翻訳と辞書
Words near each other
・ "O" Is for Outlaw
・ "O"-Jung.Ban.Hap.
・ "Ode-to-Napoleon" hexachord
・ "Oh Yeah!" Live
・ "Our Contemporary" regional art exhibition (Leningrad, 1975)
・ "P" Is for Peril
・ "Pimpernel" Smith
・ "Polish death camp" controversy
・ "Pro knigi" ("About books")
・ "Prosopa" Greek Television Awards
・ "Pussy Cats" Starring the Walkmen
・ "Q" Is for Quarry
・ "R" Is for Ricochet
・ "R" The King (2016 film)
・ "Rags" Ragland
・ ! (album)
・ ! (disambiguation)
・ !!
・ !!!
・ !!! (album)
・ !!Destroy-Oh-Boy!!
・ !Action Pact!
・ !Arriba! La Pachanga
・ !Hero
・ !Hero (album)
・ !Kung language
・ !Oka Tokat
・ !PAUS3
・ !T.O.O.H.!
・ !Women Art Revolution


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Spy software : ウィキペディア英語版
Computer and network surveillance

Computer and network surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet. The monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agency.
Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored for illegal activity.
Surveillance allows governments and other agencies to maintain social control, recognize and monitor threats, and prevent and investigate criminal activity. With the advent of programs such as the Total Information Awareness program, technologies such as high speed surveillance computers and biometrics software, and laws such as the Communications Assistance For Law Enforcement Act, governments now possess an unprecedented ability to monitor the activities of citizens.〔(【引用サイトリンク】title=Is the U.S. Turning Into a Surveillance Society? )
However, many civil rights and privacy groups, such as Reporters Without Borders, the Electronic Frontier Foundation, and the American Civil Liberties Union, have expressed concern that with increasing surveillance of citizens we will end up in or are even already in a mass surveillance society, with limited political and/or personal freedoms. Such fear has led to numerous lawsuits such as ''Hepting v. AT&T''.〔 The hacktivist group Anonymous has hacked into government websites in protest of what it considers "draconian surveillance".〔("Anonymous hacks UK government sites over 'draconian surveillance' " ), Emil Protalinski, ZDNet, 7 April 2012, retrieved 12 March 2013〕〔(Hacktivists in the frontline battle for the internet ) retrieved 17 June 2012〕
==Network surveillance==

The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet. For example, in the United States, the Communications Assistance For Law Enforcement Act, mandates that all phone calls and broadband internet traffic (emails, web traffic, instant messaging, etc.) be available for unimpeded, real-time monitoring by Federal law enforcement agencies.〔(【引用サイトリンク】title=CALEA Archive -- Electronic Frontier Foundation )〕〔(【引用サイトリンク】title=CALEA: The Perils of Wiretapping the Internet )〕〔(【引用サイトリンク】title=CALEA: Frequently Asked Questions )
Packet capture (also known as "packet sniffing") is the monitoring of data traffic on a computer network. Data sent between computers over the Internet or between any networks takes the form of small chunks called packets, which are routed to their destination and assembled back into a complete message. A Packet Capture Appliance intercepts these packets, so that they may be examined and analyzed. Computer technology is needed to perform traffic analysis and sift through intercepted data to look for important/useful information. Under the Communications Assistance For Law Enforcement Act, all U.S. telecommunications providers are required to install such packet capture technology so that Federal law enforcement and intelligence agencies are able to intercept all of their customers' broadband Internet and voice over Internet protocol (VoIP) traffic.〔(American Council on Education vs. FCC ), Decision, United States Court of Appeals for the District of Columbia Circuit, 9 June 2006. Retrieved 8 September 2013.〕
There is far too much data gathered by these packet sniffers for human investigators to manually search through. Thus, automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic, filtering out, and reporting to investigators those bits of information which are "interesting", for example, the use of certain words or phrases, visiting certain types of web sites, or communicating via email or chat with a certain individual or group. Billions of dollars per year are spent by agencies such as the Information Awareness Office, NSA, and the FBI, for the development, purchase, implementation, and operation of systems which intercept and analyze this data, extracting only the information that is useful to law enforcement and intelligence agencies.
Similar systems are now used by Iranian secret police to identify and suppress dissidents. All of the technology has been allegedly installed by German Siemens AG and Finnish Nokia.〔("First round in Internet war goes to Iranian intelligence" ), Debkafile, 28 June 2009. 〕
The Internet's rapid development has become a primary form of communication. More people are potentially subject to Internet surveillance. There are advantages and disadvantages to network monitoring. For instance, systems described as "Web 2.0"〔O'Reilly, T. (2005). What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software. O’Reilly Media, 1-5.〕 have greatly impacted modern society. An advantage to online surveillance is that large social media platforms, such as YouTube, Twitter and Facebook, enable people to contact friends, family, and strangers daily. Tim O’ Reilly, who first explained the concept of "Web 2.0",〔 stated that Web 2.0 provides communication platforms that are "user generated", with self-produced content, motivating more people to communicate with friends online.〔Fuchs, C. (2011). New Media, Web 2.0 and Surveillance. Sociology Compass, 134-147.〕 However, Internet surveillance also has a disadvantage. One researcher from Uppsala University said "Web 2.0 surveillance is directed at large user groups who help to hegemonically produce and reproduce surveillance by providing user-generated (self-produced) content. We can characterize Web 2.0 surveillance as mass self-surveillance".〔Fuchs, C. (2011). Web 2.0, Presumption, and Surveillance. Surveillance & Society, 289-309.〕 Surveillance companies monitor people while they are focused on work or entertainment. This can emotionally affect people; this is because it can cause emotions like jealousy. A research group states "...we set out to test the prediction that feelings of jealousy lead to ‘creeping’ on a partner through Facebook, and that women are particularly likely to engage in partner monitoring in response to jealousy".〔Muise, A., Christofides, E., & Demsmarais, S. (2014). " Creeping" or just information seeking? Gender differences in partner monitoring in response to jealousy on Facebook. Personal Relationships, 21(1), 35-50.〕 The study shows that women can become jealous of other people when they are in an online group.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Computer and network surveillance」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.