![]() | This article is rated C-class on Wikipedia's
content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
This article was the subject of a Wiki Education Foundation-supported course assignment, between 14 January 2020 and 28 April 2020. Further details are available
on the course page. Student editor(s):
ValentinaEspinosa-Gil. Peer reviewers:
Chughes117.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT ( talk) 19:24, 17 January 2022 (UTC)
This article was the subject of a Wiki Education Foundation-supported course assignment, between 2 September 2020 and 11 December 2020. Further details are available
on the course page. Student editor(s):
Cwilley16.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT ( talk) 19:24, 17 January 2022 (UTC)
This article was the subject of a Wiki Education Foundation-supported course assignment, between 2 September 2021 and 9 December 2021. Further details are available
on the course page. Student editor(s):
Arianna.fr. Peer reviewers:
Rcahill25,
Meabarbedoreggina.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT ( talk) 19:24, 17 January 2022 (UTC)
This article was the subject of a Wiki Education Foundation-supported course assignment, between 10 January 2019 and 30 April 2019. Further details are available
on the course page. Student editor(s):
Mabate01. Peer reviewers:
Leslie boudreau,
J lucciano.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT ( talk) 18:14, 16 January 2022 (UTC)
Just as a note, the article says that fire optics can't be tapped without detection. Fibre optic cables can be read without breaking into the core. By stripping of the sheath and bending the fibre at the right angle, enough signal passes straight on to be detected by sensitive equipment. —Preceding unsigned comment added by 86.155.90.96 ( talk) 18:55, 22 November 2008 (UTC)
Tracking software is, it seems to me, a subset of this topic. As such, I would be opposed to a merge, however much such a merger might appeal to a sense of tidiness. ww 15:15, 15 February 2006 (UTC)
The implication of surveillance definition in wikipedia by this author is considered as clear and understandable, user friendly. The key concept being discussed is logically available for users to adapt and concern with the meaning. By providing hyperlinks connecting to computer based knowledge lead to easier way in finding information without having to go browsing from page one to the end just to find little information, in doubt. The used of web 2.0 which allows other Wikipedia users to add up references, editing existing topics and rate certain topics made it more believable and reliable.
The author also classifies the information by breaking the contents into specific genre of texts uploaded. —Preceding unsigned comment added by Halyza ( talk • contribs) 05:48, 2 September 2008 (UTC)
Is the following statement from the article's lead really true?
Is there on-going real-time monitoring of "almost all Internet traffic" or is there just the potential for such monitoring? There isn't a source given for this statement and I don't see it covered elsewhere in the body of the article. -- Jeff Ogden (W163) ( talk) 12:13, 26 August 2013 (UTC)
I am about to remove an "update" template from the top of the article that said:
I don't find anything in the article about Edward Snowden to update. Perhaps this was a call to add information about the Edward Snowden revelations to the article. I'm not sure that such an addition is needed since the Edward Snowden revelations are well covered in other Wikipedia articles. I did add a number of links to the See also section of the article that link to articles about "Surveillance by the United States government" including some that cover the Edward Snowden revelations. -- Jeff Ogden (W163) ( talk) 00:38, 27 August 2013 (UTC)
Hello fellow Wikipedians,
I have just modified 2 external links on Computer and network surveillance. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
This message was posted before February 2018.
After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than
regular verification using the archive tool instructions below. Editors
have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
RfC before doing mass systematic removals. This message is updated dynamically through the template {{
source check}}
(last update: 5 June 2024).
Cheers.— InternetArchiveBot ( Report bug) 21:02, 11 August 2017 (UTC)
I have articulated some suggestions that could be used to improve this article further. Some of the sentences written in this article don’t have a source cited, but the majority of the ones that do have appropriate and reliable references. They include sources like the New York Times, Times Magazine, USA TODAY and academic sources such as databases. The problem that I noticed was that almost every one of the cited sources are very outdated. Some don’t even exist anymore (I have noted which ones those are). Nothing is plagiarized or close paraphrased and everything in this article relates to the topic. The article is neutral, but I did notice a sentence that was more of an opinion rather than a fact. In the section titled Corporate Surveillance, in the paragraph under the bullet points the opinion is “There should be a distinction between an employee's personal electronic devices, which should be limited and proscribed, and those owned by the firm.” Mabate01 ( talk) 14:45, 20 February 2019 (UTC)
There’s a term called Malicious Code, harmful computer code or web script, that is created to cause harm to a computer's system. Malicious code can take on multiple forms such as, ActiveX controls, Java Applets, plug-ins and more. When the code gets inside the computer it can infect mail servers and be disguised as a mail attachment. It can also spread easily throughout other networked computer.
NCCIC. “Security Tip (ST18-004).” "Plan, Do, Check, Act" | US-CERT, 28 Sept. 2018, www.us-cert.gov/ncas/tips/ST18-271.
“Malicious Code.” CA Veracode, 21 Dec. 2018, www.veracode.com/security/malicious-code.
Kaspersky. “What Is Malicious Code?” Usa.kaspersky.com, usa.kaspersky.com/resource-center/definitions/malicious-code.
Techopedia. “What Is Malicious Code? - Definition from Techopedia.” Techopedia.com, www.techopedia.com/definition/4014/malicious-code.
“Malicious Code Information.” Spyware Statistics, 27 Feb. 2019, www3.safenet-inc.com/csrt/malicious-code-more.aspx.
“Malicious Code Protection.” Nd.gov - The Official Portal for North Dakota State Government, 10 July 2018, www.nd.gov/itd/services/it-security/malicious-code-protection. Mabate01 ( talk) 02:27, 28 February 2019 (UTC)
I thought this was good but the first link didn't work and the second led to the google search but the first result was your source so you should fix that. I didn't see any writing issues though but remember to match a sentence or part to each source and this addition would go great as a sub section to the malicious software section! J lucciano ( talk) 20:25, 25 March 2019 (UTC)Justin Lucciano
Hello! I wanted to inform anyone who read this that this is my input on how this article can be improved. Thank you!
Citations:
–Some of the references are appropriate. Although, the sources are very outdated. Citation 31 goes back to 2001.
–The most recent source was from 2017 which was source 18.
-Making sure the reader is getting information that is up to date is very important. Information changes throughout the years. Some references seem a bit odd. Writers use a website called the “Electronic Frontier Foundation”, citation seven. It seemed a bit out of place compared to other websites that they used. The layout is very messy and just doesn’t seem reliable.
–Source 24 and 51 doesn't work
–Everything is relevant in the article topic. I was able to learn new things about security for users online. Writers made it very clear and it was easy to understand.
–The only thing that distracted me was the layout for some of the sites. If a site has a clean layout, it’s easy for me to read the information on the website but if everything is compacted together and just leads to more links, I'll lose interest. Source 51 is just very difficult to read. The background makes it difficult to read the text.
Neutrality of Sources:
–Websites are very neutral and just state facts on what's going on in America and what we can do to prevent those from exploiting the internet.
–Most links to websites for sources didn’t work so the ones that did work weren’t biased.
–Article is short but gets to the point.
Arianna Arianna.fr ( talk) 22:26, 13 October 2021 (UTC)
Computer and network surveillance is the action to monitor unusual activity on computers and data that is being transferred through the internet. The process of this allows the government to monitor unusual activity so they can later investigate suspicious activity. Illegal corporations are able to monitor behavior but for other reasons such as hacking into individuals' personal information on their phones or computers. Installing software and buying electronics allows people to monitor everything you do online which leads to a digital footprint.
References
1. Computer and Network Surveillance, https://www.interelectronix.com/computer-and-network-surveillance.html.
2. Charles, Aaron. “Computer Surveillance Techniques.” Small Business - Chron.com, Chron.com, 21 Nov. 2017, https://smallbusiness.chron.com/computer-surveillance-techniques-50593.html.
3. Kifleswing. “Apple IPhones Can Be Hacked with Spyware Even If You Don't Click on a Link, Amnesty International Says.” CNBC, CNBC, 19 July 2021, https://www.cnbc.com/2021/07/19/apple-iphones-can-be-hacked-even-if-the-user-never-clicks-a-link-amnesty-international-says.html.
4. Reyes, Natalie. “What Is a Digital Footprint? Definition - Management - Pitfalls.” What Is a Digital Footprint? Definition - Management - Pitfalls, Reputation X, 14 Oct. 2021, https://blog.reputationx.com/digital-footprint.
Arianna.fr ( talk) 00:31, 18 October 2021
![]() | This article is rated C-class on Wikipedia's
content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
This article was the subject of a Wiki Education Foundation-supported course assignment, between 14 January 2020 and 28 April 2020. Further details are available
on the course page. Student editor(s):
ValentinaEspinosa-Gil. Peer reviewers:
Chughes117.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT ( talk) 19:24, 17 January 2022 (UTC)
This article was the subject of a Wiki Education Foundation-supported course assignment, between 2 September 2020 and 11 December 2020. Further details are available
on the course page. Student editor(s):
Cwilley16.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT ( talk) 19:24, 17 January 2022 (UTC)
This article was the subject of a Wiki Education Foundation-supported course assignment, between 2 September 2021 and 9 December 2021. Further details are available
on the course page. Student editor(s):
Arianna.fr. Peer reviewers:
Rcahill25,
Meabarbedoreggina.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT ( talk) 19:24, 17 January 2022 (UTC)
This article was the subject of a Wiki Education Foundation-supported course assignment, between 10 January 2019 and 30 April 2019. Further details are available
on the course page. Student editor(s):
Mabate01. Peer reviewers:
Leslie boudreau,
J lucciano.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT ( talk) 18:14, 16 January 2022 (UTC)
Just as a note, the article says that fire optics can't be tapped without detection. Fibre optic cables can be read without breaking into the core. By stripping of the sheath and bending the fibre at the right angle, enough signal passes straight on to be detected by sensitive equipment. —Preceding unsigned comment added by 86.155.90.96 ( talk) 18:55, 22 November 2008 (UTC)
Tracking software is, it seems to me, a subset of this topic. As such, I would be opposed to a merge, however much such a merger might appeal to a sense of tidiness. ww 15:15, 15 February 2006 (UTC)
The implication of surveillance definition in wikipedia by this author is considered as clear and understandable, user friendly. The key concept being discussed is logically available for users to adapt and concern with the meaning. By providing hyperlinks connecting to computer based knowledge lead to easier way in finding information without having to go browsing from page one to the end just to find little information, in doubt. The used of web 2.0 which allows other Wikipedia users to add up references, editing existing topics and rate certain topics made it more believable and reliable.
The author also classifies the information by breaking the contents into specific genre of texts uploaded. —Preceding unsigned comment added by Halyza ( talk • contribs) 05:48, 2 September 2008 (UTC)
Is the following statement from the article's lead really true?
Is there on-going real-time monitoring of "almost all Internet traffic" or is there just the potential for such monitoring? There isn't a source given for this statement and I don't see it covered elsewhere in the body of the article. -- Jeff Ogden (W163) ( talk) 12:13, 26 August 2013 (UTC)
I am about to remove an "update" template from the top of the article that said:
I don't find anything in the article about Edward Snowden to update. Perhaps this was a call to add information about the Edward Snowden revelations to the article. I'm not sure that such an addition is needed since the Edward Snowden revelations are well covered in other Wikipedia articles. I did add a number of links to the See also section of the article that link to articles about "Surveillance by the United States government" including some that cover the Edward Snowden revelations. -- Jeff Ogden (W163) ( talk) 00:38, 27 August 2013 (UTC)
Hello fellow Wikipedians,
I have just modified 2 external links on Computer and network surveillance. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
This message was posted before February 2018.
After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than
regular verification using the archive tool instructions below. Editors
have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
RfC before doing mass systematic removals. This message is updated dynamically through the template {{
source check}}
(last update: 5 June 2024).
Cheers.— InternetArchiveBot ( Report bug) 21:02, 11 August 2017 (UTC)
I have articulated some suggestions that could be used to improve this article further. Some of the sentences written in this article don’t have a source cited, but the majority of the ones that do have appropriate and reliable references. They include sources like the New York Times, Times Magazine, USA TODAY and academic sources such as databases. The problem that I noticed was that almost every one of the cited sources are very outdated. Some don’t even exist anymore (I have noted which ones those are). Nothing is plagiarized or close paraphrased and everything in this article relates to the topic. The article is neutral, but I did notice a sentence that was more of an opinion rather than a fact. In the section titled Corporate Surveillance, in the paragraph under the bullet points the opinion is “There should be a distinction between an employee's personal electronic devices, which should be limited and proscribed, and those owned by the firm.” Mabate01 ( talk) 14:45, 20 February 2019 (UTC)
There’s a term called Malicious Code, harmful computer code or web script, that is created to cause harm to a computer's system. Malicious code can take on multiple forms such as, ActiveX controls, Java Applets, plug-ins and more. When the code gets inside the computer it can infect mail servers and be disguised as a mail attachment. It can also spread easily throughout other networked computer.
NCCIC. “Security Tip (ST18-004).” "Plan, Do, Check, Act" | US-CERT, 28 Sept. 2018, www.us-cert.gov/ncas/tips/ST18-271.
“Malicious Code.” CA Veracode, 21 Dec. 2018, www.veracode.com/security/malicious-code.
Kaspersky. “What Is Malicious Code?” Usa.kaspersky.com, usa.kaspersky.com/resource-center/definitions/malicious-code.
Techopedia. “What Is Malicious Code? - Definition from Techopedia.” Techopedia.com, www.techopedia.com/definition/4014/malicious-code.
“Malicious Code Information.” Spyware Statistics, 27 Feb. 2019, www3.safenet-inc.com/csrt/malicious-code-more.aspx.
“Malicious Code Protection.” Nd.gov - The Official Portal for North Dakota State Government, 10 July 2018, www.nd.gov/itd/services/it-security/malicious-code-protection. Mabate01 ( talk) 02:27, 28 February 2019 (UTC)
I thought this was good but the first link didn't work and the second led to the google search but the first result was your source so you should fix that. I didn't see any writing issues though but remember to match a sentence or part to each source and this addition would go great as a sub section to the malicious software section! J lucciano ( talk) 20:25, 25 March 2019 (UTC)Justin Lucciano
Hello! I wanted to inform anyone who read this that this is my input on how this article can be improved. Thank you!
Citations:
–Some of the references are appropriate. Although, the sources are very outdated. Citation 31 goes back to 2001.
–The most recent source was from 2017 which was source 18.
-Making sure the reader is getting information that is up to date is very important. Information changes throughout the years. Some references seem a bit odd. Writers use a website called the “Electronic Frontier Foundation”, citation seven. It seemed a bit out of place compared to other websites that they used. The layout is very messy and just doesn’t seem reliable.
–Source 24 and 51 doesn't work
–Everything is relevant in the article topic. I was able to learn new things about security for users online. Writers made it very clear and it was easy to understand.
–The only thing that distracted me was the layout for some of the sites. If a site has a clean layout, it’s easy for me to read the information on the website but if everything is compacted together and just leads to more links, I'll lose interest. Source 51 is just very difficult to read. The background makes it difficult to read the text.
Neutrality of Sources:
–Websites are very neutral and just state facts on what's going on in America and what we can do to prevent those from exploiting the internet.
–Most links to websites for sources didn’t work so the ones that did work weren’t biased.
–Article is short but gets to the point.
Arianna Arianna.fr ( talk) 22:26, 13 October 2021 (UTC)
Computer and network surveillance is the action to monitor unusual activity on computers and data that is being transferred through the internet. The process of this allows the government to monitor unusual activity so they can later investigate suspicious activity. Illegal corporations are able to monitor behavior but for other reasons such as hacking into individuals' personal information on their phones or computers. Installing software and buying electronics allows people to monitor everything you do online which leads to a digital footprint.
References
1. Computer and Network Surveillance, https://www.interelectronix.com/computer-and-network-surveillance.html.
2. Charles, Aaron. “Computer Surveillance Techniques.” Small Business - Chron.com, Chron.com, 21 Nov. 2017, https://smallbusiness.chron.com/computer-surveillance-techniques-50593.html.
3. Kifleswing. “Apple IPhones Can Be Hacked with Spyware Even If You Don't Click on a Link, Amnesty International Says.” CNBC, CNBC, 19 July 2021, https://www.cnbc.com/2021/07/19/apple-iphones-can-be-hacked-even-if-the-user-never-clicks-a-link-amnesty-international-says.html.
4. Reyes, Natalie. “What Is a Digital Footprint? Definition - Management - Pitfalls.” What Is a Digital Footprint? Definition - Management - Pitfalls, Reputation X, 14 Oct. 2021, https://blog.reputationx.com/digital-footprint.
Arianna.fr ( talk) 00:31, 18 October 2021