Thursday, May 7, 2020
Essay on We Must Strive to Protect Privacy in Technology
We Must Strive to Protect Privacy in Technology Technology is getting more and more complex as the years come and go. The availability of personal information is easier to access and the risk of it being tampered with is also high. As the years pass, the threat of privacy invasion gets greater and greater and easier to happen. There are several ways that privacy is able to be invaded and there will only be more to come. Americans have had their personal information given away without even knowing it. From dozens of public and private sources that have created consumer profiles, ââ¬Å"the average American is profiled in up to 150 commercial databasesâ⬠(Hinds 7). People are trying to ââ¬Å"prohibit collection of personal information on theâ⬠¦show more contentâ⬠¦Ã¢â¬Å"In countless offices, employers can monitor telephone calls, peruse email messages, and even retrieve supposedly ââ¬Ëdeletedââ¬â¢ files without an employeeââ¬â¢s knowledgeâ⬠(Brin 56). There is nothing the employees can do about this if they never know it is even happening. New technology has been invading organizations as well. The workers of the organizations are also at a high risk. ââ¬Å"Technology enhances the ability of organizations to monitor individualsâ⬠and what they do on the job (Regan 2). If they do something on the computer or phone, the possibility of someone else knowing is always there. With this problem growing, it makes workers feel uncomfortable and unsafe with every move they make. In order to feel safer about using a computer, there are some precautions that may be taken to prevent any potential hacking or privacy invasion. Firewalls may be set up to ââ¬Å"prevent any unauthorized access to or from a network.â⬠For a wireless network, Wired Equivalent Privacy (WEP) would be used to avoid hackers. An implement that hackers use to infiltrate a network is called SATAN. It is a ââ¬Å"Security Administrator Tool for Analyzing Networks.â⬠It was initially created to allow administrators to find any vulnerability in a system. Hackers have used this to look at important files and documents that are confidential (webopedia). As time goes on, so will the movement toward protecting privacy from technology. There will always be hackers that findShow MoreRelatedMobile Phones And The Advancements Of Modern Day1333 Words à |à 6 PagesThe expanding use of cellular phones and the advancements of modern-day technology are leading the way for a broadening perspective and interpretation of our Fourth Amendment right. Modern technology, such as cellular phones, challenge the standards of an individual s right to privacy as set forth in our Bill of Rights, Amendment No. 4. The conduct of illegal search s and or seizures became more prevalent with the introduction of the cellphone, thus demanding the Supreme Court revisits our FourthRead MoreAnalyzing The Past, Present And Future Of The Congressional Attempt At The Health Care Reform1704 Words à |à 7 Pagescongress was the Health Security Act in 1993, which was not enacted until June 2014. The Health Security Act started the foundation for patient privacy and th e security of an individualââ¬â¢s health information. As the years passed the Health Security Act became quickly outdated and needed to be updated to complement the sudden progression of current technology advances. Congress was presented the Kennedy-Kassebaum Act, which defined patient rights and the responsibilities of medical professionals to provideRead MoreTerrorism: Safety vs Privicy1594 Words à |à 7 PagesEver since 9-11, we as a country have been divided on many issues. One of the most discussed considers the question of whether retaining our privacy is more important than ensuring our safety. The two texts I will be using to explore this question are: Mobile Phone Tracking Scrutinized by Nikki Swartz Published in the Information Journal, which bills itââ¬â¢s self as ââ¬Å"the leading source of information on topics central to the management of records and information worldwideâ⬠(347), in March/April 2006Read MoreCloud Computing And The Protection Of Intelle ctual Property1361 Words à |à 6 PagesTrust in Cloud Computing Cloud computing has a duty to protect data privacy and some countries are going to great measures to further ensure that their data is kept within their national borders (Trend Micro, 2013). It has been suggested that new ethics frameworks are necessary in order to instill trust in the industry based on known parameters that include â⬠¢ the use of critical equipment, â⬠¢ management of critical data, â⬠¢ respect for privacy, â⬠¢ security and longevity of information, â⬠¢ And theRead MoreThe Case Of Ftc V. Wyndham Worldwide Corp1403 Words à |à 6 Pagesresponsible for upholding the highest security standards and protecting consumer information. As Christians, we are called to not only look after our own interests, but also the interests of others (Phillipians 2:4, NIV). I will examine the holding of this case to determine how business managers can best steward the information of customers and employees to look after their best interests and protect them from harm. In the case of FTC v. Wyndham Worldwide Corp., the FTC alleged that, ââ¬Å"at least sinceRead MoreCyber Security and Privacy Techniques.1675 Words à |à 7 PagesCyber Security and Privacy Techniques Tammy Sublett Harrison College Cybercrime Thomas Hart 12/05/12 In today society almost everyone has some form of computer or phone with internet capacity that are exposed to hackers and those that wish to interrupt the cyber world. It is imperative that we all become better educated to the risks and pitfalls that go along with accessing cyber space from any kind of device with access to the world-wide web. Be it by cell device, laptop, notebook, or homeRead MoreNsa Should Be Stopped. Nsa1177 Words à |à 5 Pagesinitially intended to protect the USA by tethering through technology devices to attempt to pick up any suspicious activities. The problem is that many feel as if the NSA has no right to evade their privacy. The NSA should be penalize every time they do so, or should have some type of warrant, but only for last resort, or stopped completely. There are many other ways to go about finding troublesome threats like antagonist programs like CDT as I mentioned earlier. Having your privacy tampered with isnââ¬â¢tRead MoreWhat A Cio Should D o993 Words à |à 4 Pagesdiscussion where we were tasked to consider what a CIO should do, I was keenly aware of how our own perspectives were such a large part of how we phrased our responses. Regardless of the topic, thinking from the consumer perspective is different from the business or information technology perspective. In this class, it has become apparent that information technology has its own perspective and set of ethics. In this class, we tried to apply traditional ethics to the uses of information technology, but oftenRead MoreThe Code Of Ethics For Habana Care Dental1170 Words à |à 5 Pageswork unsupervised. I would have my own private practice with a collaborative agreement with a dentist. Patients will be referred to the dentist have further dental care. Code of Ethics: Mission Statement: Habana Care Dental is an institution that strives for the excellence in oral health care. Valuable professionals offer a carefully and individual treatment to all of our patients without any distinction or discrimination. Our priority is to bring back health to our patients and a beautiful smileRead MoreThe Positive And Negative Effects Of Privacy And Social Media1518 Words à |à 7 PagesThe Oxford dictionary defines Privacy as the state or condition of being free from being observed or disturbed by other people (2017). It should not come as a surprise that websites designed to share pictures, ideas, and what is for dinner, leave individuals feeling that their privacy has been invaded. It is also not surprising that some people are oblivious to the effects of what they post online. It is safe to say the loss of privacy can be self-imposed for societies need to collaborate and socialized
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.