pet feeders, pet cameras, pet toys and trackers (GPS systems that allow you to know where your pets are).appliances (refrigerator, vacuum, etc.).entertainment systems (stereo, TV, etc.).smart electrical outlets (with lights or other devices plugged into them). Some examples of connected devices that allow you to use cyber-surveillance include: Then, an abuser may misuse these devices and the systems that control them to monitor, harass, threaten, or harm you.Ĭyber-surveillance can be used in a variety of helpful ways, and you may choose to use cyber-surveillance to monitor and control your own property or add certain conveniences to your life. An abuser could use his/her computer (or other device that is connected to the Internet, such as a phone or tablet) to hack into your devices. However, cyber-surveillance also allows connected devices to play a role in how people and places are monitored. These devices and systems offer tools you can use to increase your own safety and convenience. Devices may be connected through a home network, the Internet and WiFi, Bluetooth, or other means. For example, you may have a television connected to the Internet that you can control from an app on your cell phone or tablet or appliances like coffee machines can be connected to a network and controlled remotely with another device (such as your computer or phone). Devices used for cyber-surveillance are generally connected to each other and to a device or app that can control them. This type of connected technology has also been called the “Internet of Things” (IoT). Cyber-surveillance is when a person uses “smart” or “connected” devices that communicate through a data network to monitor people or places.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |