Preview

The Value of Digital Privacy in an Information Technology Age

Better Essays
Open Document
Open Document
1280 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Value of Digital Privacy in an Information Technology Age
ASSIGNMENT 2:

THE VALUE OF DIGITAL PRIVACY
IN AN INFORMATION TECHNOLOGY AGE.

BY: JERMAINE WEST

1)

1) List and describe at least three (3) technologies that allow an individual to research citizens’ private data.

The first technology that is looked into is cloud computing. Cloud computing in
General is for anything that involves delivering hosted services over the internet. These services are broadly divided into three categories: Infrastructure-as-a Service (IaaS), Platforn-as-a Service (Paas) and Software-as-a Service (SaaS). The name cloud computing was inspired by the cloud symbol that’s often used to represent the internet flowcharts and diagrams. (Search Cloud Computing by Margaret Rouse: Dec 2010) A second form of technology that has been around is Facial Recognition technology. Facial recognition has been around for three decades. But mobile and social revolutions are rapidly driving the field forward, as digital photos proliferate, cloud computing powers accelerate and software capabilities advance. Tech giants including Google, Apple, Microsoft, and Yahoo also employ facial recognition technology in photo, video and gaming products, as do a handful of lesser known mobile application companies. Facial recognition is a computer application for automatically identifying of verifying a person from digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features rom the image and a facial database. The third form of technology that is being used is called Detective Mode. The Federal Trade Commission (FTC) said “a software company called DesignWare sold a 2)

Program that helped rent-to-own stores track and recover rented computers. The software contained a program known as “Detective Mode” that tracked renter locations and collected payments from them if the computer was not returned”, the FTC said.
The program could log



References: Search Cloud Computing by Margaret Rouse: Copyright Dec 2010 Information Commissioner’s Office (ICO) Website, What Security Measures Should I take To Protect the Personal Data I Hold? Opposing Views Website Patriot Act: Pros and Cons By: Alex Groberman copyright May 30, 2011 EPIC. Org (Electronic Privacy Information Center)

You May Also Find These Documents Helpful

  • Better Essays

    Spyware

    • 2042 Words
    • 9 Pages

    Spy-ware is a program that is inadvertently installed on the user’s computer without their knowledge the program covertly obtains data from the computer and transmits it to another. Spy-ware can track the websites that the user visits, collect information on the user’s clicks, gather keystrokes and obtain sign in and passwords. Spy-ware can be of a conspicuous nature where the user is somewhat aware of; additional pop-up advertising, slowing down of computer processing, and computer setting changes. The most concerning type of spy-ware has traits that are…

    • 2042 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    Everyone leaves personal digital tracks in systems whenever he or she make a purchase, takes a trip, uses a bank account, make a phone call, walks past a security camera, obtains a prescription, send or receives a package, files income tax forms, applies for a loan, e-mails a friend, sends a fax, rent a video, or engages in just about any other activity. The security camera increases the scope and nature of available data. Law-abiding citizens, criminal and terrorist leave extensive digital tracks. Gathering and analyzing electronic and behavioral information can play major roles in detecting and preventing terrorist…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cloud computing is a general term for anything that involves delivering hosted services over the Internet (Jo Maitland, Executive Editor of Search Cloud Computing, 2010). No doubt 2010 has been a big year for cloud computing. Businesses are making the move to cloud computing to reduce costs, increase productivity and simplify IT. The on-demand, scalable, affordable IT infrastructure services provided by different vendors is driving a need to respond more quickly to changing business demands.…

    • 920 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Cloud Computing

    • 1296 Words
    • 6 Pages

    The world is turning to cloud computing to manage data. Businesses are at the forefront of this new trend with companies such as Google, Amazon, Microsoft, and others leading the way by providing these services. What exactly is cloud computing? According to Turban & Volonino (2011), cloud computing is Internet- based computing in which shared resources (such as hard drives for storage) and software apps are provided to computers and other devices on- demand (p. 48).…

    • 1296 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Privacy is a fundamental moral right in a democratic society. It is the right bestowed upon individuals that strengthen the freedoms of speech, press, association, and assembly which are crucial for a free, democratic society. However, advancement in technology threatens privacy and autonomy which reduces the control over private data and exposes individuals to undesirable consequences. Thus, a loss of privacy leads to a loss of an individual’s freedom in society.…

    • 1755 Words
    • 8 Pages
    Good Essays
  • Good Essays

    7) If you store personal information you must register with the Information Commissioners Office (ICO).…

    • 1331 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    E-Commerce Ch 1 Review

    • 536 Words
    • 3 Pages

    The handheld devices, including mobile telephones and tablet computer. RFID devices and smart cards are being combined with biometric technologies, such as fingerprint readers, and retina scanners…

    • 536 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The Importance Of Privacy

    • 637 Words
    • 3 Pages

    Has anyone ever look through your belonging without asking and thought it was moral? Having privacy is a huge problem in our society too many individuals and celebrity.Without Privacy, anyone could invade your life by stealing your identity and personal records. In the first amendment, The bill of rights says that everyone should have their right of privacy no matter what. Privacy is having freedom way from others. "Individuals who live in a civil country or state deserve their right to privacy under any condition even though they are a celebrity because…

    • 637 Words
    • 3 Pages
    Good Essays
  • Good Essays

    No wonder every invention has its own advantages and disadvantages. Likewise Information technology has also its own advantages along with its disadvantages. Information technology has surprise the world. It has made the world global where communication and networking from one end of the world to other end is easy and fast. It has brought together the friends and family living in different parts of the world. It has change the leaving style of the people. The era before the invention of information technology and after the invention of IT is totally different. Television, cell phone, laptop, desktop, tablet, has become peoples necessity. The social networking websites, twitter and other internet-based tools are changing the way of people sharing personal information, political views and commercial purposes.…

    • 519 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unsanctioned Intrusion

    • 337 Words
    • 2 Pages

    The topic of a citizens' right to privacy or expectation of privacy has been debated and tested since the drafting of the US Constitution. The common and broad understanding of the term defines it as "freedom from observation". The information security professional is concerned with a narrower area of the law that can be defined as "freedom from unsanctioned intrusion". Specific areas of interest to the information security professional involve access to personal information, online privacy, and the right of publicity.…

    • 337 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Privacy in a Modern Age:

    • 969 Words
    • 4 Pages

    Changes in technology over the last twenty years has created many wonderful opportunities for the human race to enhance our abilities to communicate with each other, conduct business, and educate ourselves. Through the rapid transfer of information, the human race is reaping great benefits, such as better medical care, weather forecasting and even disaster response. Unfortunately, because the transfer of information has become so effortless, people have also found themselves in precarious positions when it comes to maintaining their privacy when using these technologies. Although the rewards of this new information age are endless, often, privacy may be taken for granted. Students may not realize the implications of this laissez–faire attitude towards privacy until their privacy has been breached. It is only then students realize their privacy is a right and not a privilege. The essay’s printed in The Essay Connection 10th Edition by Lynn Z. Bloom “How computers change the way we think”, Sherry Turkle, “The Paradox”, Tim Stobierski, and “Faux Friendship”, William Deresiewicz, all explore several negative issues that have arisen from the increased use of these new technologies.…

    • 969 Words
    • 4 Pages
    Good Essays
  • Good Essays

    kiosk

    • 3085 Words
    • 10 Pages

    Currently, Information and Communication Technology is being part of businesses, institutions and individuals. It brings great change and ease management to get the information that will more systematic and efficient. Most of the company used new technologies like finger scanner to make them ease to monitor and compute the number of days worked per employee. Some of the big company used new technology for their security; they used magnetic card or biometric scanner to enter in the restricted area of the company.…

    • 3085 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Information Systems Review

    • 2555 Words
    • 11 Pages

    * Advances in data analysis techniques: companies can analyze vast quantities of data gathered on individuals for: profiling (combing data from multiple sources to get more info on a person) & nonobvious relationship awareness NORA (combing data from multiples sources to find obscure hidden connections that could help identify criminals or terrorists)…

    • 2555 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Latest Inventions

    • 265 Words
    • 2 Pages

    By taking advantage of analytical software, the latest invention from the Japanese researchers can detect more sophisticated behavior. Thus it will be able to match models of common movements. Philip Sugai says that if, for instance, the KDDI mobile phone is attached to a cleaning worker's waist, it will be possible to tell the difference between such activities as walking, sweeping and emptying a rubbish bin.…

    • 265 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A Week Without Internet?

    • 559 Words
    • 3 Pages

    We are living in a very exciting age. Technology surrounds us and is a central part of our work, education, and home life. Now, more than ever, we rely on advancing technologies to help…

    • 559 Words
    • 3 Pages
    Good Essays