StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

On Questions of Privacy in a Digital Age - Term Paper Example

Cite this document
Summary
The paper "On Questions of Privacy in a Digital Age" tells us about information and other personal data. Kindly include the times where there are prompts that ask if your personal data should be stored…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
On Questions of Privacy in a Digital Age
Read Text Preview

Extract of sample "On Questions of Privacy in a Digital Age"

On Questions of Privacy in a Digital Age In this digital age, information and other personal data can be easily accessed and stored. This can be seen by the amount of times spent on the net. Kindly include the times where there are prompts that ask if your personal data should be stored. Also, this includes the amount of people who uses their social networking accounts like Twitter and Facebook. These sites present one’s personal info, including emotions and other frustrations expressed and manifested by language and the way it is being used. Privacy, in the realm of computing, is an ethical concern (Moor 1997: 27). This is manifested on how machines that we encounter in daily activities like ATMs and supermarkets and such things store our data, which are not limited to personal but includes behavioral patterns determined through recorded choices (Moor 1997:27). This kind of phenomenon intrudes one’s privacy. In some cases, the data gathered through these channels can be used to oppress or tamper’s one’s right, not just privacy but extends to other rights innate to individual like due process and others. In dealing with complex issue of privacy, there is a need to look at in a theoretical perspective: ethical theory of privacy. Three – fold premises emerges: something vital and important to defend and something based on individual’s preference and the importance of privacy (Moor 1997:28). There is a need to be not confused on how these premises work. Having Moor as the point of departure, I shall project a more concise use and view of the term “privacy”. One thing to take into account is that privacy is an instrument for protection from harm, which could be an incursion of personal life that is no longer the scope of outside forces (Moor 1997:28). One example is HIV+ individuals whose medical information can be prejudiced, which can be a cause for non – selection in a profession or can face other forms of discrimination (Moors 1997:28). In this case, privacy accords individual safety to assure enjoyment of equal benefits like fair treatment in work place or any other things that should be enjoyed by everyone. Furthermore, privacy is a tool to build relationship to people (Moors 1997:28). In the case of building relationships, there are certain personal things that are kept private for the sake of assurance and acceptance. Sometimes, in intimate relationships, like marriages, privacy can be considered absence since trust is a condition to be met. There is a need to be open about one’s actions and decisions since it is shared. However, in the case of mutual relationships like that of boyfriends and girlfriends, privacy still has a role to play since there are things that must kept intact in order to forge an intimate relationship. This happens because some aspects of one’s private life may create a negative impression for the other. Inasmuch, projection of a certain mode of being or personality is also supported by privacy. This is undeniable due to the need to create an impression. At the same time, this kind of behavior still assures autonomy despite of the bond’s established between two persons (Moor 1997:28). Privacy then becomes a way to preserve one’s ideal personality or preferred personality. This is essential because privacy can be considered a need for an individual. It is a way to construct a personal space in order to move confidently and comfortably. In terms of the use of computers, or even the Internet, there should be primacy on one’s safety especially when it comes to personal information. It should not be shared nor even broadcasted to every single person, nor even have access to it. That way, there is an assurance of privacy to keep personal matters intact and free from judgments that can detrimentally affect an individual’s behavior and disposition when interacting with other people. However, there is also a crucial aspect of preference when it comes to the term privacy. In this case, an individual or even an institution can have the power to look on one’s personal, private data without the consent of the person being investigated or searched. In this case, there is a double standard because of the way privacy is defined by institutions. An individual may gain access to one’s record through the databases of the government like FBI and other agencies that store the data of citizens. However, there is a problem when it comes to accessing these data. Some people can easily gain an individual’s record, even if their things placed in the records have been resolved. Sometimes, these serve as ground for defamation and tarnishing one’s reputation. In relation to this, government agencies, like FBI, oftentimes use security as means to intervene one’s private personal life. Sometimes, the profiling becomes a method to hunt down individuals in cases of threats and problems. Despite the security measure, it sometimes become a tool to harm an individual due to malign accusations and false identification, which can put an individual on the spot of ridicule. Sometimes, public apologies are done to compensate for the damages towards the victim whose privacy has been intrude. However, these are considered not enough because the damage done is a scandal that can last long, creates a negative impression, alter the person’s disposition and stigmatize by the public despite of the clearance. In this case, privacy is dependent on how institutions insinuate the standards. Sometimes, the cultural phenomenon affects the standards on privacy. It can define the parameters of its scope and limitations. At the same time, it conditions how an individual can use privacy inasmuch as the institutions can violate and insert a conjunctive convention in order to assure the common good. To a certain extent, this is good. Nonetheless, caution must be exercised because the damages induced by such an intervention will do so much harm on the individual. One thing that must be taken into account is that privacy is an expression of the value of security but works on different paradigms, depending on how it is defined and enforced (Moor 1997: 29). Thus, privacy is devised in such a way where it is responsive to the standards of culture, which is malleable based on what happens in the society. In this digitized age, transparency becomes an additional condition or premise that clashes with privacy and security. This can be seen on how funding allocations are made to assure the public in the case of government institutions while private institutions have their own preferred privacy standard to assure their independence from the intrusion of the government since they are private entities (Moor 1997: 31). These can be seen on official newspapers and website to assure the public of trust by disclosing information pertinent to common of the general public. On the third level, there is a need to assess the importance of privacy and how it should be upheld on the grounds where the personal coincides with the socio – cultural. Privacy is not absolute on the part of the individual in the same way for the institutions. The question is not on whose is privacy deemed more important. However, the question should rest on where privacy is better upheld for both parties concerned. In the cases of digital technology, there is a need to streamline policies that can guarantee restricted access to stored data and in punishing those who malign, manipulate or use these data for interests that can harm others (Moor 1997: 32). This is important because there is a recognition of the privacy of the individual since there is now a mechanism to protect the personal data given / gathered from people. The way internet databases gathers data can now be monitored and can be suppressed if there are attempts to violate privacy. The way this can be done is through posing stringent measures to make sure that perpetrators of data misuse and manipulation are hounded. At the same time, the way policies be done should induce less harm and risk for all parties concerned (Moor 1997: 31). In this case, the notions of instrument and conditional regarding privacy is integrated. There is now a keen observation of the individual’s right to privacy, thereby, ensuring safety and protection for the one concerned. In the same way, the institutions that are the guardians of these individual’s privacy must also uphold it by protecting and implementing policies that can respond well to violations. Most of the time, there are violations. Even if such happen, one must still uphold the individual’s right and it is the institutions role to make sure no one becomes a victim of privacy intrusion. Inasmuch, the government must not even mess with the private data of the individuals under its jurisdiction. The preceding notion is important due to the fact that individual’s well – being is secured. However, if there will be attempts on the part of the government to access one’s individual data, even if the case is confidential, then the government or any institution who stores data, must fully justify why such an intrusion must occur. As long as it is for the safety of everyone, then it should be done. The risks are high. However, if resolutions come into play, it should be upheld and is geared towards the people who need to protect themselves. In the case of data and storage, there should be a concise manner on how the government can track down violators and perpetrators in order to be able to teach the people about how to deal with confidential and problematic situations like this. In this way, the one’s who violate are reprimanded via tracking systems. However, tracking here is not the usual manner of stalking but of upholding security in cases where there is someone whose privacy is already violated. Also, the grease information is protected even if it is stored or accessed. It should not be used for any purposes without the consent of the owner or the one who rightfully owns the data in question. That way, the concern of privacy is addressed. In the end, privacy will be intrinsic to every individual. Its value, importance and significant role in one’s life is inevitable. This is the only way one can really assure himself that he or she is safe from any intervention without due process. This is a means to hamper anyone who wishes harm towards someone. It is also a way for an individual to establish connections and relationships to people. What matters is that one’s projection of personality and need of security should not be controlled by society through means that can hamper freedom and safety like the Internet. However, the need for privacy and security is not just the responsibility of the civil society. The individuals have a role to play in by exercising caution whenever they use their data in whatever kind of transaction they encounter. That way, there is a conscious effort to assure privacy on the part of the individual as well. BIBLIOGRAPHY Moor, James. “Towards a Theory of Privacy in the Information Age.” Computers and Society. September (1997): 27 – 32. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“No more Privacy polices Term Paper Example | Topics and Well Written Essays - 1500 words - 1”, n.d.)
No more Privacy polices Term Paper Example | Topics and Well Written Essays - 1500 words - 1. Retrieved from https://studentshare.org/philosophy/1620125-no-more-privacy-polices
(No More Privacy Polices Term Paper Example | Topics and Well Written Essays - 1500 Words - 1)
No More Privacy Polices Term Paper Example | Topics and Well Written Essays - 1500 Words - 1. https://studentshare.org/philosophy/1620125-no-more-privacy-polices.
“No More Privacy Polices Term Paper Example | Topics and Well Written Essays - 1500 Words - 1”, n.d. https://studentshare.org/philosophy/1620125-no-more-privacy-polices.
  • Cited: 0 times

CHECK THESE SAMPLES OF On Questions of Privacy in a Digital Age

Marketing Research and Strategies

Today's digital age has revolutionized the field of research.... People thought that the digital revolution will only impact the products or services industry, but this notion is not true.... Even the field of research has been severely change by the digital revolution.... hellip; Internet, which is the most widely accessible digital vehicle, is the fundamental means by which digital revolution has brought changes in the field of research....
4 Pages (1000 words) Essay

Critical analysis assignment: PRIVACY

Name Mahmoud Elaradi Date 19/2/2013 0405461 Privacy: A Discussion of Definition and Legal Application For purposes of this brief analysis, this author will consider the identification of “privacy” as defined by James Moor in his article, “Towards A Theory of privacy in the Information Age”.... As the author notes, this issue has been further confused but the fact that technological revolutions have occurred within the past few decades which have served to complicate the means by which the courts and the law engages with the issue of personal privacy and privacy in general....
3 Pages (750 words) Essay

Summary of Digital Literacy

a sort of literacy typical for the digital age.... Siraj-Blatchford & Siraj-Blatchford (2000) position that since the early age children ought to be finding out as well as identifying the uses of ICT in everyday life.... This is a briefing paper which represents a summary of the practitioner's specialism – digital Literacy.... It explores the questions: “Is digital literacy more than just using a computer?... ?? Two other questions are: “Is digital literacy covered in enough depth in the setting?...
13 Pages (3250 words) Essay

The Communication Revolution, Entertainment, and The Arts

he setup of the internet creates questions of whether or not those who use it are really protected.... The cookies that websites place in the computer systems can be vehicles in meddling with personal privacy.... Luckily, both Houses agreed that this is a direct threat to personal privacy and the Total Information Awareness project was put into question (Clymer, 2003)....
8 Pages (2000 words) Essay

Citizen Journalism Reading Response: Newsgathering and Privacy

Therefore, the propensities to violate issues of privacy and secrecy are greater for those engaged in citizen journalism; which, at the extent of breaches of privacy and confidentiality that currently exists, happen predminantly in the digital media age.... The article entitled “Newsgathering and Privacy: Expanding Ethics Codes to Reflect Change in the Digital Media age” written by Ginny Whitehouse proffered pertinent issues relative to privacy and the role of responsible journalism in the light of digital conditions....
1 Pages (250 words) Essay

How Social Networks Are Invading Our Privacy

However, most people do not know… It is ironic and paradoxical how people upload sensitive information with hardly a thought of how other people are now able to access their personal details with ease and how the details This paper examines four articles that discuss the issue of social networking and invasion of privacy as a relevant issue today.... In his article that appeared in the American Quarterly in 1999, Rosenzweig argued that the digital revolution and the rise of the information superhighway has big implications on how people lived and worked....
7 Pages (1750 words) Essay

Global Internet Advertising

Advertising in a digital age: Best practices & tips for paid search and social media advertising.... Give your marketing a digital edge.... The first unanswered question is the issue of privacy concerns on then advertiser's side and the customer's side.... Social responsibility in the information age: Issues and controversies.... Linguistic and cultural online communication issues in the global age.... Global & digital....
2 Pages (500 words) Essay

Psychological Distress and Mental Health Problems With Respect to Healthcare Delivery in America

The interviewers confirmed the confidentiality and privacy of the information derived from the telephone survey to eligible respondents.... The paper "Psychological Distress and Mental Health Problems With Respect to Healthcare Delivery in America" will establish the socio-demographic characteristics of Americans suffering from psychological distress or Americans with a history of mental health issues....
6 Pages (1500 words) Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us