Preview

Invasion Privacy by Technology

Good Essays
Open Document
Open Document
800 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Invasion Privacy by Technology
Word Count - 766
The Diminishing Privacy by Technology People use computers on a daily basis. They are a familiar modern convenience that employers and households are accustomed to. While they offer a wealth of services that make life much easier, many may not fully comprehend that paying bills, purchasing an item, or even applying for a job on the computer may put their privacy at risk. Numerous hours are spent online everyday to shop, send emails, pay bills, download music, and the list goes on and on. Social networking sites are another internet obsession. They allow one to post and view what is going on in the lives of friends and family. It also allows others to watch and be aware that houses are vacant or someone is alone. Publicly posting this information makes for easy prey and many may not realize their safety is at risk. Often time people are cautious about what type of identifying information they provide online. Although numerous sites request information such as an address, Social Security number, or date of birth, many are reluctant to provide such information. According to a survey sponsored by TRUSTe, executive director Susan Scott indicated that, “41 percent of respondents would quit a Web page rather than reveal any personal information about themselves” (442). Is it the “s” at the end of http in the browser that gives reassurance that it is safe to provide a Social Security number and any other personal identification needed to apply for that credit card or loan? Even though the information is supposed to be secure, it may be captured and used by more than just the lender. Others may gain access to the personal information that was provided using it for their benefit and causing an adverse effect on someone else. When this occurs, it is known as identity theft. Take a situation where a debit/credit card to a checking account was used to make a purchase online. Eventually that card is cancelled and a new card is issued to the



Cited: Quittner, Joshua. “Invasion of Privacy.” Writing in the Disciplines. Ed. Mary Lynch Kennedy and William J. Kennedy. Upper Saddle River, NJ: Pearson Prentice Hall, 2008, 609-615.

You May Also Find These Documents Helpful

  • Good Essays

    These days, the internet has become the center of livelihood for countless people around the world. As we continue down this path of interconnectivity throughout our businesses, educational institutions, and home life, we are leaving trails of information wherever the internet superhighway takes us. That trail of information, or web cookie, is utilized by companies to help track usage in an attempt to tailor your visits to their webpages. With those crumbs of information being stored, privacy ultimately becomes a concern but is often an afterthought. What are these companies discovering about us and what other entity could be applying this data toward less-than-noble causes? How does one react to the possibility of having one’s personally identifiable information stolen? I analyzed two…

    • 794 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The year is 2010, the era is the 21st century; and we, citizens of the world, are living in the Information Age. Our information is made available on the Internet where it can be viewed by millions. The days where our data was recorded on scraps of paper and left in a box in an office along with thousands of other registers are long gone. Our personal data is permanently recorded in the hard drives of computers where they can be analysed and exploited by anyone with access to that computer; or worse, identity thieves and hackers may get their hands on the data.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Munchausen syndrome by proxy, MSBP, is a covert form of child abuse in which a parent or guardian, usually the mother, systematically fabricates or induces illness in her child. It proves a difficult syndrome to diagnose because the caretakers of these children are masters of deception. They thrive on deceiving medical and mental health professionals and revel in the attention received (Quisenberry).…

    • 842 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Gasser, Urs. "Recoding Privacy Law: Reflections On The Future Relationship Among Law, Technology, And Privacy." Harvard Law Review 130.2 (2016): 61-70. Academic Search Premier. Web. 5 Feb. 2017.…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Indeed, the Digital age has been considered as one of the greatest development of the world today. It has brought different benefits to the lives of people and catered all their needs and wants. As the world gets into crave for things that are “quick and easy”, the Digital Age had posed threat to people’s privacy and security (Meeks, 2000). The advancement in new technologies and gadgets should not only be considered as something good that came into people’s lives but also danger in the privacy of their personal information. Loss of privacy is the most inevitable risk that these technologies have brought to mankind.…

    • 1263 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Invasion of Privacy

    • 510 Words
    • 2 Pages

    In this case Dharun Ravi, a college student at Rutgers University was accused and charged for knowingly filming and outing his gay roommate, Tyler Clementi, having a sexual encounter with his boyfriend on multiple occasions. The video footage was being broadcasted live to students who Ravi told about it. He set up a camera and used iChat to get the footage. He would tell students when to tune in through his twitter account. This being said Ravi’s roommate saw the tweets about himself and it caused him to later commit suicide. He was so devastated and humiliated from this that he jumped off of the George Washington Bridge.…

    • 510 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Invasion of privacy

    • 1636 Words
    • 7 Pages

    Living in an era of increasing technology has made it much easier for a government to spy on its citizens. This paper seeks to examine why the United States government should not spy on its citizens with the use of the Patriot Act. Firstly, the United States citizens will believe that their liberties and freedoms are in jeopardy. Secondly, the government spends exorbitant amounts of money on a yearly basis to spy on its own people. Moreover, where is that money coming from? Lastly, the government risks social retaliation from its people in the forms of protests, lobbying, campaigns, and perhaps even violence When U.S. citizens feel their liberties and freedoms are being tested or at-risk of being lost, they will do what they can retain them.…

    • 1636 Words
    • 7 Pages
    Better Essays
  • Better Essays

    As Americans, we exercise the right to choose, including the right to choose what we share online and how we share it. Although there is no centralized formal legislation protecting data privacy around the world, there are some checks and balances which regulate the dissemination of publicly available data. Living in the digital age we currently live in, anything we put on the internet is almost always accessible to anyone at any time. Anytime we access something via the internet, whether it be an email software, social media platform, or simply browsing the internet, our data is collected and stored with algorithms. However, under the United States Privacy Act of 1974 with regards to information disclosure to third parties, “No agency shall…

    • 1196 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Carolan, E. (2012). Surveillance and the individual 's expectation of privacy under the fourth amendment. Retrieved from http://dx.doi.org/10.2139/ssrn.2178986…

    • 2210 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Coates, Nicholas "The privacy crackdown." News Media & the Law (2007) Academic Search Premier. EBSCO. Web. 21 Sept. 2013.…

    • 626 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Privacy is a basic right that is appreciated by everyone who has it, regardless of location, background, or even political and religious beliefs. Some people think that it is more important to protect the common good by allowing the government to spy and track as they wish and prevent crime from happening. However, many others think that the government should not have this right to invade privacy using technology. The 4th amendment guarantees safety from searches and seizures. Also, the Constitution states that we should be secure in our own country meaning we shouldn’t have to worry about invasiveness from our own government. There are many forms of spyware, trackers, recorders, etcetera that can be used to invade privacy. They can do this by watching what one does online, tracking one’s vehicle movement, and using X-Rays at airports to look for hidden under clothing. The government should not be able to use technology to invade the privacy of citizens in order to prevent crime because it violates the Constitution, citizens should be able to live free from excess government interference, and technology is often inconsistent.…

    • 736 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Invasion of Privacy

    • 1063 Words
    • 5 Pages

    While straightening your teenager's room, a book falls on the floor. You pick it up and see that it is her diary. As a parent, do you have the right to read it? Would it matter if you found the diary outside her room? Is it okay to read the diary if you suspect there is problem your teen is not telling you about? As a child, did you ever go into your parent's room (without permission) and snoop around? Was that an "invasion of their privacy"? Did you find anything you weren't supposed to? Did you learn from it? Did you tell them? You have every right to read your child's diary whether it's found in the laundry or their bedroom. There is nothing wrong with knowing what your child is thinking, the changes that they are experiencing, or perhaps any troubling matters they don't feel they can approach one of their parents with. Consider yourself lucky you found it. Invasion of privacy? I don't think so; it could save their life.…

    • 1063 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Privacy can be generally broken down into three categories - physical, organizational and informational (Wikipedia, the Free Encyclopedia, 2008). Possessing privacy is not just about preventing "intrusions into one's physical space or solitude” (Smith, 1994). Instead, rapid advances in technology have propelled the safeguarding of privacy to the next level.…

    • 1111 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Since September 11, 2001, the United States of America will always watch its back for terrorist attacks. Ever since that September day, we have increased our security in our airports and created Homeland Security. Some people feel the NSA, National Security Agency, has gone too far with its surveillance in protecting our country and people from attacks. Some say that they have not done enough to protect us. I feel there are some things the NSA should absolutely do, and then there are others I feel do invade people’s privacy. But do we really have privacy as it is? Anyone can hack into our computers, phones, bank accounts, and more as long as they have the brains to do it. I’m not completely against the government watching what we are doing,…

    • 1214 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Contemporary information systems technology, including internet technologies, challenges traditional regimens for protecting individual privacy and intellectual property. Data storage and data analysis technology enables companies to easily gather personal data about individuals from many different sources and analyze these data to create detailed electronic profiles about individuals and their behaviors. Data flowing over the Internet can be monitored at many points. The activities of website visitors can be closely tracked using cookies and other web monitoring tools. Not all websites have strong privacy protection policies, and they do not always allow for informed consent regarding the use of personal information.…

    • 385 Words
    • 2 Pages
    Good Essays