preview

List And Describe At Least Three Technologies That Allow An Individual To Research Citizens' Private Data.

Decent Essays

The Value of Digital Privacy in an Information Technology Age List and describe at least three technologies that allow an individual to research citizens' private data. This is an era of massive violations of privacy rights and individual liberties due to the new technologies of surveillance, data mining, electronic monitoring, biometric chips, spamming, hacking, phishing, and security breaches at major private and public institutions. These new technologies make the protection of privacy rights far more difficult than in the pre-electronic past. Given the nature of the Internet, thousands or even millions of people can view these Twitter and Facebook postings in a very short time, and they can quickly go 'viral' and spread globally almost overnight. Discuss the advantages and disadvantages of public access to this information, both for the researchers and those who are being investigated. Derogatory information about the personal life of individuals, including sexual behavior, financial, medical, legal and psychiatric histories, past drug and alcohol abuse, can be posted on the Internet and remain there permanently, available to millions through a simple Google search. It does not even matter if the information is false or from dubious or unknown sources, since the Internet is basically a free-for-all where virtually anything can be posted by anyone. Comments and opinions about controversial subjects like politics and religion, once posted to websites and blogs,

Get Access