StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Invasion of Privacy and the Potential Abuse - Essay Example

Cite this document
Summary
Invasion of Privacy and the Potential Abuse In the world of today, invasion of privacy has reached new levels. This is because it has affected the world of IT and computing like never before. This is one of the main reasons why people view the phenomenon of IT as a potentially disadvantageous one – one that can mar the very basis of success and harmony within the related ranks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Invasion of Privacy and the Potential Abuse
Read Text Preview

Extract of sample "Invasion of Privacy and the Potential Abuse"

Invasion of Privacy and the Potential Abuse In the world of today, invasion of privacy has reached new levels. This is because it has affected the world of IT and computing like never before. This is one of the main reasons why people view the phenomenon of IT as a potentially disadvantageous one – one that can mar the very basis of success and harmony within the related ranks. Invasion of privacy has become a huge problem because it creates rifts among the people who are directly involved with the use of sensitive data and information, as they believe that their rights have been transgressed upon and such violations usually mean that they would have to find new ways to protect themselves.

The individuals who are responsible for breaking into private data, and information are by and large the ones who have some ulterior motives. Thus, they want to acquire a larger share of the data to make sure that they can achieve their end objectives. It is important that invasion of privacy is tackled in a proper manner because it affects the world of IT directly and makes the entire discussion on privacy a much heated one. Much research has taken place which discusses this factor in the recent past and even in times like today.

Moving ahead with the discussion at hand, the abuse is immense, and more so when one is trying to understand the regions related with growth and development of the Information Technology realms. Neither any individual nor any organization appreciates the idea of potential abuse happening within their fore. This is indicative of its approach to do things right, and that too in a manner which will be individually and organizationally sound. An example related with invasion of privacy is that of an organization which has done tremendously well to conceal its data from intruders and has thus implemented state of the art systems to counter virus attacks from left, right and center.

However, when this organization is unable to come to terms with the attacks which are more sophisticated than its own methodological frameworks, then this would mean that the organization is losing out on its security front. There would be immense wastage in terms of its funds that have been allocated for the sake of building security so that data could be hid and unwanted people do not gain access to sensitive data1. This wastage is in terms of money. Thus this example is a clear cut indication of how companies have been able to undergo serious issues at hands of hackers and malicious attackers from time to time.

Therefore how individual data is gathered, analyzed and commercially used is something of a point to ponder in this day and age2. There are reasons available to suggest that such data can have long lasting consequences and ramifications for the people in different organizations of the world. As a real world example, the Enron scandal highlighted where things went wrong and how technology played its negative part. Even though it was a whistle-blowing exercise, the end results depended a great deal on the use of technology.

Enron scandal highlighted quite a lot about how invasion of private data meant serious trouble for the organizations worldwide. This brings to mind that the potential for future abuse does exist and that too without any quantifiable limits. This is because privacy can lead to disastrous results which would mean immense disharmony within the related ranks, and dissemination of private data towards such ranks which will mean more negativity to creep in within the Information Technology and computing realms.

The future looks all the more bleak because it embodies the basis of protecting data that is important yet has long lasting effects on the people’s relationship with their processes as well as the people around them. Therefore it would not be wrong to suggest that much success can be achieved from the fact if a proper philosophy of protecting data and getting it off the invasion ranks is concerned3. This obviously could be done through proper regulation and monitoring of data security. This is so because the idea of having data invaded by forces which come up from different sides is never acknowledged in the real sense.

In the end, it would be sound to state that the potential for future abuse of this data is highly dependent on how people decipher and protect data that has been assembled, gathered, analyzed and commercially made available. Bibliography Allmer, Thomas. A critical contribution to theoretical foundations of privacy studies. Journal of Information, Communication and Ethics in Society, 9(2), 2011 Dumas, Lloyd. When Costs Approach Infinity: Microeconomic Theory, Security, and Dangerous Technologies.

Contributions to Conflict Management, Peace Economics and Development, 16, 2011 Piggin, Richard. Lessons learned in automation security? Assembly Automation, 31(2), 2011 Watters, Paul A. A methodology for analyzing the credential marketplace. Journal of Money Laundering Control, 14(1), 2011 Zimerman, Martin. The dangers of malware in a library computing environment. The Electronic Library, 29(1), 2011

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Invasion of Privacy and the Potential Abuse Essay”, n.d.)
Retrieved from https://studentshare.org/information-technology/1428874-invasion-of-privacy-and-the-potential-abuse
(Invasion of Privacy and the Potential Abuse Essay)
https://studentshare.org/information-technology/1428874-invasion-of-privacy-and-the-potential-abuse.
“Invasion of Privacy and the Potential Abuse Essay”, n.d. https://studentshare.org/information-technology/1428874-invasion-of-privacy-and-the-potential-abuse.
  • Cited: 0 times

CHECK THESE SAMPLES OF Invasion of Privacy and the Potential Abuse

Should There Be a Legal Right to Privacy in Australia

Donaldson (1) reports that the criminal who captured the images of naked women without official assent was charged with filming for indecent reasons rather invasion of privacy.... One of the countries adversely hit by the issues of privacy rights is Australia.... For a long time Australia has been mentioned as lacking substantial laws that draw the lines of privacy rights in the society of Australia.... One disheartening case involving the breach of privacy rights occurred in the media reports confirming an incident where a man used mobile phone cameras to capture images of naked women in the changing rooms in a fashion store (Donaldson 1)....
8 Pages (2000 words) Essay

The HIPAA Law and Nursing/Society

invasion of privacy is the unwarranted appropriation or exploitation of one's personality, publicizing one's private affairs with which the public has no legitimate concern, or wrongful intrusion into one's private activities, in such a manner as to cause mental suffering or humiliation to a person of ordinary sensibilities”... In order to critique the concept of privacy indicates that it has deep roots in the laws of the United States and all modern and “civilized” nations....
10 Pages (2500 words) Term Paper

Privacy and technology

This ensures the reader knows she is against the invasion of privacy on the pretext of terror threats.... In addition, The Economist also contends that the technology will be important in cases where packages are left by suspicious individuals and will alert security officials on the potential danger.... The Economist talks about other technologies aimed at anti-terrorism that measures breathing and heart rate, perspiration rates, temperature of one's skin, and the flow of blood, doing all this while the potential suspect is some meters away from them....
4 Pages (1000 words) Essay

The Right to Privacy and Corporate Responsibility

The scope of this paper is to discuss the balance of civil liberties between an individual's right to privacy and the privileges of the corporations which hire them to know specific details regarding who they are employing and how those employees are performing on the job.... hellip; The issue is an important consideration as it is being hotly debated worldwide, and an approach which favors either side disproportionately is rife with the potential for abuse....
16 Pages (4000 words) Essay

Worker Rights/Working Conditions

In this context drug testing is not an invasion of privacy, because drug abuse is not a private act.... Besides, the sexual act is of such personal nature that suspicionless intrusion into this area is a definite invasion of privacy.... As mentioned, the potential harm pertains to the actors themselves, and do not appear to be of significant cost to the operations of the employer.... A person, even if he takes drugs in private, poses a threat to the safety of his co-workers and neighbors, and thus is not entitled to the right of privacy in drug abuse....
2 Pages (500 words) Essay

Ethical, Professional and Cultural Issues of Information and Communication Technology

These violations of rights has created new problems in the human social systems, such as the digital divide, digital security, cybercrime and a number of privacy concerns, all of these have affected people's lives either indirectly or directly.... The world has been faced with a lot of complex and difficult questions regarding the access to information, freedom of expression, intellectual… Information and Communication Technology (ICT) is an instrumental need for everyone in regards to gathering of information and knowledge....
10 Pages (2500 words) Essay

The War on Terrorism

In the following paper “The War on Terrorism” the author discusses the 'War on Terrorism', which is primarily used to justify the military or political initiative de jour or when the Bush administration believes it needs to circumvent the Constitution.... hellip; The author states that as the 'war' has progressed, the Bush administration has lost much confidence among the American public who now better understand what the rest of the world has known since Iraq was first invaded....
12 Pages (3000 words) Assignment

A Definitional Approach to Understanding Child Abuse Etiology

The effects of child abuse are immense and deserve their own discussion, what is perhaps more important than the issue of effect is the issue of cause, and therefore how to prevent the abuse of children.... The writer of this paper presents a definitional approach to understanding child abuse etiology.... hellip; Child abuse is an affliction on society that few remedies can fix.... Not only are the immediate effects the abuse has on a child great, but the inevitable costs of caring for the child in hospitals, and maybe even the cost of housing him or her in prison due to social deviancy, are difficult for any nation to bear....
10 Pages (2500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us