StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The End of Privacy - Research Paper Example

Cite this document
Summary
The writer of the paper “The End of Privacy” states that condemnation and awareness are indispensable when one is being constantly watched and monitored without any rational reason. Security and peace of mind are only obtained when one is free from the feeling of being watched…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful
The End of Privacy
Read Text Preview

Extract of sample "The End of Privacy"

? “The End of Privacy” Internet facility has made accessibility of information easy for the average internet user. Hence, global communication entails e-mails, virtual chat rooms, search engines, virtual shopping websites, social media networks, blogs and many more. This superlative tool has increased the rapid mode of exchange of information for the users and simultaneously, has threatened the personal information to a high degree. Thus, the aspects and issues related to privacy and confidentiality have reached to a disturbing stage. The authorities have been involved in securing and establishing policies to minimize incremental advantages from such information. However, the ambivalence one experiences due to advance technology is quite right. Such technological tools do advent human kind, but they are also a main reason to erode personal privacy (Tavani, 162). Surveillance cameras, sensors, recording devices, monitors have the capability to store large amount of data. These day to day technological tools may seem inevitable due to the ease and security they have produced for the mankind, but they have also posed a threat towards the civil liberty and personal privacy of many. Although, violation of internet privacy is not an easy task, but hackers all around the world have obtain techniques to extract encrypted and encoded data. However, these technological shortcomings can only be resolved by the same mean (Buchanan,817). However, there are two main concerning aspects which USA government is trying to resolve to its best. The obtainment of personal information by FBI for national security purposes and the emphasis individuals are exerting on the privacy of their information. Another security concern is possessed by the World Wide Websites through their ‘tracking cookies’, which get stored on the hard drive and extract personal information of the user (Dubrawsky, 38). Thus, visitors often get privacy robbed via such ‘tracking cookies’. That is how their computers become hacked and their personal information misused by many. Illegal drug and chemical mafia has been using encrypted electronic media to communicate (Information, Communication & Society, 1). Hence, several bills have been presented before the Congress to retrieve this encrypted information for the national security means, as the security of state is integral than the privacy of few individuals. The key to decode such encrypted information is thus, a civil and humanistic right to the information possessor. Such encrypted information is mainly possessed by a firm or a contractor if he shares it with government then he violates the right of his clients, which is also a breach of law. Hence, it is an utmost priority of the law enforcement firms to responsibly obtain information, which could potentially lead to a threat and not to violate the confidentiality of an individual or organisation. Basic internet threat protection can be attained from firewall and anti- viruses. These software keep the privacy options of one’s PC high and do not let the pop-ups viruses and spywares to intrude or store information on one’s hard drive. The later changes the configuration of PC without the users consent. Therefore, it is much more detrimental than the former one (Caruso,1). Banks, Credit Card companies, Government agencies gather personal information of the client or public and store it in their database. Hence, this personal information given out to such firms can be exploited by the receiver. For instance, if an individual fills out a bank loan form he will insert all his personal information from family structure to preferences and potential worthy items (Liberti, 4057). However, this happens rarely, but information given out on World Wide Web is particularly detrimental for the donor. If such information is given out to a wrong or fraudulent source it can lead to maximum loss. It can all began from junk emails to pop up items and eventually it can lead to sharing/selling of personal information of an individual to different firms (Rezgur, Bouguettaya and Eltoweissy, 41). This sale mechanism of information is invented by telemarketers and through this strategy hackers are able to rob/abuse innocent internet users. One grave consequence of such invasion of confidentiality would be alerting government’s security agency and becoming suspicious in their records. Online sale and purchase is also not threat-free, if one uses his credit or debit card to do purchase, he will face a serious threat of being robbed unless he makes sure to take safety measures before hand. In such scenario where payment is required via online means third-party payment mode is the most secure option for the customers. In this way, one’s private bank and personal information cannot be retrieved and abused. People are normally theft online due to the reduced prices these websites offer for expensive items. Hence, one should never purchase or use its credit card details on a new unauthentic website, which is not at least six months old (Miyazaki and Fernandez, 28-29). Similarly, GPS system either in cars or in cellular phones can display the location of the user to a whole range of people. A facebook, popular social networking forum displays current location of the user to their friends list via bing map (Seffah and Homa, 135). Instagram is also a social media forum for photo and video sharing purposes, after a persistent protest from its users they had to revise their privacy policy. Now, they cannot just share their users’ data with any other social media networking, but require permit from the users beforehand. Previously, Instagram used to share or sell data to facbook and facebook sold it to advertisers and other firms hence, breaching the privacy of its users without their consent or knowledge. New Apps like Binjo mix, Imo.im, blender, tinder are worst form of privacy invader Apps. They completely eradicate the idea of privacy and security due to their very nature. These applications work along with a GPS system; hence, the user is displayed according to his location and full biography. According, to PEW research survey report on internet usage, 78% of teens in USA own a cell phone and 47% of them own a smart phone. 95% of teens are internet users (Madden, 1). Therefore, it is easy to lure stalkers via such technology and apps. The core idea here is handing over one’s personal information to different organisations for the sake of technological benefit. Thus, endangering oneself; voluntarily or involuntarily. Top of Form Bottom of Form The increased reliance on internet and its pessimistic affects on youth especially; has been an area of concern for the authorities. Therefore, latest detrimental evidence of increased internet usage among the teens is cyber bullying, which can lead to fatal consequences. Since, social media networking forums play efficient role in making the personal information public and at times keeping the anonymity of the user. Therefore, it is potentially the most dangerous form of network for the youth, where they get bullied by numerous people and without the authentic evidence of being bullied. In 2010, 97% of the teens used internet and other technological facilities like smart phones and others and 20-40% faced cyber bulling in some form (Tokunaga, 277). Cyber bullying is easy for the abusers as it leaves behind a virtual identity and almost no trail of them and affects the information holder (bullied) mentally tormented. Hence, making one’s personal life public on such platforms can lure abusers and hackers more swiftly. Recently, Americans have been condemning against President Geroge W.Bush approved law, which has enabled NASA via Foreign Intelligence Surveillance Law Act (FISA) to wiretap phone calls without the need of the warrant. Hence, NASA is out openly tracing and hearing every call Americans make (Smith, 9). This violation of privacy and civil liberty has caused insecurity on a wide scale, which has made Americans anxious for their personal privacy. This is the first case out in open for massive domestic spying in USA, but yet none concrete evidence is found against NASA. Up recently, there has been a recent debate over the Carrier IQ technology’s new app which is installed in the smart or android phones, Apple OS and Google’s Android too. This technology without the consent of the user saves information and cannot be disabled. According, to a former CIQ employee the software installed under such apps can store and locate the most confidential information of the user. Thus, allowing the software company to retrieve his call, message record along with his current location too (speed et al., 378). In the current era, Internet has become inevitable for people around the globe. Increased numbers of users have adapted a virtual lifestyle via it. Hence, the threats posed by the internet have more influence on one’s personal life then the real one. For example, one can get robbed via online shopping, can lose his personal information on a social media network or to a credit card company, can invite stalkers and potential dangerous people through public chat rooms and with the usage of dating apps. Thus, there are several ways in which advance technology is becoming detrimental more than beneficial. Increased reliance on technological tools like internet, gadgets and new revolutionary apps has made life easy, in terms of time and efficiency and complex; in terms of privacy and security. Thus, if one maintains balance in his usage of technology and does not erode his privacy by sharing all his personal details on social public forums he can secure his privacy to some extent. However, the hidden apps for the retrieval of user’s information, surveillance cameras for increased vigilance and wire tapping of the government agencies are beyond an individual’s control phenomena. Therefore, awareness of civil liberty rights is crucial for the people of this decade, as they need to protest in order to secure their privacy. Nonetheless, condemnation and awareness is indispensable when one is being constantly watched and monitored without any rational reason. Security and peace of mind is only obtained when one is free from the feeling of being watched otherwise, he faces anxiety and depression for being a suspect for unknown reasons. Works Cited: Top of Form Buchanan, William. The Complete Handbook of the Internet. Boston, Mass: Kluwer Academic Publishers, 2002. Print. Top of Form Dubrawsky, Ido. Eleventh Hour Security+: Exam Syo-201 Study Guide. Rockland, Mass: Syngress, 2009. Print. Top of Form Information, Communication & Society: Ics. London: Routledge, 1998. Print. Top of Form Caruso, Ronald D. "Inforad - Personal Computer Security - Part 1. Firewalls, Antivirus Software, and Internet Security Suites - Making a Personal Computer Secure and Protecting Pertinent Files and Transmitted Information Is Inconvenient but Necessary and Well Worth the Effort." Radiographics : a Review Publication of the Radiological Society of North America, Inc. 23.5 (2003): 1329. Print. Top of Form Liberti, J M, and A R. Mian. "Estimating the Effect of Hierarchies on Information Use."Review of Financial Studies. 22.10 (2009): 4057-4090. Print. Top of Form Miyazaki, Anthony D, And Ana Fernandez. "Consumer Perceptions of Privacy and Security Risks for Online Shopping." Journal of Consumer Affairs. 35.1 (2001): 27-44. Print. Top of Form Madden, Mary. Teens and Technology 2013. Washington, D.C: Pew Internet & American Life Project, 2005. Internet resource. [Accessed on 11/18/13] Bottom of Form Bottom of Form Bottom of Form Top of Form Rezgur, A, A Bouguettaya, and M.Y Eltoweissy. "Privacy on the Web: Facts, Challenges, and Solutions." Ieee Security & Privacy Magazine. 1.6 (2004): 40-49. Print. Top of Form Rex Smith, .Newsweek. New York, Volume 150 (2007). Print.Bottom of Form Top of Form Seffah, Ahmed, and Homa Javahery. Multiple User Interfaces: Cross-platform Applications and Context-Aware Interfaces. Hoboken, NJ: J. Wiley, 2004. Print. Top of Form Speed, Timothy, Darla Nykamp, Joseph Anderson, and Jaya Nampalli. Mobile Security: How to Secure, Privatize and Recover Your Devices. Birmingham: Packt Publishing, 2013. Print.Bottom of Form Bottom of Form Bottom of Form Bottom of Form Bottom of Form Bottom of Form Top of Form Tavani, Herman T. Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing. Hoboken, N.J: Wiley, 2011. Print. Top of Form Tokunaga, R.S. "Following You Home from School: a Critical Review and Synthesis of Research on Cyberbullying Victimization." Computers in Human Behavior. 26.3 (2010): 277-287. Print. Bottom of Form Bottom of Form Bottom of Form Top of Form Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The End of Privacy Research Paper Example | Topics and Well Written Essays - 1500 words”, n.d.)
The End of Privacy Research Paper Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/journalism-communication/1491989-the-end-of-privacy
(The End of Privacy Research Paper Example | Topics and Well Written Essays - 1500 Words)
The End of Privacy Research Paper Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/journalism-communication/1491989-the-end-of-privacy.
“The End of Privacy Research Paper Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/journalism-communication/1491989-the-end-of-privacy.
  • Cited: 0 times

CHECK THESE SAMPLES OF The End of Privacy

The Horror of a Dystopian Society

After a flurry of utopian fictions at the end of the nineteenth century, dystopian fiction became particularly prominent in the twentieth century, when suspicions of utopian solutions to political and social problems became increasingly strong as those problems grew more and more complicated and as events such as the rise of fascism in Europe seemed to cast doubt on the whole Western enlightenment....
8 Pages (2000 words) Essay

Effect of Technology on Workplace Privacy

y the end of the 21st century, the technology took a rapid progression and the workers continued to fall prey of the new development in technology affecting the workplace environment with regard to privacy and convenience.... hellip; This advancement in the field of technology, most particularly in the surveillance technology has had abounding effects on the extent of privacy granted to individuals at the workplace.... In this age where whole world has been contracted and turned into a global village, the issues and concerns relating to privacy are on the rise....
20 Pages (5000 words) Essay

The U.K Identity Cards Bill and its implcations

While the Bill and the stated objectives seem reasonable, and a large majority of the general public believe it to be good idea, there remains confusion and apprehension on the potential implications of the Bill to their privacy and civil liberties, not to mention the cost and policy implications.... Unlike other means of individual identification, the proposed use of biometric technologies utilising biological information, and the introduction of a computerised National Identity Register, which permits users to track anybody, anytime, anywhere, in the modern networked society, apparently present far-reaching implications on the privacy and security of the individual, as well as the society....
4 Pages (1000 words) Essay

Social Networking Sites: Revolutionized Politics

An author of the essay "Social Networking Sites: Revolutionized Politics" claims that social networking sites have been criticized as being ineffective in conducting political change as political activists form or join like-minded groups.... They do not foster any action.... nbsp;… Social networking sites are a place where individuals can state their opinions without reservation....
7 Pages (1750 words) Essay

Fluid Boundaries in Reality TV

Boundaries between the ordinary and extraordinary are always changing and shifting.... he aim of the paper is to answer the question "How does reality TV construct the boundary between the ordinary and extraordinary?... Reality TV creates a flexible and dynamic boundary,where the audience can hardly see the differences… Reality TV is supposed to be about “real” people and their “real” behaviours, but as the existence of the camera and the gaze of viewers and producers shape the “realities” of reality TV show participants, the “reality” of reality shows comes into question....
17 Pages (4250 words) Essay

Internet and Mobile Phones

Hence inquiries emerge regarding the manner in which these mobile users manage expectations, standards, and understand issues of privacy and surveillance when diffusing personal information on the Internet (Anderson, &Rainie, 2008).... This is a survey on people's perception of privacy and private information in the use of new technology.... The essay "Internet and Mobile Phones" seeks to explore the forms of surveillance facilitated by mobile phones and the Internet and discuss issues of control over personal information and privacy in these contexts....
5 Pages (1250 words) Essay

Privacy Bounded with Surveillance and Security

The paper "privacy Bounded with Surveillance and Security" highlights that surveillance devices such as CCTV are deployed in public places; that is why it would be somewhat illogical to demand privacy from a place that is attended by numerous people.... hellip; A person is being monitored by an incredible number of CCTV cameras, lots of other devices keep track of other information that is generated by an individual....
6 Pages (1500 words) Essay

Journalism, Mass Media and Communication

This paper also seeks to explore the various forms of surveillance facilitated by mobile phones and the Internet and discusses the issues of control over personal information and privacy in these contexts (Zhu & Zhou 2002).... Mobile phones form a very powerful tool for communication as well as internet access....
9 Pages (2250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us