StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Negative Implications of Posting, Sharing and Circulation Information Online - Essay Example

Cite this document
Summary
This essay "Negative Implications of Posting, Sharing and Circulation Information Online" presents the evolution of technology that has brought about transformation on how previous private information is shared and made readily available to the public…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful

Extract of sample "Negative Implications of Posting, Sharing and Circulation Information Online"

Critical Review of Data Dealer Introduction The evolution of technology has brought about transformation on how previous private information is shared and made readily available to the public. The availability of information has led to negative implications where there has been an infringement of privacy. Although information presented online is usually done innocently, it leaves traces and footprints that can be used against a person in the future. There is, therefore, a need to protest against the violation of privacy. The goal of protecting private information has led to data dealer project, which aims to sensitize people on how their information is usually collected and commoditized for personal gains. This paper through its review of the data dealer project looks at the negative implication of posting and circulation private information online, forms of protection by PIPEDA to its Canadian citizens and the effectiveness of the protection. Lastly, the paper gives a realistic representation of data dealer towards the security of online information. Negative Implications of Posting, Sharing and Circulation Information Online Sharing and circulation of information can have shattering and disastrous consequences to an individual's personal and professional life. The location-based service provided by social media discloses a person’s location and whereabouts which makes it easy for them to be tracked endangering their lives (Govani and Pashley 10). One also becomes a target of open searches and further makes their reputation for being at stake. Social media has provided individuals with a platform to air their opinions and give their experiences. However, this can be detrimental to a person's reputation especially if the information posted goes against the moral values of a particular group or society (Pfeffer, Zorbach and Carley 125). Social media has led to new modern day technology related problems that did not exist. There is an increased obsession to keep up with a virtual world that has led to dysfunctional families where divorce and separation have increased. Personal information posted on social media has been cited as a course for modern-day divorce. Personal data from social media has been used and presented in court as evidence for divorce cases (Valenzuela, Halpern and Katz 98). Further, children's lives have been put at risk as a result of the parent's online behavior (Livingstone and Bober 100). Sharing of children's information such as birthday, school, age, and the name has led to strangers getting access and trust of children which has increased cases of child abduction and molestation. The information provided online does not provide visibility on who has access to the obtained data and how it can be used. This poses a threat to the lives of social media users. Cyber bullying has become rampant and has led to suicide as individuals do not know how to protect themselves when faced with a rogue cyber audience (Patchin and Hinduja). Due to the anonymous nature of the internet, cruelty has increased as people turn the keyboard as their tool to inflict harm. Social media has proved detrimental to the medical field as there is increased poor quality information distribution, patients privacy have been breached by posting photos and information that should not be public, personal and professional boundaries have been violated and further, there is increased permission of illegal issues (Chauhan, George and Coffin 207) PIPEDA Protection to Canadian Citizens The digital privacy act (DPA) was passed into law in Canada in June 2015 and serves to amend the Personal Information Protection and Electronic Documents Act (PIPEDA). The act offers protection to Canadian citizens while doing online transaction. Personal information is not allowed to be used contrary to its intention. The act stipulates and governs how organizations in the private sector can collect, use and disclose information that is deemed as personal while conducting their business (Bennett and Bayley 13). Any personal identifier that can be used to infringe on privacy is not allowed under this act. Regulations on how private information can be collected and used are set in the law. The statute further stipulates how the notification is given in case secured personal information is leaked or comprised. Through the act, no person is allowed to collect and use personal information hence information obtained on online services is kept private. Initially, businesses would obtain consent when they needed to collect and use personal information. However, this has changed as the consent now entails an understanding of the purpose and consequences by the person whose information is sought. This act has enabled the protection of Canadian citizens from having their information used by unauthorized individuals. More vulnerable groups like persons living with disabilities and children have further been protected by the added clause on consent. The effectiveness of PIPEDA Protection PIPEDA has been effective in offering protection against use of personal information to Canadian citizens as it stipulates on use and collection of private information. Having this law put in place has led to increased accountability from organizations that might be interested in using personal information without consent (Austin 21). Organizations for this matter have tried to comply by assigning a person responsible for safeguarding personal information to avoid being sanctioned. There is increased protection of information by limiting and prevention of disclosure of information. Data received that is termed as personal information has been used for its intended purpose making PIPEDA very useful. Organizations are now seeking consent from individuals in case they need to use their information. This implies there is increased consideration and well-being of clients which makes PIPEDA very effective. By seeking consent, human rights protection is upheld hence human dignity is considered paramount. Realistic Representation of Online Issues by Data Dealer Data dealer offers a realistic representation of online issues. Initially, there used to be crude ways of gathering information especially from the government that was used to control its citizens and ensures compliance with the law. This has drastically changed with the evolution of information age where through the click of a button using social media one can access all the needed personal information. This endangers an individual’s life as there is deprived privacy. The information which is usually obtained innocently can be used in the destruction of a person’s reputation, character assassination and other heinous acts (Jap and Mohr 30). Data Dealer presents how Private information can be obtained through computers, phones, using a credit card during purchase, internet searchers among others. The information is then transmitted to a server like a device, and upon analysis, one can get information about a person that is usually considered to be private. Upon synchronizing the information, privacy is breached and the information obtained makes up the data dealer. Consequently, banks, authorities, insurance companies, corporations, and online shops use the available information to run a background check when a person requires services. The availability of information on data dealer has been used to deny an individual access to services basing on their online and social media traces. Improvement of Data Dealer The game should be made simpler to enable everyone to be able to play it with ease. This will ensure all cadres of individuals can play the game. The producers of the game further need increase its awareness by reaching out to a big audience who can help with the dissemination of the information. It should partner with organizations that protect the inversion of privacy to ensure awareness is escalated. Works Cited Austin, Lisa M. "Reviewing pipeda: Control, privacy and the limits of fair information practices." Can. Bus. LJ 44 (2006): 21. Bennett, Colin J., and Robin M. Bayley. Canadian federal political parties and personal privacy protection: A comparative analysis. Office of the Privacy Commissioner of Canada, (2012): 1-47. Chauhan, Bindiya, Ruth George, and Janis Coffin. "Social media and you: what every physician needs to know." J Med Pract Manage 28.3 (2012): 206-209. Govani, Tabreez, and Harriet Pashley. "Student awareness of the privacy implications when using Facebook." unpublished paper presented at the “Privacy Poster Fair” at the Carnegie Mellon University School of Library and Information Science 9 (2005): 1-17. Jap, Sandy D., and Jakki J. Mohr. "Leveraging Internet technologies in B2B relationships." California Management Review 44.4 (2002): 24-38. Livingstone, Sonia, and Magdalena Bober. "Regulating the internet at home: contrasting the perspectives of children and parents." Digital generations: Children, young people, and new media (2006): 93-113. Patchin, Justin W., and Sameer Hinduja, eds. Cyberbullying prevention and response: Expert Perspectives. Routledge, 2012. Pfeffer, Jürgen, Thomas Zorbach, and Kathleen M. Carley. "Understanding online firestorms: Negative word-of-mouth dynamics in social media networks." Journal of Marketing Communications 20.1-2 (2014): 117-128. Valenzuela, Sebastián, Daniel Halpern, and James E. Katz. "Social network sites, marriage well-being, and divorce: Survey and state-level evidence from the United States." Computers in Human Behavior 36 (2014): 94-101. Wolak, Janis, et al. "Online" predators" and their victims: myths, realities, and implications for prevention and treatment." American Psychologist 63.2 (2008): 111. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Negative Implications of Posting, Sharing and Circulation Information Essay, n.d.)
Negative Implications of Posting, Sharing and Circulation Information Essay. https://studentshare.org/information-technology/1893616-data-dealer-project
(Negative Implications of Posting, Sharing and Circulation Information Essay)
Negative Implications of Posting, Sharing and Circulation Information Essay. https://studentshare.org/information-technology/1893616-data-dealer-project.
“Negative Implications of Posting, Sharing and Circulation Information Essay”. https://studentshare.org/information-technology/1893616-data-dealer-project.
  • Cited: 0 times

CHECK THESE SAMPLES OF Negative Implications of Posting, Sharing and Circulation Information Online

Starting a Business Online

Starting a Business online Answer 1 The conception of e-business or business online considers the transaction of products and/or services through the electronic media in which the significance of domain names is often regarded to be quite high (Stead & Gilbert, 2001).... hellip; The domain name system also identifies the role of the organization to attract online business and generate continuous traffic to its site (Bagby & Ruhnka, 2009).... In the referred case, the domain name of the organization can be identified playing a vital role to provide a professional appearance in the online business which can be more viable for the enterprise in its future conducts....
4 Pages (1000 words) Assignment

Information technology for Management

Resumix is an online recruitment portal that provides a common platform for companies and individuals to post and search for jobs and candidates.... Resumix is an online recruitment portal that provides a common platform for companies and individuals topost and search for jobs and candidates.... n the case of job seekers, the candidate solutions allow candidates to construct an online profile that captures all basic information of a candidate and stores them in its database....
2 Pages (500 words) Essay

System and databases

The reasons for the recommendation should be clearly stated and the implications for the organisation fully explored.... Produce a report for Production department and owner (Mark Stone), containing the summary of questionnaires by computing the percentages for each answer choice on the questionnaire filled by delegates by end of every conference. Once the Production Head arranges the presenter,… inalizes the dates, and finalizes details with the sponsor if there is one, he informs the concerned assistant to find a suitable venue for the conference....
12 Pages (3000 words) Essay

Posting Information about You

There more popular concerns about social networks however are the inadvertent effects derived from an online post.... In the essay “Posting information about You” the author discusses the issue that posting information about you has become an issue of concern.... Posting of information about a person became an issue for concern for several reasons.... The founder of Wikipedia has a noble mission – to share all the world's information with everyone everywhere, anytime....
2 Pages (500 words) Essay

Opinions about balancing between information sharing and information protection

However, in the current times when these processes pertaining to information are getting digitized, much debate has come into existence regarding… Though on the surface, there seems to be a dichotomy between the sharing and protection of information, in a pragmatic context, there is no innate conflict between information sharing and information Opinions about Balancing Between Information sharing and Information Protection of the Computer Sciences and Information Technology of the Concerned ProfessorApril 14, 2012Opinions about Balancing Between Information sharing and Information Protection Running institutions and organizations is primarily about the storage, retrieval, processing and dissemination of information....
2 Pages (500 words) Assignment

Fetal Circulation

The oxygenated part of the inferior vena cava gets directed from the Fetal circulation Which blood vessel in the fetus contains blood with the highest oxygen content?... When patent after birth, it results to left to right shunt, therefore allowing blood to move systemic circulation to the given pulmonary circulation resulting in high volume (Blackburn 2007, p....
1 Pages (250 words) Assignment

The circulation

Special valves known as atrio-ventricular valves then close and prevent the flowing back The circulation Oxygenated blood from the lungs flows through pulmonary vein to the left atrium.... This pathway of blood through blood vessels, body parts, and body organs except the lungs is referred to as systemic circulation.... Systemic circulation is responsible for carrying blood to the neck, head, and other organs in the body.... Two large veins; superior vena cava (drains the upper surface) and inferior vena cava (drains the lower body) collect blood from systemic circulation and dump the deoxygenated blood to the right atrium (Zamir 2006)....
1 Pages (250 words) Coursework

Heart and Circulation

This work called "Heart and circulation" describes the circulatory system that is responsible for oxygen circulation in the body through circulating it to the blood.... The author outlines the amount of pressure required, several causes of edema, the process of the absorption of fluids in order to balance the production sequence with other body conditions....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us