Does Technology Invade Our Privacy? Paper Example

Paper Type:  Research paper
Pages:  6
Wordcount:  1633 Words
Date:  2022-12-06

Introduction

Privacy is a universal need for all humans. However, to some extent, too much privacy incur boredom in a normal life thus question the actual need for confidentiality and calling upon the constitutional reformers to be in a dilemma of what privacy means. As much as people yearn to have their own time to do their pieces of stuff, life cannot be enjoyable whenever there are devoid doors. Again, people would wish to have their own time but would not want to live alone with any other than themselves at their homes (Murphy, 2014). Solove expresses the dilemma of life in the perspective that even though people need privacy, the controversy happens on social media where they share malicious and private information to the vulnerable social media sites.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Privacy is too often sacrificed by the quest to enhance security concerns in most cases organizations avoid the value of privacy of an individual and dismisses them to "an all-or-nothing attitude." On the other hand, Baker outlines that it is better to increase people's privacy to prevent terrorist acts in the form of cybercrime by potential criminals. The limitation of 'nothing to hide' is associated with the fact that youths are the most vulnerable to a breach of privacy. On the Other hand, the limitation of 'all-or-nothing attitude' instead most people who dwell on social media platforms have no privacy at all in that situation to improve the privacy of a nation.

The trade Offs of Security Versus Privacy

Due to the quest of the government to enhance the nation's security from cybercriminals, an aspect of speculating into user's private information has resulted in a state whereby people create fake identities on social media platforms. As much as the youths want to share information on social media sites, people still want to hold on to their privacy by creating lots of fake identities (John, 2015). According to the state of affairs on the internet, there is no privacy at all since there are lots of creepy targeted ads that keep ripping people off.

According to Solove, the tradeoff of disarming ourselves for the security of a nation is a fallacy even to the criminals who usually seek to speculate into users' data. There is a distortion in the balance of users' privacy and the quest for establishing a secure nation (360).

Definitions

According to Solove, privacy is the utmost protection of an individual's data from intruders. On the other hand, Baker portrays that confidentiality of an individual is related to protection from cybercriminals and disqualifying the aspect of the government having a look at an individual's private data to be an infringement of privacy.

Cyber-snooping like the one that happened on May 17, 2017, costing the privacy of computer systems in more than 150 countries justifies the statements by Baker. There is no privacy at all nowadays; thus, the call to privacy is gradually diminishing. George Orwell's research outlines that, confidentiality is yearning for all humans, but the same individuals craving for it are the perpetrators of a breach to privacy (John, 2015). People spend more time scrolling social media sites in search of information and viewing indiscreet tweets and posts that are meant to be private. Just like another Ted talk asserted, privacy is highly abused by social media, for instance, Facebook that can use portrait mapping and other technologies to reveal more information about a person's whereabouts, current location, and their social life.

The challenge of all-nothing to hide is related to the fact that technology is invading our privacy since the digital crowding that is widely abused on online leads to social strife and a loss of personal space that was geared to be there in space (John, 2015). Nowadays scammers, cyber crackers and other people with malicious reasons take advantage of the online flocking space to scrutinize into personal data thus using the information to blackmail other vulnerable individuals (Murphy, 2014). Indeed, digital crowding has impacted privacy; therefore, the need for privacy is at risk. Another aspect to worry about is whether there is still the cultural connectedness that used to value privacy yet people keep on sharing achingly personal data on social media. For that matter, cybercrimes have become the call of the day since freedom on social media has steadily increased by the wealth of society.

According to Murphy (2014), social media platforms have become a threat to most people since the nation majorly plans to speculate into people's association on the web through their social media platforms. Technologies are invading privacy since most organizations tend to use employee's data to advertise their products. The personal data obtained is usually and can be said to be an infringement of personal privacy concerning the policies regarding online privacy (Murphy, 2014). Even though the use of cookies can be able to enhance online security especially for individuals who are at higher risk of cybercriminals, the predicaments associated with the collection of personal information that can root theories and the crimes that they do will eventually affect everyone in the world ends challenging the aspect of personal privacy.

The evolving internet is stepwise becoming a challenge to the privacy of individuals. On April 2018, Mark Zuckerberg was summoned by the Congress concerning the questions of personal privacy for individuals who have signed up for Facebook (Isaak & Hanna, 2018). The Sermon was structured after a third-party company, Cambridge analytical, was accused of using the Facebook platform to obtain people's private data. The accusation was also connected to the possibility that Russia interfered with the 2016 Presidential elections through the collection of personal data from the Facebook platform (Isaak & Hanna, 2018). Most people do not understand the required setting for enhancing their privacy while using online platforms. For instance, most Facebook users do not realize that their online platform is at significant risk whenever they do not improve their online security plugins as an approach to prevent third parties from infringing their privacy (Isaak & Hanna, 2018). Recently it was found out that an average Facebook user in both Africa Montana and Australia r ignorant on how to use privacy setting on their website. Besides, a Facebook user usually Trust that social Media platform is responsible for their online privacy fence Cambridge analytical victims outlined that technology is stepping wisely in betting individual privacy (Isaak & Hanna, 2018). The current infringement of online user's confidentiality concerning Cambridge University research portrays that unlink to individual's privacy on social media platform will eventually challenge their quest for personal privacy in the future. Indeed, technology improvement invades human's privacy.

The issue of online privacy effects most citizens. Besides most individuals who suffer an infringement of their privacy are average citizens. For instance, the maid 2017 groundbreaking Wanna Cry ransomware attack affected individuals in over 150 countries concerning their databases hence proving that technology is a problem to individuals' privacy and confidential data with online platforms (Isaak & Hanna, 2018). Another aspect associated with online privacy is the fact that private computers are mounted with a webcam which can be used to collect personal portraits and use them in multiple ways. Besides, some websites Talents user's ability to enhance their privacy bye spreading viruses and Trojans which are failed to download on both personal computers and phones automatically and later they are used to make a follow-up on the pieces most challenging personal privacy (Isaak & Hanna, 2018). A global positioning system (GPS) collect information about the user's location, and she has the data to various platforms hands subjecting people at risk of attack.

Solutions

Becca of life that there is no need to loosen the surveillance on the quest to enhance security through infringement of personal privacy since it will result in unfavourable outcomes. They are better to open the offline search an improvement of the 24/7 surveillance according to the current NSA approaches should be improved to secure the Nation's people and data from infringement by cybercriminals. On the other hand, Solove Argues that constitutional rights should be revised and emphasized on the need to enhance personal privacy by rethinking of domestic security surveillance with prior analysis of judicial scrutiny (361). Wiretapping should be analyzed to prevent any sensitive information from being recorded from personal communication of a people in the nation.

My View

The government can spy on citizens which is an aspect that will eventually result in public outrage since the constitution protects personal privacy. The element of betraying own security by speculating through an individual's privacy rules that technology is getting our privacy.

Technology has invaded user's privacy since the cable one internet is portrayed to have various issues that describe lack of privacy measures. The more the internet is evolving, the more people are now ignoring request to enhance personal privacy. The vulnerability of people to ransomware attacks will eventually be the order of the day due to the massive social media users who do not necessarily appalled privacy settings as required by the developers. According to Kokolakis (2017), technological advancement concerning Online news is challenged by the massive social media users who continuously avoid during their accounts concerning measures to prevent intruders. Even though there are measures to protect users from infringement of their privacy, blockchain technology and Darknet are not familiar to all people (Kokolakis, 2017). The propensity of people to a nude to blockchain technology and Darknet is low hence challenging the fact that technology is at the forefront of improving online privacy.

References

Harvard Business Review Digital Articles, 2-4. Retrieved from EBSCO multi-search database.

Isaak, J., & Hanna, M. J. (2018). User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection. Computer, 51(8), 56-59.

John, L. K. (2015). We Say We Want Privacy Online, But Our Actions Say Otherwise.

Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & security, 64, 122-134.

Murphy, K. (2014). We want privacy but cannot stop sharing - the New York Times, 4.

Cite this page

Does Technology Invade Our Privacy? Paper Example. (2022, Dec 06). Retrieved from https://proessays.net/essays/does-technology-invade-our-privacy-paper-example

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism