Preview

The Value of Digital Privacy in an Information Technology Age

Powerful Essays
Open Document
Open Document
1849 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Value of Digital Privacy in an Information Technology Age
Running head: The Value of Digital Privacy in an Information Technology Age 1

The Value of Digital Privacy in an Information Technology Age

Tara Brooks

Professor Bristow, J.D.

Law, Ethics and Corporate Governance, LEG 500

4 May 2012

Abstract
How many of us have paused during conversation in the past several years, suddenly aware that you might be eavesdropped on? Probably it was a phone conversation, although maybe it was an e-mail or instant-message exchange or a conversation in a public place. Maybe the topic was terrorism, or politics, or your church service. You pause suddenly, momentarily afraid that your words might be taken out of context, and then you laugh at your paranoia and go on. But your demeanor has changed, and your words are subtly altered. Privacy is a growing concern in the United States and around the world. As we increasingly use the Internet and the seemingly boundary less options for collecting, saving, sharing, and comparing information trigger consumer’s worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Privacy is very important-especially on the Internet. It is amazing how many websites are designed to reveal private details about people—actually it is a little scary. In this paper, I will be discussing different topics on the value of digital privacy. Keywords: privacy, personal information, digital privacy

1. List and describe at least three (3) technologies that allow an individual to research citizens’ private data.

The three technologies that allow an individual to research citizens’ private data are Bluetooth, GPS, and Google (Internet).



References: Halbert, T., & Ingulli, E. (2012). Law & ethics in the business environment (7th ed.). Mason, OH: South-Western Cengage Learning http://autos.aol.com/article/gps-thief-home-invasion/ http://www.ehow.com/list_6068148_bluetooth-advantages-disadvantages.html#ixzz1u3e6jVDc http://hassam.hubpages.com/hub/Types-Of-Bluetooth-Hacks-And-Its-Security-Issues http://techgyo.com/index.php/3-major-advantages-gps-tracking-system/#ixzz1u44hGdujsOME

You May Also Find These Documents Helpful

  • Good Essays

    The article “Visible Man” written by Peter Singer discusses the issues that are involved with the topic of privacy. Many people feel that they are comfortable with the actions they are taking but they do not realize the information they are putting out into the real world. Singer explains how government officials use cell phone providers to gain insight on certain individuals. The idea that is stressed in this article is that too much privacy is never good, especially with government officials because the confidential information that gets leaked informs society on what it going on behind the scenes. The more information one can gather about a topic, the more informed they will be; furthermore, being well educated on a topic will allow one…

    • 276 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Privacy is the state of being free from intrusion in one’s personal life, or so it used to be. In Simson Garfinkel’s article “Privacy Under Attack” he discusses how technology has invaded people’s privacies over the years and continues to do so. From telephone systems and mail to car computers and surveillance cameras.…

    • 760 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Everyone leaves personal digital tracks in systems whenever he or she make a purchase, takes a trip, uses a bank account, make a phone call, walks past a security camera, obtains a prescription, send or receives a package, files income tax forms, applies for a loan, e-mails a friend, sends a fax, rent a video, or engages in just about any other activity. The security camera increases the scope and nature of available data. Law-abiding citizens, criminal and terrorist leave extensive digital tracks. Gathering and analyzing electronic and behavioral information can play major roles in detecting and preventing terrorist…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    Privacy is perhaps one of the most personal issues in today’s society. Privacy is an intensely personal issue, and perhaps not only to the right of the individual to dress the way he or she desires, worship in any way he chooses, but also to expect that those rights be protected by the government that upholds them. At one point or another, every individual in our society has asked the question, “Is privacy in the 21st Century possible?” The answer lies in the exploration of what privacy really means, and what privacy issues society faces in today’s modern, informational, and digital age of what we call the 21st Century.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Kurlander speaks the truth when he says, “We walk Main Streets and drive thoroughfares that are monitored by cameras and speed passes. We work at computer terminals that allow our bosses to monitor our behavior and work productivity, and we use social media and search engines that can track our usage and establish personality profiles to sell and share.” (Kurlander). Today, technology that analyzes and records our personal preferences becomes increasingly popular. For example, Netflix provides suggestions to its users, and Facebook recommends friends that people have in common. Kurlander brings up, “We now also routinely spy on our families and one another too in our homes, businesses, and elsewhere, simply [by] clandestinely hiding spy cameras or affixing and monitoring GPS [global positioning system] monitors to phones, computers, vehicles or possessions.” (Kurlander). New and advanced security systems allow the owners to view footage from their micro-sized cameras. Today, average people are able to spy on each other because this surveillance technology is not only owned by the government but can also be privately…

    • 1263 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    least half of each discussion was spent in trying to narrow the gap in our collective…

    • 13321 Words
    • 54 Pages
    Good Essays
  • Good Essays

    In the book Technology and Society: Opposing Viewpoints, Joseph D’agnese discusses our loss of privacy on the internet: “. . .almost every move you make is catalogued in service to the gods of commerce. They know what you’re buying. What you listen to. Where you chat” (D’Agnese, 180). This has become very scary for our generation as our personal information can easily get out. Not enough privacy lowers our happiness level. We feel as if we are being controlled and watched.…

    • 1049 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Privacy Matters Analysis

    • 849 Words
    • 4 Pages

    citizen has the right of privacy when it comes to their houses, personal belongings, and documents, there is a loophole when it comes to information stored in databases. This is due to “the Fourth Amendment and technology [having] always had a volatile relationship” as stated in “Social Networks, Government Surveillance, and the Fourth Amendment Mosaic Theory” (Monu Bedi 2). In short, this article connects the lack of privacy in social networks to the loophole in the Fourth Amendment, and how the government uses that loophole (Monu Bedi’s, “Social Networks, Government Surveillance, and the Fourth Amendment”). But, this flaw in the system isn’t entirely the fault of our founding fathers. Part of the reason it is so difficult to enforce privacy is due to the tense relationship between the Supreme Court and privacy laws, which “The Supreme Court and Privacy Information” goes into detail about (F. Cate and B. Cate’s, “The Supreme Court and Privacy Information”). While “it [the Fourth Amendment] only prohibits ‘unreasonable’ searches and seizures,” the amendment “. . . is silent about what makes a search or seizure ‘unreasonable’” (F. Cate and B. Cate 261). Yes, there are many ways to cheat the “system” when it comes to finding out information of citizens of the United States. However, it’s not only the government that can access information and data without authorization, companies and third parties can as…

    • 849 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Privacy is a person’s right to control access to his or her personal information. Everybody value the protection of their personal information. No one wants to see some of their personal information made public, especially on the internet. However, the recent evolution of technology has started to threaten every individual’s privacy by reducing the amount of control that they had over their personal data and making it possible for people who do not have the proper authority to access them. According to Zalta (2014), the 21st century has become the century of Big Data and advanced Information Technology allows for the storage and processing of exabytes of data. The combination of increasing power of new technology and the declining clarity and agreement on privacy give…

    • 480 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The concept of living in a surveillance society with no fear as long as individuals have nothing to hide sounds ideal; but even if people are not guilty of committing a crime, there are a number of reasons why loss of privacy should concern them. A significant concern is that the…

    • 1755 Words
    • 8 Pages
    Good Essays
  • Better Essays

    There are many Americans that worry about the invasion of their privacy. An American’s privacy can be lost by- an IP address internet cookies, government surveillance cameras, and social networking sites. There are many ways Americans can control their privacy, but sometimes the invasion of privacy is out of their control. For example, computers save all of the American’s private information without their consent.…

    • 1379 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Farhan

    • 3202 Words
    • 13 Pages

    12. No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone had the right to the protection of the law against such interference or attacks.…

    • 3202 Words
    • 13 Pages
    Better Essays
  • Good Essays

    People use computers on a daily basis. They are a familiar modern convenience that employers and households are accustomed to. While they offer a wealth of services that make life much easier, many may not fully comprehend that paying bills, purchasing an item, or even applying for a job on the computer may put their privacy at risk.…

    • 800 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Mmc 4200 Exam 2

    • 3513 Words
    • 15 Pages

    Publication of a private matter that is: (1) highly offensive to a reasonable person, AND (2)is not of legitimate concern to the public.…

    • 3513 Words
    • 15 Pages
    Good Essays