The Course Number 17 June 2012 Role of the State in Internet Privacy Protection While the number of internet users is rapidly growing, a number of concerns related to the use of the World Wide Web has multiplied recently…
Download file to see previous pages...
To specify, information privacy is believed to exist if one is able to monitor the usage of personal information, its circulation, and release (Culnan 341). With the rapid growth of the web space and technology advancement, concerns of users’ about personal privacy threats are also growing. Research into the issue found that internet users today are exposed to embarrassment, stalking, cyber-bullying, blackmailing, and identity hacking due to users’ displaying lots of personal data. This has led many people believe that internet privacy does not exist at all and is impossible to control. Others believe that the issue of internet privacy is not that important and should be regulated by the market. In my view, internet privacy exists once it is protected by the law. Many people believe that maintaining privacy on the internet and particularly while visiting social networking web sites is their basic human right. So they suppose that the basic thing they need to do to protect their privacy is to simply adjust the privacy settings, Steven Rambam and other interested authors think that privacy does not at all exist on the internet. Rambam, a private investigator and director of Pallorium Investigative Agency, expressed these ideas in a series of talks at U.S. conferences. His basic idea is “Privacy is Dead – Get Over It”. ...
in a few hours about an individual unfamiliar to him (Rambam, “Privacy is Dead – Get Over It”) At the Last HOPE Conference, Rambam discussed the process of searching for necessary information on the internet via intrusion into privacy, which as the investigator notes “is out of the bottle” (Mills, “The Internet – a Private Eye’s Best Friend”). Rambam argues that each new search through Google, every blog post, and each new photo posted online mean further losing the battle led for privacy protection. This can be explained by the fact that “anything you put on the internet will be grabbed, indexed, cataloged, and out of your control before you know it” (Mills, “The Internet – a Private Eye’s Best Friend”). Rambam specifies that every kind of information online is digitized, with older information scanned and placed online. Afterwards, this mixture gets aggregated into special databases which are later sold to government agencies, marketers, and practically anyone capable of purchasing it. Twitter, cell phones, taking photos by iPods, etc are effective tools for identifying individual’s location, preferences in buying and similar information is collected by special marketing databases that are usually bought by the government. Due to the use of the information supplied by consumer databases, individuals are tracked down by the police, different collection agencies, and the U.S. Marshall’s Service (Mills, “The Internet – a Private Eye’s Best Friend”). The question arises then: what to do about this? It seems Rambam’s advice is to just “get over” the reality that privacy is dead on the internet. Next, many researchers acknowledge that privacy is under threat on the internet and suggest how to protect it. Specifically, the
...Download file to see next pagesRead More
The DPD, which was framed many years prior to the launch of the Web 2.0 era, did not take into account the social networking scenario, which came much later, in the mid-2000s. Thus, applying this directive to the context of the modern SNS scenario is chimerical and illogical.
This monitoring and keeping records of everyone’s behaviour does violate an individual’s right to privacy. Especially in an arena like internet where a person would assume it is alright to perform activities without anyone knowing, it does become a sensitive matter.
The author examines moral and ethical problems arisen when someone shares other people’s personal information or intellectual property, without their authorization. On personal level, he believes every individual must have the freedom to live their life the way they want within the broadly accepted legal and social parameters.
Respectively, the risk associated with Web 2.0 use, first of all, includes hostile access to users’ personalized data with the aim to manipulate the obtained information. In other words, privacy concerns have multiplied in the recent years, so that a commonly held view has evolved that Internet privacy is a myth since in practice privacy does not exist on the web.
According to Lessig, there are three aspects of privacy namely: privacy in private, privacy in public: surveillance and privacy in public data (201). Each aspect is going to be explained briefly below. The first aspect of privacy in private is related to the element of private property where the traditional law stipulates that each person has a right to be left alone.
Surely maintaining the balance between the need for privacy and data protection, on the one hand, and law enforcement, on the other, is no easy task. The tension between the right to privacy, data protection and law enforcement is an important feature of contemporary society and one which is set to grow as network technologies, such as the Internet, enable us to communicate almost instantaneously with organizations and individuals regardless of geographical location.
People or even acquaintances may unknowingly be able to access personal information in various ways and places that can threaten a person’s privacy and most importantly a person’s security. How can a person be sure of that relevant
The author states that ethics in media is a complicated issue since it deals with various sensitive aspects of human life. Media ethics is based on a scope of philosophical standards such as fundamental Judeo-Christian qualities, Aristotle's values of virtue and Kant's downright basic, Mill's guideline of utility, Rawls' cover of lack of awareness.
e, the social media platforms have made more changes to their privacy policies making this important information accessible for companies so they can use it for their own purposes. Public awareness is continually being made on matters such as cyber security, hackers, viruses,
3 Pages(750 words)Essay
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Essay on topic Role of the State in Internet Privacy Protection for FREE!