Privacy and surveillance in the Information Age - Essay Example

Comments (0) Cite this document
While technology has been there since prehistoric times, today the term technology is used to refer to ICT. Communication technology has also a long history beginning with inscriptions on the walls of caves to the…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
Privacy and surveillance in the Information Age
Read TextPreview

Extract of sample "Privacy and surveillance in the Information Age"

Download file to see previous pages According to Nissenbaum (1998, p.4), information technology has not only affected communication, but has actually led to a need to redefine privacy. With increasing surveillance and information recording, personal privacy is taking a new direction. According to Nock (1993) the cost of surveillance is personal privacy and the American public has to trade between privacy and security.
The biggest turn in information technology came at about the mid of 20th century with the invention of the electronic computer. As soon as the computer was invented, it was used by governments and large corporations for information capture, storage and analysis. Information technology did not only help in increasing the way information is captured and stored, but also in the way the same information can be analyzed as well as manipulated (Hughes, 2004, p.78). As a result, the role of the government and private corporations can in safeguarding information has increased and has also taken a new course. Information stored in computes is easier to disseminate and can be accessed from remote access points. This leads to the risk of losing this information to hackers and this can lead to private information being disseminated by unauthorized personnel.
Information and communication technology has changed the way people communicate and carry out their daily social, political and economic activities. With the arrival of computers and the internet, communication has always increased, and people are today better able to communicate. Business transactions have taken a new route as private firms can now easily capture, analyze and disseminate different formats of communication and information. A good example of this is the US based international retail giant Wal-Mart. Wal-Mart has been able to develop a system based in computers and wide area network that is able to capture information from all the retail stores and then sending this information to a central database where the ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Privacy and surveillance in the Information Age Essay”, n.d.)
Retrieved from
(Privacy and Surveillance in the Information Age Essay)
“Privacy and Surveillance in the Information Age Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Privacy and surveillance in the Information Age


... The report demonstrates a typical surveillance system for an organization, in order to protect the critical information assets from physical theft, unauthorized access, and natural disasters. Consideration is given to IP camera based surveillance systems, biometric systems for attendance and logging employee activity, Intrusion Detection systems for advanced security and enforcing access policies by active directory. Introduction Due to recurrent technological developments, information and communication technology frequently diverts in new dimensions. The research and development in the context of information and communication technology is very effective. Moreover, the new and advanced form of technology has also facilitated... ...
8 Pages(2000 words)Assignment

The Value of Digital Privacy in an Information Technology Age

...? The Value of Digital Privacy in an Information Technology Age & Introduction Technology has brought many conveniences to society. Unlike years ago, people can now communicate with each other in less than a second. Paper documents have been greatly reduced because everything is stored electronically in databases. As such, access to information is readily available to anyone with a click of a mouse. This ease of acquiring data, however, has come with a price. Hand-in-hand with the applause for the convenience of getting information is the clamor for stricter privacy laws. Netizens, a term coined for active users of the Internet (Netizen),...
6 Pages(1500 words)Research Paper

The Value of Digital Privacy in an Information Technology Age

...? The Value of Digital Privacy in an Information Technology Age Affiliation with more information about affiliation, research grants, conflict of interest and how to contact 1. List and describe at least three (3) technologies that allow an individual to research citizen’s private data. a. is one of the technologies that helps people to search for relatives, associates, colleagues and every other person living in the United States. An individual can send information or message to anyone using this website. “One of the sites that are hosted by Intelius is Date Check.   This stores numerous reports including names, addresses, birth dates, court...
4 Pages(1000 words)Research Paper

Information privacy

...?Who Should Have Access to Justin Ellsworth's Emails? For the most part, the internet has offered people unbridled privacy when it comes to person toperson or personal communication. Letters that used to be sent via postal mail and could be tampered with by people who had either honest or dishonest interests in the documents that a person received were now a thing of the past. Electronic mail became the keyword for instant communication exchanges. The email password was the key with which the owner of the account can unlock his mailbox. Without the password, nobody could gain access to his mail. That was the privacy assurance given by email companies such as Gmail, Hotmail, and Yahoo. However, of the 3...
3 Pages(750 words)Coursework

The Value of Digital Privacy in an Information Technology Age

...This paper talks about the importance of digital privacy, and the various laws that affect it. It discusses about the advantages and disadvantages of the public access to an individual’s private information and the measures that citizens should take in order to protect their privacy in regard to information dissemination. This paper gives an example of a federal privacy law that allows the government an access to any private information of an individual. It also identifies electronic laws that protect people privacy, and their effectiveness. The three technologies that allow individuals to research on a person’s private information are (Keizer, 2012); Biometrics Cloud computing. RFID tags. The cloud computing technology involves... their...
5 Pages(1250 words)Essay

Privacy and Surveillance in the Digital Age

...and Privacy Act was sent to legislation for approval, however the bill was ostensibly rejected by Congressman, the legislator was then shot dead by National Security Agency, however the footage of the Congressman murder was recorded by photographer. The photographer is then traced while he was exchanging this information through telephone; he was then traced however he managed to protect the evidence from the National Security Department. The evidence landed in the shopping bag of the lawyer Dean. The epic moves around the attempts by National Security Agency officials to retrieve the evidence from the lawyer Dean; who is equally innovative and cautious about his security and has bugs installed at his...
3 Pages(750 words)Movie Review

Surveillance and Privacy

...Abstract The Fourth Amendment protects people against unreasonable searches and seizures but what officers can discover through their ordinary senses in public areas such as streets and parks is of another issue. This paper briefly discusses how surveillance, which is being employed as part of police search to get personal information and evidence have countered the issue of privacy. Moreover, it discusses how innovation of technology can alter or distort the information gathering and how a person is affected through warrantless spying. Thus, it will show how surveillance and privacy conflicts to one another while maintaining the essence...
2 Pages(500 words)Research Paper

: The Value of Digital Privacy in an Information Technology Age

...the privacy of communication. The people of America should determine the necessary amount of surveillance. Question5 The Electronic Communications Privacy Act (ECPA) provides several prohibitions complemented by law enforcement omissions that work under the supervision of the judiciary. This focus on wiretapping, application of devices for tracking, and electronic communication records access. The act compels orders by the court before conducting surveillance. Furthermore, it minimizes the dissemination and use of intercepted information. Despite the presence of electronic laws, personal privacy is still infringed upon by organizations...
3 Pages(750 words)Assignment

Information Privacy and Electronic Privacy

... Frameworks and Solutions. London: IGI Global Snippet. Gellman, R. and Dixon, P. (2011). Online Privacy: A Reference Handbook: New York: ABC- CLIO. Noorda, C. and Hanloser, S. (2011). E-discovery and Data Privacy: A Practical Guide. Massachusetts: Kluwer Law International. Solove, D. (2004). The Digital Person: Technology and Privacy in the Information Age. New York: NYU Press. Stevens, G. and Doyle, C. (2005). Privacy: Wiretapping and Electronic Eavesdropping. New York: Nova Publishers.... Information and Electronic Privacy Affiliation: Distinguish between information privacy and electronic privacy Introduction Information...
3 Pages(750 words)Essay

Privacy, Surveillance and Security

...of behaviour, the probability that they may use this information for purposes that bring negative consequences still exists (Rule 1973, p. 256). In addition to that, the information in question might even be stolen by criminals which will put lives of the people in great danger. Finally, one might conclude that with the fast use of surveillance devices ended the era of exclusive close societies and privacy in terms of social gathering. Thus, even though a group of people is able to close the doors and windows and have a private conversation behind them, they way they arrived to the place has already been caught by the cameras so the privacy of the...
6 Pages(1500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Privacy and surveillance in the Information Age for FREE!

Contact Us