Internet Privacy.

1148 Words5 Pages
Solutions for Violations of Internet Privacy.

In the past thirty years computer technology has been developing very rapidly. Internet in last decade has revolutionized the way how we conduct our lives and businesses. Internet has become a daily necessity we cannot live without. Development of Internet and wireless technologies together with advancement in miniature technology has made it possible for us to have access the internet on the go. Every year we expect new and more advance models of smart phones, or new more sophisticated window systems, or new and more reliable internet security program in hope that this time advancements in technologies not only help to improve our life, but help to protect our privacy while using the
…show more content…
Because technology improves and advances dramatically, tracking people’s information by corporation has become more sophisticated too. A week ago I was looking for an airline ticket to New Zealand; as a result of that any sites I open, even ebay—I have insert with deferent offers for New Zealand travel. This same technique corporations use while we shop. Once you are looking for something, be ready to be attacked with cookies that have similar offers for weeks to come. It is harmless, but very annoying. The good news is, most information corporations collect about us are used just for businesses to take advantage and make profits from us. Plotz writes: “One wonderful, terrible thing about modern capitalism is that companies don’t care. You are not a person. You are a wallet”(70). When we talk about our privacy, what exactly do we mean? What kind of private information do we want to keep private from the public eye? For different people it is different information. As David Plotz in his essay “Privacy is Overrated” writes “the privacy crusade is built on a foundation of hypocrisy paranoia, economic know-nothingism and bogus nostalgia”(68). We concerned about our own privacy, but do not mind to check on personal data about somebody else we are interested. We also would like our government to stop any security threats from terrorists by gathering large data and searching it with whatever method they use. So, in some cases it is okay to break into
Open Document