Free Essay

Privacy and Technolgy

In:

Submitted By hank
Words 1368
Pages 6
People’s pace of life is increasingly fast. Numerous people depend on modern technology for work and entertainment because it is more efficient. For instance, Facebook is the most popular social network website in the world, but use of Facebook is becoming a controversial issue as it has potential hazards that threaten users’ privacy. Facebook is a great innovation since it makes people easily contact friends and families, but when users upload their personal information on profile pages, their privacy may be confirmed by strangers. Nevertheless, some people believe that users’ privacy can be protected with technological tools. Although some technology experts claim that companies can protect users’ personal information, modern technology is an invasion of privacy. Using modern technology allows other people to track users’ movements, so it invades people’s privacy. GPS devices can reveal users’ physical location information to others. Leah Yamshon, the author of “Mobile Apps Can Compromise Your Privacy” suggests that if people use GPS technology without sufficient understanding of the system, their movements may be easily tracked by other people (par. 1). Using GPS devices without controlling data transition processes may let other people easily know users’ location, yet most consumers do not know how to control data transition processes. Dishonest people can also steal users’ location information though smart phone applications. Patrick Leahy, the chairman of Senate Judiciary Committee, points out that users’ location information can be collected and stored in an unsafe way by smart phone applications without consumer’ agreement, which can allow criminals to steal information (par. 4). Sometimes when users deal with their own affairs outside, they do not want other people to know where they are, but users’ location may be tracked by criminals when smart phone applications are used outside. Likewise, when signing up on websites, customers’ location information can be learned by others. When signing up on social network websites at home, customers’ home addresses can be tracked by cyber thieves. Moreover, if users make reservations through websites, criminals can know when they are away from home (Yamshon, par. 8). Criminals can find out users’ home addresses and movements with the help of the Internet so that they can steal users’ private property from their houses. To conclude, users’ location information can be easily tracked by other people with modern technology. People’ information is violated since use of modern technology leaks customers’ personal information to others on the Internet. Customers’ passwords may be confirmed by other people. According to Jacob Aron, the author of “Time to take control of your personal information”, Last Pass, which is a company to provide the service to manage customers’ passwords online, puts numerous passwords in danger because of cyber attack (par. 6). If customers’ passwords are stolen by criminals, their accounts are also in danger, which means their personal information related to their accounts may be stolen by criminals. Meanwhile, some people set their Social Security numbers with their birthdates and birthplaces, which can be confirmed on Facebook. According to Kashmir Hill, the author of “Hello, Stranger”, other people can know users’ birthdates and birthplaces through their Facebook profile pages. With this information others are able to confirm part of users’ Social Security numbers (qtd. in Acquisti, par 3). There is a large amount of information accompanied with Social Security numbers. Other people can confirm users’ private information such as home addresses and marriage status if they know users’ Social Security numbers. Lastly, cell phone applications can reveal consumers’ call information. There is a sound-meter cell phone application which can record consumers’ call information and upload it to the Internet (Aron, par. 4). When consumers’ call information is uploaded to the Internet, strangers can know the privacy which customers have said with friends and family members through cell phones. To sum up, users’ personal information is revealed on the Internet. Modern technology reveals people’s private matters since people are monitored by it. To begin with, people are observed by surveillance cameras. James Vlahos, the author of “New High-Tech Cameras Are Watching You”, points out that security experts develop surveillance cameras for safeguards without discussing the problem of privacy, which makes people enter a period of being watched (par. 6). There are increasing numbers of surveillance cameras beside roads. Though they are for observing crime scenes, normal people are monitored as well, which may make people feel unsafe outside. In addition, people may be observed by operators of surveillance cameras. According to Mark Espiner, an expert of German museum, operators can zoom in the cameras to closely observe those people who they think are suspicious (par. 8). It is responsible for operators of surveillance cameras to monitor crime scenes. Nevertheless, some of them observe details of people just for entertainment, and some operators even upload surveillance videos to the Internet. Finally, employees may be observed by their companies. Some companies use Raytheon Oakley Systems, which can run surveillance software to access users’ computers, to report employees’ activities back when they are on duty (Vlahos, par. 29). Some employers restrict their employees to deal with personal affairs with monitoring their computers to increase working efficiency. However, employees’ personal information can be found by their employers if they keep personal data in those computers. Therefore, people are under surveillance because of modern technology. Some technology experts argue that some companies can protect users’ personal information. Some smart phone and Internet companies have taken action to protect users’ information from being leaked. Apple only sells iPhone applications which are examined in its store, and Google Android applications have to acquire customers’ permission before being installed (Aron, par. 3). Consumers may leak their data to strangers since they do not know how to control the data transition processes when signing up websites or installing mobile applications, but companies are professional enough to prevent users’ privacy being revealed. However, technology companies themselves can invade customers’ privacy. Some companies may access and collect customers’ private data. When people use websites or cell phone applications, companies behind these services may access customers’ personal data (Aron, par. 3). Even if some companies can protect customers’ information from being stolen by other people, companies which provide cell phone and Internet services may access customers’ private information. Moreover, besides collecting customers’ information, some companies provide the information to governments. Some technology companies collect customers’ use of the Internet and cell phones and then share the information with governments (Vlahos, par. 15). Governments collect people’s records of the Internet and cell phones for some certain purposes such as for chasing criminals, but sometimes governments are not trustful since users’ information which is stored by governments may be stolen by hackers, and some officials in governments my steal users’ information and sell it to commercial organizations. In conclusion, though companies have methods to protect consumers’ privacy, some companies themselves steal users’ private data. Thus it is obvious that modern technology threatens people’s privacy. To begin with, when using GPS devices and cell phone applications, users’ location information may be tracked by others. Secondly, customers’ passwords, Social Security numbers and call information can be leaked on the Internet incidentally. Thirdly, people can be monitored by surveillance cameras and computer software. Last but not least, companies which provide technology services may collect users’ data and share it with governments. Therefore, experts, companies and governments must take action to deal with this issue, and users ought to improve their awareness of safety to keep their personal information secure in this age of modern technology.
(1245 words)

Works Cited
Aron, Jacob. "Time to take control of your personal information." New Scientist 210.2812 (2011): 22. MAS Ultra - School Edition. Web. 4 Oct. 2011.
Espiner, Mark. “CCTV: Invasion of privacy.” Berlin Nachrichten. 3 Mar. 2010. Web. 13 Oct. 2011.
Hill, Kashmir. "Hello, Stranger." Forbes 188.4 (2011): 50. MAS Ultra - School Edition. Web. 3 Oct. 2011.
Leahy, Patrick. "PROTECTING MOBILE PRIVACY." FDCH Congressional Testimony (n.d.): MAS Ultra - School Edition. Web. 4 Oct. 2011.
Vlahos, James. “New High-Tech Cameras Are Watching You.” Military.com. Monster Worldwide, 26 Feb. 2008. Web. 13 Oct. 2011.
Yamshon, Leah. "Mobile Apps Can Compromise Your Privacy." PC World 28.5 (2010): 41. MAS Ultra - School Edition. Web. 4 Oct. 2011.

Similar Documents

Premium Essay

The Possibility Of Aquirng A Pergolas

...This style can prove to be an ideal choice to go with if you want something that provides a enahced privacy, which can help to create some awe-inspring movie qualtiy romance scense....

Words: 419 - Pages: 2

Premium Essay

Comprehensive Classroom Technology Plan

...Misty Roger EDU 225 January 29, 2012 Megan Mattioda Comprehensive Classroom Technology Plan Introduction To me technology is a logical and practical addition to learning science and assisting students in their problem solving that helps them meet today’s basic human needs. Technology is an innovative vision for a better future. Technology literate student accesses and acquires knowledge, exchanges ideas and opinions, solves problems and creates, innovates and expresses themselves through the skillful use of a variety of technologies. (Oregon Department of Instructional Technology, 2011) Mission Statement In my classroom I will strive to provide my students with the chance to incorporate technology in the classroom as an educational tool and use these tools to assist my students in achieving the highest possible standards in academics, creativity, and cultural diversity, in the real world. It is my duty to get the community and the parents involved in the students’ education and the educational standards that they face. Vision Statement My students will be able to excel in academics through the use of technology learning and hands on experiments that will entice the students to learn the joys and the thrills of science. Through the use of technology my students will develop skills that will aid them in the real world. My students will be successful by incorporating 21st century technology in their everyday learning. My students’ technology skills will aid them...

Words: 3105 - Pages: 13

Premium Essay

Types of Research

...ijcrb.webs.com SEPTEMBER 2010 VOL 2, N O 5 INTERDISCIPLINARY JOURNAL OF CONTEMPORARY RESEARCH IN BUSINESS The Impact of Information Technology (IT) on Decision-Making Process in the Public Sector Dr. Mohamad Noor Al-Jedaiah Assistance Prof. Abstract M.I.S Department Al Ahliyya Amman University This paper aims to identify the impact of information technology on the decision-making process in the public sector. By citing international experiences (The Taxation System in Europe Union) and the Solid Waste Association of North America as case studies, the most important findings were: (a) Public sector has to gather complex information through using technological equipment and software. (b) Public sector organizations can build their own information systems. (c) Information systems provide a significant help to the decision maker, and enable to exchange information with other governments. Keywords: Impact , Information Technology (IT) , Decision-Making Process ,Public Sector 1. Introduction Nowadays, organizations, individuals and the whole society are effected by the information and communication revolution, in their thinking manners, doing things, leadership styles of businesses, and even their life style. Organizations, either in the public sector or private sector are working to achieve their planned objectives through implementing strategies and plans that enable them to achieve these goals efficiently. Information now is available to any user in a wide range;...

Words: 3509 - Pages: 15

Free Essay

Result

...International Journal of Advanced Corporate Learning (iJAC), Vol 3, No 4 (2010) • Home • About • Log In • Register • Search • Current • Archives Home > Vol 3, No 4 (2010) > Atici Font Size:  [pic]  [pic]  [pic] Impulse Purchasing Behaviors of the Turkish Consumers in Websites as a Dynamic Consumer Model: Technology Products Example Bünyamin Atici, Ugur Bati Abstract This paper examines the concept of impulse purchasing behavior online basically. The phenomenon of impulse purchasing has been researched in consumer research as well as for example in psychology and economics since the 1950s. A detailed review and analysis of the literature asserts that there are some unsolved issues regarding the state of knowledge on impulse purchasing behavior. Furthermore, nowadays consumers buy an increasing amount of purchases on the Internet. The current conceptualizations of impulse purchase behavior do not adequately capture impulse purchase behavior over the Internet. Today several researchers have claimed that the phenomenon of impulse purchasing should be examined also in the context of online shopping environment. This article aims to reveal that what attitudes of the customers are the points in question while purchasing on internet in terms of impulse buying. The results of our exploratory research are consistent with our conceptualization, and present a strong base for future research. Full Text: PDF [pic] International Journal...

Words: 3794 - Pages: 16

Premium Essay

Technology Boon or Bane

...Technology – Boon or Bane? Posted on August 25, 2011by Sumukh Naik Technology is one of the greatest invention of mankind.It is so powerful that it shapes our thinking and our way of life within no time.It is ever evolving.Technology is a tool invented and sharpened by humans to make their life easier.Those who know the correct application of technology, be it any sphere of activity, have managed to make lives easier for themselves and to some extent also for others. I feel the best technological breakthrough was the invention of computers which basically led to further advancement in technology viz the creation of many softwares and hardware. Technology has gifted mankind with various boons but look closely and you will realise that technology have blessed mankind with two very important aspects – facility of communication and creation of time. Creation of phone, fax, paging services, mobile services, video conferencing etc are few of the facilities that the human mind has been able to conceive with the aid of technology.All have played a very important part in making the world a ‘Global Village’. Technology has ensured that one can easily communicate with anyone on land, in air(aeroplanes) or even when the person is under the calm waves of dark deep-sea (submarines). But the Time Creation aspect of technology has now posed a challenge and threat which very few had ever thought of. Computers – They have evolved rapidly at the rate of knots. A few decades ago, a single...

Words: 5283 - Pages: 22

Premium Essay

Organizational Change

...About Pfeiffer Pfeiffer serves the professional development and hands-on resource needs of training and human resource practitioners and gives them products to do their jobs better. We deliver proven ideas and solutions from experts in HR development and HR management, and we offer effective and customizable tools to improve workplace performance. From novice to seasoned professional, Pfeiffer is the source you can trust to make yourself and your organization more successful. Essential Knowledge Pfeiffer produces insightful, practical, and comprehensive materials on topics that matter the most to training and HR professionals. Our Essential Knowledge resources translate the expertise of seasoned professionals into practical, how-to guidance on critical workplace issues and problems. These resources are supported by case studies, worksheets, and job aids and are frequently supplemented with CD-ROMs, websites, and other means of making the content easier to read, understand, and use. Essential Tools Pfeiffer’s Essential Tools resources save time and expense by offering proven, ready-to-use materials—including exercises, activities, games, instruments, and assessments—for use during a training or team-learning event. These resources are frequently offered in loose-leaf or CD-ROM format to facilitate copying and customization of the material. Pfeiffer also recognizes the remarkable power of new technologies in expanding the reach and effectiveness of training. While e-hype...

Words: 29274 - Pages: 118

Premium Essay

Failure of Rim

...Glass Door Comments BlackBerry Reviews Updated Dec 11, 2013 All Employees Current Employees Only 3.4 796 reviews 57% of employees recommend this company to a friend 796 Employee Reviews Bottom of Form Review Highlights Pros: * "Great environment combined with a perfect work-life balance" in 49 reviews * "Great work environment/culture which makes it a fun place to work" in 45 reviews * "Good benefits; Good company to work for till profits started to slide off" in 36 reviews * "Lots of great people at the company, learned a lot and inspired my career in technology" in 33 reviews * "Good pay, great management, I felt like the work I was doing was important for the company" in 30 reviews Cons: * "No work life balance, limited career advancement, lack of good benefits of tech companies" in 20 reviews * "Senior management (C-Level) does no communicate down to employees well" in 27 reviews * "Poor management decision making processes - not innovative" in 18 reviews * "Upper management doesn't listen to people lower down that actually know what they're talking about" in 15 reviews * "Many bad/useless middle management built up over the years but the layoff did some clean up" in 13 reviews Reviews Dec 8, 2013   “Loved the company and the people.” Software Development Manager (Former Employee) Rolling Meadows, IL I worked at BlackBerry full-time for more than 5 years Pros – BlackBerry was a great...

Words: 90794 - Pages: 364

Premium Essay

Abcdeskjhjkh

...GRE Analytical Writing ISSUE Essay Topic - 1 "Important truths begin as outrageous, or at least uncomfortable, attacks upon the accepted wisdom of the time." GRE AWA Analytical Writing ISSUE Essay Sample Solution – 1 “The opposite of a correct statement is a false statement. But the opposite of a profound truth may well be another profound truth.” ― Niels Bohr[->0] This is a proven fact that truth is the initial stage of progress. However, it is also believed that truth always starts away from the traditions and conventions. Therefore, people consider truths as attacks upon their beliefs, which people are following from ages. Truth also means some new facts that are unknown to us. People do not want to deviate from the facts, which they have learnt from their ancestors, and it is true to say that shedding ones dogmas is often difficult. They feel that it is an attack on their wisdom. If we look at the history of the world, we will find many examples where truth has generated commotions in the society. Different people have different views about the existence of God, life after death and origin of earth etc. For example, people took a long time to accept that the earth is round. Religious leaders and clergymen opposed this idea as it was against what they were teaching. Similarly, when Polish astronomer, Copernicus discovered that the earth goes round the sun and not vice versa, he was opposed by churches for many years. In fact he and his supporters were...

Words: 150412 - Pages: 602