Words we choose to describe things and phenomena often show our attitude towards what we say. They imperceptibly reflect our opinions and judgments, prejudices and preferences, moral convictions and beliefs. Whether we like it or not, good deal of words we use are biased, or should I say "slanted", --positively or negatively. Two people will call the same thing differently, depending on their points of view.
Look at this example: "Monitoring", "surveillance", "control", "data interception", "gathering evidence of wrongdoing" -- on the one hand; "sleuthing", "spying", "eavesdropping", "snooping", "peeping", "prying", "tapping"--on the other. A neutral "information gathering device" vs. negatively loaded "bug"--choice of words clearly shows whether we approve or disapprove it.
If you feel you have right to do so, you are "monitoring my kids' online behavior"; your resentful kids, however, might think you are to poking your nose into their lives. The same at work--but here it is you who is the person under surveillance, and your opinion might differ from the CEO's, who probably thinks that "workplace surveillance software improves employees' performance and prevents violations of security policy and corporate code of conduct" (or something similar).
Most of arguments on this issue start right here; the crucial point is whether those who perform monitoring are authorized to do so.
Computer monitoring and email monitoring have been in the limelight for several years, and public interest is not going to fade. The very issue of monitoring is extremely complicated. Here technical matters become directly connected with wide range of political, legal, economic and moral issues. The data interception technology has everything to do with a wide range of very serious matters--from identity theft to various aspects of national security.
The problem is that this technology is a double-edged sword. Software used for parental control or workplace surveillance often apply the same mechanisms as malicious programs used for data stealing and plain spying. But there are differences.
These two specific program functions are typical to spy programs:
First, preliminary configuration of the monitoring module (it is usually called "client" or "agent") is possible, with a compiled executable file as a result. This file, when installed, doesn't display any messages or create windows on the screen. It "hides itself" and "shows no signs of life". It is impossible to notice whether the particular PC is being secretly monitored or not. Of course, the user is not aware of being spied ? until the consequences show up.
Second, spy software always has built-in means of remote installation; as a rule, the pre-configured module (agent) is installed into the target PC remotely. Then the files with obtained information are sent via local network or emailed to the person who installed the spy program.
Last, but not least ? spyware is always used illicitly and behind the user's back ? here monitoring is performed by a person who has no right for it. Unlike spyware, legally used monitoring programs are seldom used furtively. Though in many states it is officially permitted not to let employees know about monitoring, companies--especially large ones--rarely make a secret out of it.
Remove these two functions - and you will get a monitoring program instead of spy software. If it is impossible to pre-configure the monitoring module and install it remotely; if you should have administrator privilege to install the program, it is monitoring software, not spyware.
As we can see, monitoring products in themselves are neither good nor bad. Compare them with a knife--one may use it both for cutting cheese and for stabbing a neighbor to death. Tool is only a tool, but be careful--this one is of a dangerous kind.
Alexandra Gamanenko currently works at Raytown Corporation, LLC--an independent monitoring and anti-monitoring software developing company. Its products are based on innovative technologies the company's R&D department developed. Learn more--visit the company's website http://www.softsecurity.com/
Document Manager and Version HistoryIn previous articles I have discussed... Read More
When Great Plains Software introduced the first graphical accounting application... Read More
This article is the third of a series of articles... Read More
So, why should you use any O/R mapping tool? I... Read More
As we could imagine, if you are reading this article... Read More
Microsoft Great Plains has substantial mid-market share in the USA... Read More
Trying to figure out a stream in banning one email... Read More
The first topic we are going to discuss... Read More
This article is the first of a series of articles... Read More
Spyware is software or hardware installed on a computer without... Read More
Great Plains Inventory Management (IV) module gives your business a... Read More
Some introduction into Great Plains Software products, now Microsoft Business... Read More
This article is the fourth of a series of articles... Read More
Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More
Before being able to choose a secure Internet communication system,... Read More
ERP is the acronym of Enterprise Resource Planning. Multi-module ERP... Read More
New post-recession era has new features, which didn't exist in... Read More
If you have Microsoft Great Plains as main accounting and... Read More
Microsoft Great Plains may be recommended for international freight forwarding... Read More
Spyware and Adware infest over 90 percent of computers in... Read More
Microsoft Great Plains is one of three Microsoft Business Solutions... Read More
Microsoft Great Plains is main accounting / ERP application... Read More
Many Webmasters have never bothered to view their website's server... Read More
Icons are used everywhere; right from software applications, to internet... Read More
Midsize business or non-profit organization should decide if one-vendor solution... Read More
If you company is small or mid-size special products or... Read More
Microsoft Great Plains is main Microsoft Business Solutions product, targeted... Read More
Considering whether or not your software company should hire a... Read More
In 2004 Oracle, Inc. made its new step toward J2EE... Read More
Follow the steps below to quickly design, generate, and deploy... Read More
When making a decision to buy any piece of software... Read More
In the real world a "fire wall" is a fireproof... Read More
Current Microsoft Business Solutions Great Plains has more that 10... Read More
If you are in the market for new staffing software,... Read More
There are plenty of articles out there about how to... Read More
What is Software?Software is a set of instruction written to... Read More
Microsoft Business Solutions offers several ERP applications: Great Plains, Navision,... Read More
It is a well known fact that Java as a... Read More
Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More
Just the thought of a duel-boot scares many people away,... Read More
After seeing many people complain about their weak Internet security... Read More
Domino server is a buffer between the operation system and... Read More
When you need a phone number, you do a quick... Read More
Microsoft Business Solutions Small Business Manager is Great Plains Dexterity... Read More
Microsoft Business Solutions Great Plains is very popular ERP platform... Read More
Think of this, first we had the HAM Radio, then... Read More
So let's begin crunching down these 300 images using Adobe... Read More
It is now common thing when large corporation selects mid-market... Read More
Combining Microsoft Business Solutions Great Plains ERP with non-Microsoft Business... Read More
Microsoft Business Solutions Great Plains version 8.5, 8.0, 7.5, Great... Read More
If someone entered your home, uninvited and installed numerous cameras... Read More
It's all about turn times in the eMedia industry! The... Read More
In our small article we'll consider Microsoft Business Solutions Great... Read More
Case study: A secretary using Corel WordPerfect 7 is often... Read More
Microsoft Business Solutions CRM proved to be reliable solution in... Read More
During the years of our consulting practice, which comes back... Read More
This tutorial covers OLAP solutions used by Data warehouses and... Read More
Intro This concise article will tell you in plain English... Read More
Itâ??s easy to understand why you might be drawn to... Read More
For those who are unclear on the differences between the... Read More
While Ukraine is becoming a new popular IT outsourcing destination,... Read More
We all take the computer for granted. I mean, all... Read More
1. What determines the software price? Is it Per Seat... Read More
Remember nice and prosperous Clinton era? When you implemented innovative... Read More
Did you ever give a thought to the number of... Read More
Assertion facility is added in J2SE 1.4. In order to... Read More
Software |