Many privacy advocates, however, believe that self-regulationis not sufficient to truly protect consumer privacy.They support strong new regulations, including “optin”provisions that would require businesses to receiveexplicit permission from the consumer before collectinginformation.Privacy <strong>and</strong> Pervasive ComputingBeyond the Web <strong>and</strong> e-commerce, new challenges to privacyare emerging (see ubiquitous computing). In themovie Minority Report, stores instantly mine data aboutapproaching consumers <strong>and</strong> project personalized holographicads in front <strong>of</strong> their eyes. While that technologyis happily not here yet, many <strong>of</strong> the component piecesare (see data mining <strong>and</strong> RFID). Add global positioning(GPS) tracking to the mix, <strong>and</strong> another important part<strong>of</strong> privacy is threatened: “locational privacy.” Certainlyone can envisage situations where knowing not only whosomeone is but where they are can increase vulnerabilityto abuse.In response to these pervasive threats to privacy, manyadvocates continue to push for regulation <strong>of</strong> data gathering<strong>and</strong> ways to hold people legally responsible for misuse <strong>of</strong>personal information. However, some writers such as sciencefiction writer <strong>and</strong> futurist David Brin argue that thebattle for privacy is already lost, but the battle for transparency<strong>and</strong> mutual accountability may still be won—if thewatched can watch the watchers.Further ReadingBrin, David. The Transparent Society. Reading, Mass.: Addison-Wesley, 1998.Cate, Fred H. Privacy in the Information Age. Washington, D.C.:Brookings Institution, 1997.Electronic Frontier Foundation. Available online. URL: http://www.eff.org. Accessed August 17, 2007.Electronic Privacy Information Center. Available online. URL:http://www.epic.org. Accessed August 17, 2007.Henderson, Harry. Privacy in the Information Age (Library in aBook). 2nd ed. New York: Facts On File, 2006.Hunter, Richard. World without Secrets: Business, Crime <strong>and</strong> Privacyin the Age <strong>of</strong> Ubiquitous Computing. New York: Wiley2002.Monmonier, Mark. Spying with Maps: Surveillance Technologies <strong>and</strong>the Future <strong>of</strong> Privacy. Chicago: University <strong>of</strong> Chicago Press,2002.Solove, Daniel. The Digital Person: <strong>Technology</strong> <strong>and</strong> Privacy in theInformation Age. Rev. ed. New York: NYU Press, 2006.procedures <strong>and</strong> functionsFrom the earliest days <strong>of</strong> programming, programmers <strong>and</strong>language designers realized that it would be very useful toorganize programs so that each task to be performed by theprogram had its own discrete section <strong>of</strong> code. After all, a programwill <strong>of</strong>ten have to perform the same task, such as sortingor printing data, at several different points in its processing.Instead <strong>of</strong> writing out the necessary code instructions eachtime they are needed, why not write the instructions just once<strong>and</strong> have a mechanism by which they can be called upon asneeded? Such callable program sections have been known asprocedures, subroutines, or subprograms.The simplest sort <strong>of</strong> subroutine is found in assembly languages<strong>and</strong> early versions <strong>of</strong> BASIC or FORTRAN. In BASIC,for example, a GOSUB statement contains a line number.When the statement is encountered, execution “jumps” tothe statement with that line number, <strong>and</strong> continues fromthere until a statement such as RETURN is encountered.For example:10 TOTAL = 1020 GOSUB 4030 END40 PRINT “The total is: ”;50 PRINT TOTAL60 RETURN

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!