SECTION 1
Question 1
What do you understand by the word 'plagiarism'?
Plagiarism refers to the act of using some else's words, ideas or writing and claiming to be one's own work. The act is considered a considerable ethical and legal aspect of information use since the ultimate user of the original information material does not acknowledge the writer. Plagiarism can, therefore, occur in many forms depending on how one uses the original information. For instance, if an individual directly copies the words exactly as they appear in the other's work, he or she will have committed a serious violation which contributes to plagiarism. Moreover, the use of another's work without quoting is also considered as plagiarism. It follows that as much an individual incorporates the other's ideas even without copying directly, lack a reference section and the relevant quotes deem the resulting paper plagiarized. Therefore, plagiarism is all about the failure of any writer to appreciate and acknowledge the effort of the writer of the work from which one is drawing ideas.
In the case that you incorporate material from other sources into an assignment submission, provide an example showing exactly how this should be done in order to avoid an accusation of plagiarism. Provide complete details.
It is easy for one to plagiarize in his or her assignment; however, this can be easily avoided by taking some factors into consideration. For example, if one would wish to incorporate information from another material, he or she should be able to present the original ideas in his or her own words. He or she will have been able to communicate the same issue. However, there would not be any accusation for plagiarism. Besides, one should include a reference list below his or her work to show that he used the information provided by the respective writers. A student working on an assignment can make this better by quoting from the source into the paper. By accomplishing these, one will have been able to recognize the various authors hence avoiding plagiarism.
Question 2
Identify and discuss three exemplary ways in which digital technologies have significantly eroded personal privacy values.
Use of The Internet Especially Social Media
People share their information over the social media including and this can breach their privacy. They interact online, share phones number, personal addresses, pictures of their homes as well as intimate pictures, which might be used to target them (Hiranandani, 2011). While the use of social media, email and other digital technologies is free, the companies use the data to personalize searches and provide targeted advertisements and messages to users. This proves that the messages, email, online searches, and photos are never free as they are accessed and used by the companies to market to them and can be sold to other parties including hackers.
CCTV, Cameras, and Webcam
These are the most commonly used digital technologies for their security purposes or for personal expression and communication. Over the last five years, the number of photos taken using Smartphone has increased by 100% which mean that the users do not know that they might accidentally upload their photos to other people unknowingly (Watt, 2017). The phone camera can be used to remotely survey a person even in their intimate moments exposing more than the phone owner intended to expose especially their surroundings does. Hackers to survey an area or an individual thereby breaching the privacy of the people being surveyed unknowingly can also use CCTV.
Internet calls and GSM termination
There are technologies that can be used to hack and eavesdrop on personal communication between two people. Two people can communicate over the cell phones without thinking that they may be targeted and in most cases, people discuss intimate issues thinking they are in privacy while their calls are being monitored. Whenever people are communicating using cell phones, third parties can eavesdrop in their communication collecting voice data that can be used to either incriminate the two people or used to extort money from people.
Question 3
Describe two potential and significant ramifications associated with the increasing use of biometric data for personal identification.
Biometric data are computer data created throughout biometric process. They contain physical distinctive features that are used to identify individuals. Typical biometric data include facial recognition, fingerprints, electrocardiographic rhythms, voiceprints, and iris or retina scans. Biometric data measures similarity scores and all identification information excluding the person's demographic and name. Our societies are today's technology based, and the traditional methods of individual identifications are be are absolutely becoming obsolete. Biometric identification is rapidly taking over the conventional ID card based identification process and the use of passwords. This is due to numerous advantages and security purposes associated with biometric identification methods.
The most potential and significant ramification of using biometric data for personal identification includes accurate and positive identification. Biometrics relies on physical and behavioural characteristics to provide accurate authentication. Therefore, they cannot be replicated, forged or duplicated, thus giving the consumers or person immunity against identity theft and fraud among others. Use of biometric data for personal identification technology provides highest level of safety and security to the public. This is made possible through individual's identity protection, protection of passwords, security authorisation and access to secure zones for someone employed or working in an organisation where security is paramount. Biometric data for personal identification, not only permits an individual in accessing certain places but it particularise one's ability to legally work in a specific organisation. The emergence of biometric technology used for authentication purposes is very beneficial to ensure protection, accuracy for individuals as it offers accountability, convenience, and precise audit trails. This will help government and security agencies to identify individuals and thief's hackers whose main intents are to steal other individual's identities for their own malicious activities and attack others.
Question 4
Research and discuss ways in which robotic technologies are likely to impact upon human employment over the coming years. Here you should particularly focus upon the driving forces which underpin the development of robotic systems, and the likely consequences on society.
Human being as capital has been the main driving forces in economic success in several overhauling sectors in different organisations in the country. However, technology is likely to have a very big impact in labour market in the future. And with the increase in robotic deployment in our market realm, most jobs are likely to be replaced in both white and blue collar jobs. Robotic technology is likely to lead to reduced opportunities and loss of jobs. Automation by artificial intelligence and robots are likely to affects big number of individuals employed in various sectors. For instance, many positions are likely to be eliminated by self driving cars.
As technology is advancing, the range of prospective roles and uses of robots is expected to grow as well. This will lead to lay off of many personnel's even in technical fields and occupations like surgical care and even medical diagnostics. This work place automation will result to loss of jobs by many people. Many organisations are looking forward to reduce cost of production in their organisations, as a result, they tend to adopt robotic technologies that will automate their production.
However, there are many benefits of robotic technology in our market realm. Robots ensure increase in productivities and competitiveness as they enable organisations to remain competitive. This is very important especially to organisations that are considered to be the backbone of country's economic development. Additionally, application of automation in companies increases competitiveness through faster and effective product development and product delivery. Increased use of robots enables organizations in high cost nations to bring back to their home most basic fragments of supply chain that were initially brought to sources of inexpensive labor.
Question 5
From the perspective of privacy erosion, critically discuss the often-used comment (frequently attributed to the Nazi Minister of Propaganda, Joseph Goebbels).
One of the main problems facing everyone around the world is privacy erosion in the digital era. Governments (big brother) are engaged in security surveillance of their citizens to protect them but the protection of individuals come at a price that is the loss of privacy. Computers and digital devices have become pervasive as over 80% of the population above 10 years of age have an access to an internet enabled smart devices that can transmit images. Everyone is using social media and the fact they do not know how to protect their privacy while using social media puts them at risk of losing their privacy (van Lieshout, Friedewald, Wright & Gutwirth, 2013). Technology is pervasive and people can expose their privacy knowingly or unknowingly. That is why the Nazi minister said that if one has nothing to hide they should not fear anything because the government is seeing them anyways. The minister meant the government and some corporations are involved in mass surveillance without the people knowing but this is done under the guises of protecting the public.
Governments are using collecting user data and the corporation are selling the data. For example, Google has been accused of selling user data and attention. In the current digital age, user data an attention is the currency of the world and the corporation is paying Google, and social media companies such as Facebook to sell the data that can be analyzed using big data analytics to determine the consumer behaviours of the users. Google is paid for the user search data and Facebook may be helping the users keep in touch with their friends while their pictures, search data, messages, and other user behaviours online are being tracked and sold to Marketing Corporation for a fee. Therefore, there is no privacy that means that unless you are doing illegal things, one should not fear because the government and corporation even in privacy do mass surveillance. Privacy should not be confused with security.
SECTION 2
Question 1
What is the title of your chosen project?
The title of the chosen projects is: "To investigate the loss of privacy in the internet era: is the government sleeping on their duty."
Question 2
Clearly describe your objectives and why have you chosen this particular topic.
The main objectives of the study include:
- To investigate the perception about the people on privacy and security in the digital era
- To determine how people are protecting their privacy
- To determine how the...
Cite this page
The Loss of Privacy in the Internet Era: Is the Government Sleeping On Their Duty Paper Example. (2022, Sep 21). Retrieved from https://proessays.net/essays/the-loss-of-privacy-in-the-internet-era-is-the-government-sleeping-on-their-duty-paper-example
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Women Finally Speak: Oprah's Speech Analysis
- Privacy Protection in Modern Research - Paper Example
- Research Paper on Juvenile Justice: Punishment vs. Treatment
- Essay Example on Founders of the US: An Intergovernmental Perspective
- Mass Shootings in NY: Gun Control Debates Intensify - Essay Sample
- Crimes in the Bible - Free Essay Sample
- Unveiling the Racial Contract: Charles Mills' Critique of Social Contract Theory and Injustices - Report Sample