Premium Essay

Internet Privacy: Is the Internet as Safe as Everyone Says?

In:

Submitted By greymic
Words 1707
Pages 7
As every generation comes they bring with them a new invention from cars to television to the telephone the basic existence of man, in my eyes, is to advance both technologically, thus making life better for us all and also scientifically. Man wants to know all we want to be able to answer all the questions out there as every day goes by we get closer and closer to answering some of our questions. Everyday new cures for diseases are found and also new diseases are discovered, new discoveries are made in various fields, at the same time however new problems are arising.
Man in every era has depended on some form of tool to help him to his tasks whatever they may be, a tool to make things easier. This tool is technology; technology does not have to be the modern thoughts of computers. Technology is "the science of technical processes in a wide, though related field of knowledge." That is the definition given by The New Lexicon Webster's Dictionary of the English Language. So technology can be anything as long as it helps us advance. It can be anything like a plough to help a farmer, a television to help the media and the telephone to help us communicate. The latest technology of the 20th Century is the Internet and it has placed a great mark on our society. It is the new "place to be" where business can advance, people can interact worldwide at the click of a mouse and this has revolutionarily changed the world. In the world of the Internet there are millions of members worldwide and that means it is a very profitable arena. In an area where there is money there are criminals and that is where the modern criminals of the world are behind computer screens. They may be credible individuals in society and they could also be credible corporations and organizations that are finding a quick way to make money and by doing this they are breaking ethical rules of society (even

Similar Documents

Free Essay

Information Technology Acts  Paper

...to reduce cracking of computer systems and to address Federal computer related offenses.  This act, which is codified as 18 U.S.C   § 1030 covers most federal computer related offenses.  California was the first state to legislate a reporting requirement for computer hackers.  The CFAA mainly deals with people who have exceeded the scope of authorized access and computer hackers.  Computer Fraud and Abuse Act. The CFAA knows that a cyber-attack can damage a business as well as incur substantial costs responding to unauthorized use or computer hacking. It would not surprise me at all, if in the very near future, an employee sues his/her employer for whatever reason, and the employer will counter claim with some kind of computer misuse.  I say that because at my employer, in every single computer  we receive the following warning appears before we can access the system; “Warning; This computer is funded by the United States Government and operated by the California...

Words: 656 - Pages: 3

Premium Essay

Social Media Paper

...be able to access information and stay connected. This demand has led to a rise in the creation and use of social media sites. Since the creation of the first social media site decades ago we have seen a drastic rise not only in the use of social media but also in the number of such sites available for various uses. Whether you are looking for a job, a long last friend, a professional opportunity there is a social media site dedicated to that very purpose. Regardless of which of these purposes we choose to use social media it is safe to say that Social media, is a tool used to allow persons to connect and interact with others using the internet. Today, a very large percentage of the American population (and the world in general) has one or more social media accounts; the most popular of which are Facebook, Twitter, Instagram and LinkenIn. If the widespread use of these social media sites was indicative of the advantages of their use it would be safe to conclude that there are a number of advantages. Among these advantages are: worldwide connectivity, real time information sharing, ability to connect with people of shared interest, they are a great way to network, and they keep people abreast of what is happening almost instantly. With the click of a mouse we are able to log on to our preferred social media site(s) and connect with persons from around the globe. Facebook is infamous for getting people connected or reacquainted with long lost friends and family members....

Words: 1067 - Pages: 5

Premium Essay

Full Body Scanners at Airport as an Invasion of Privacy

...Air travelers are increasingly subjected to revealing full-body scans or enhanced pat-downs all in the name of keeping the sky safe. Nearly 500 advanced imaging technology machines, such as full-body scanners, are used in 78 airports around the country. Joe Sharkey’s article “The Loaded Gun in My Carry-On? Oh! I Forget” gives examples of the situation when people forget and bring their hand gun inside the airport. The airport securities don’t take it lightly, they involve law enforcement because carrying weapon inside the airport is violation of airport law. About half use backscatter technology, which emits a small dose of X-ray radiation to present a detailed image of the body, and any concealed weapons or contraband a passenger might be carrying (Sharkey). Security is not something that can be compromised, but it does not have to come at the expense of our privacy. It is possible to maintain our own identities, while guaranteeing the security of our nation. It is necessary to check I.D. and do backgrounds checks on suspicious persons; however, it is not necessary to constantly berate innocent citizens. We have all experienced some type of frustration while going through the airport. Sharkey comments in his article that some of security checks are necessary to guarantee that we arrive safely, but more often it feels like an invasion of our privacy which results in poor attitudes and unpleasant to travel. Screening technologies like...

Words: 1166 - Pages: 5

Premium Essay

Is Privacy Possible in the Digital Age?

...Privacy and security (Initial essay) Introduction When I think back one of firsts times I thought knowingly about privacy and security in my life at category of every data being stored and maybe later analyzed it was back my previous student days when one of my friend refused to pay with bank card in Alco-store. At that time it seemed to me really paranoiac and weird, but now I get his idea behind it. If one is a gambler for instance, it really isn’t very smart to pay with credit card in gambling-den. But at the other hand nobody can also blackmail you at basis of your sins which are known to everybody. Is privacy possible in the digital age? In current days one of the biggest and influential databases about private persons Facebook is launching a new profile type “Timeline” – it really brings users history in silver plate to everyone interested – unless he has taken precautions in privacy-settings. Many people say they’re not worried about the info reachable to everyone, “I’ve got nothing to hide,” they declare. Those advancing the nothing-to-hide argument have in mind a particular kind of appalling privacy harm, one in which privacy is violated only when something deeply embarrassing or discrediting is revealed, says Solove (2011). Privacy itself is a concept in disarray. Nobody can articulate what it means, claims Solove (2006). It isn’t seen everywhere same way as in Western countries, also understanding differs individually. Already in 1976 the secretary-general of...

Words: 1609 - Pages: 7

Free Essay

Internet

...It is very difficult to differ between the good and bad aspects of internet. There are good and bad things about every service of the internet.   If you chat you can meet many interesting people which come from all over the world. Distance is not important any more. You can meet people which are not able to find friends in reality because of their appearance. In cyberspace there is no appearance - the character of a person counts. But you also can meet people, who cheat on you and fool you. That can be funny, but it is not if you want to meet “real”, devine friends. Sometimes, if you meet your online friends it can be very thrilling. You make your own picture of your chat-partner in your mind. And what about your friends in reality? There will be less time left for them, if you sit in front of the PC all the day. But there is also the possibility to make your real friends your online-friends.   Searching for information you will find a huge amount of it on every topic you are searching for. This can be very comfortable. You only have to type in a word and you will find everything about it. But be careful! There is also false information. Sometimes it is hard to distinguish between true and false information.   Often you have the possibility to listen to music on the internet. You may also download it for free. That is very cheap because you only have to pay the telephone-costs and the music is for free. What does that mean for the musicians? They will not get all their money...

Words: 794 - Pages: 4

Free Essay

Cyberbullying and How Internet Privacy Is Involved

...Cyberbullying and How Internet Privacy is Involved Abstract This paper is going to be about how cyberbullying and internet privacy go hand-in-hand with each other. Cyberbullying is the use of electronic communication, like the internet and social media websites and cell phones, to bully a person, usually sending hurtful or embarrassing messages to them (Helen Cowie, 2013). Many of the articles that are going to be using for this paper talk about the different ways cyberbullying affects teens and young adults and also how internet privacy plays a role in cyberbullying. There is an article from Bob Sullivan (2013) that talks about how internet privacy is a complicated issue and there are criminals who break into websites to steal personal information. Since people can get someone else’s personal information, that makes it easier for a cyberbully to create a fake profile on a social media site, and make fun of and belittle someone else. Keywords: Cyberbullying, electronic communication, Cyberbullying and How Internet Privacy is Involved Traditional face-to-face bullying has been identified as a risk factor for the social and emotional adjustment of perpetrators, targets, and bully victims during childhood and adolescence. Bullies have now found a new way to reach their targets, by cyberbullying. They now can go on the internet and social media websites or use their cell phone. With the bully being able to do this they have the power to reach their targets at any time...

Words: 2676 - Pages: 11

Premium Essay

Personal

...available to the individual? Various researchers have evaluated the importance of the Internet, but little attention has been paid so far to online personal data protection. (Donald et.al, 1997) The purpose of this study is to introduce some potential problems of the Internet, the importance of online personal data protection and some solutions. The paper is structured as follows: the first section will present some background of the Internet, the second part will show some potential problems, and the third part will introduce the importance of online personal data because of the potential problems. Finally, this paper will introduce some available solutions. At present, the Internet has become an indispensable part of people’s daily life, because it can be used to communicate and do business with others. For example, “in 1996, Internet shopping revenues for U.S. users, excluding cars and real estate, were estimated by Jupiter Communications, an e-commerce consulting firm in New York, at approximately $707 million but are expected to reach nearly $37.5 billion by 2002” (Achs, 1998). However, a lot of problems of the privacy of personal information have caused people's concern and make them less confident about the Internet. The first potential problem that causes people’s concern is cyber-thief, because it is one of the most convenient method to obtain personal data of others on the Internet— a virtual world where there are no borders. “Online identity theft through the use...

Words: 1537 - Pages: 7

Premium Essay

Maria Konnikova's 'The Limits Of Friendship'

...Social media has made it particularly easier to stay in touch with many people as well as feeling a sense of belonging. While bringing people together social media has also gave way to certain movements and trends that have been able to spread worldwide. With social media’s impact on the world today as such a driving force, there is little evidence that social media will be stopped anytime soon. I believe, that I the future social media will continue to be at the forefront of the world and will make people feel closer. With that being said the drawbacks such as social media becoming too powerful to be stopped and compromising the privacy of individuals is also a...

Words: 1691 - Pages: 7

Premium Essay

Computers

...next big thing, and social web gives us a way to connect with virtually anyone, easily. In the past thirty years, technology has changed a tremendous amount, especially in the category of Social Web. It all began in 1979 with Tom Truscott and Jim Ellis, who posted news articles and the concept of Usernets was conceived. Usernets were the precursor to Social web because it set the example and showed the use of internet incorporated into our lifestyles online. From there Usernets evolved into BBSs (Bulletin Board Systems) this came around in the late 70s early 80s. It was the new advancement in social web, the only catch being only one at a time could log on. Being the, “next big thing,” everyone was getting involved and although most used it for respectable purposes, some ruined it for the rest by hacking, posting illegal things, and inappropriate material. It dwindled in ratings and because of the issue of logging in one at a time; it was a very slow site. Below is a screenshot of a popular BBS, known as Star-Lit in 1979 by Ward Christensen. Needless to say, a new service came around called CompuServe. It appealed more than the past two sites because it was the first to allow chatting. It was all the rage, therefore the public was willing to pay the fees of...

Words: 1633 - Pages: 7

Premium Essay

Net Nuetality

...is the concept that internet service providers should allow all access to contents without blocking any websites or sources. People should be able to access everything on the internet it should be open internet access. Although that is not the case because there are people against it they say that every website should not be open. Many questions are raised about how net neutrality can be protected and so forth. I believe that the FCC needs to protect net neutrality by making a new set of rules there should be strict rules as long as customers can do everything they need to it be so much better that way its more safe for everyone to use. If done so then the technology will change for the better. People will have the internet they will learn new things and use it in a more appropriate way. They should make sure that they are enforcing those rules. If they have those rules people will be more aware of what content is good to see on the internet and what is not. Moreover FCC needs to promote it. It should be easier for people to access the internet whenever they want to. It should be legalized for everyone. The internet should be open for free expression and innovation. I think that FCC needs to make a proposal to the government so we can all have a better future because our future is at stake. If your a consumer then you want to be able to go on your favorite sites such as Google, Netflix, and Youtube. So FCC needs to make equality for everyone on the internet whether your doing...

Words: 711 - Pages: 3

Premium Essay

Facebook Surveillance

...Elizabeth Foss “The Internet is a surveillance state” Introduction to information systems security March 28, 2013 With all the technology we have nowadays it’s hard not to become a part of the newest trends or the newest apps etc. This article is letting us know that no matter how careful we are, companies and even people that are involved with the law can see and track everything we do and search for. It’s hard to believe that people can have that much control into technology to literally see what everyone is doing. Whether your simply looking up clothing or doing something more private, its viewable and accessible. The author is trying to get the point across that even if you take the most extreme precautions with what you do on the internet, nothing is a secret anymore. Imagine going into a job interview and the person brings up something seen on your Facebook from 8 years ago, and it prevents you from getting the job. The author is trying to say exactly that. What you do on the internet whether its on your own personal device or on a public domain, can affect your life. People have lost their careers due to slip ups on the internet. How did technology become so advanced to where there is basically no privacy anymore? This article warns you that you are being tracked at all times. Smart phones have devices where you can be pinpointed to your exact location, which is a scary thought. Not only does it make people not feel safe, it makes you wonder how many companies...

Words: 285 - Pages: 2

Premium Essay

Whatsapp

...Step-Up towards Privacy and Connectivity Concerns in WhatsApp Ms. Kavisha Duggal, Assistant Professor, Dept of Computer Science Lovely Professional University Phagwara, India Ms. Reema Ludhra, Student Dept of computer Applications, Lovely Professional University Phagwara, India Abstract-WhatsApp is an instant messaging application which runs on all the smart phones with internet access. Recently, hit the record of 10 billion total messages exchanged per day. Though, it is one of the most popular and favorite application of the smart phone users there are few issues involved in its working. The foremost issue I want to propose is the Last Seen Time stamp in the WhatsApp is updated with internet access time, rather it should fetch the time when the message is actually sent. In addition to this, I would like to propose the privacy concerns of the application. That is, anyone can be added to the WhatsApp chat group, without the permission of a particular user. Thus, this is the privacy concern among the application user. Keywords: WhatsApp; Connectivity issues; Privacy concerns. I. INTRODUCTION Today, WhatsApp is the most popular Application amongst youngsters. One can send text messages, images, videos etc on this cross-platform application that too free of cost. Only an internet connection is required to successfully run this application. It is a free application available in play stores of a smart phone. In very less time it has taken away the market...

Words: 1381 - Pages: 6

Premium Essay

Administrative Ethics Paper

...difficult for an organization to maintain the safety of patients’ medical records under the Health Insurance Portability and Accountability Act of 1996 (HIPPA) Privacy and Security Rules. Even after providing education to health care workers on proper HIPPA practices, there continues to be intended and unintended breaches especially in hospital settings. In 2010, New York-Presbyterian Hospital (NYP) and Columbia University (CU) health care system was under investigation for an accidental release of electronic medical records for 6,800 individuals. The incident impacted the health care industry because it was largest HIPPA settlement to date. At the time, U.S. News and World Reports NYP health care system as number one in the state and number six in the nation. The HIPPA Privacy Rule protects the “privacy of individually identifiable health information”; while the HIPPA Security Rule “sets national standard for the security of electronic protected health information”, and the HIPPA Breach Notification Rule requires business to notify of a “breach of unsecured protected health information” (HHS, 2014). Basically these rules are to protect the privacy of the patients’ health information. It says who can look at and receives information about the individuals. It gives the patients reassurance that their health information is safe and secure. The ethical and legal issues of the article The issue of the article is that “a physician employed by CU who developed applications for both...

Words: 1095 - Pages: 5

Free Essay

Xcom/285 Privacy Policies and Laws

...Privacy Policies and Laws Debate XCOM/285 Essentials of Managerial Communication When thinking about privacy laws and policies, it is safe to clearly state that I am for them. Many people feel that some employers go over board when it comes to this kind of thing but in this age of technology, having privacy polices is not only right it is essential to maintain the respect of the people who work for and with people. There is much evidence that even with privacy policies in place the some employees still use company communications for personal use. There is no clearer evidence of this than that fact the government had to pass laws of privacy laws to protect companies that felt they needed to watch their employee’s use of their communications for any personal use of company communications. These laws were passed so angry employees who were caught using company communications for private things could not go back and sue companies for invasion of their privacy. The ironic part of employees getting upset over what they perceive as an invasion of their privacy is the fact most companies make employees sign privacy agreement policies and then get angry when they get caught breaking them. Privacy policies are not just to protect employers from employees using their communications for private business, but privacy policies are needed to protect companies from viruses that can come in through private emails or...

Words: 933 - Pages: 4

Premium Essay

Administrative Ethics Paper

...difficult for an organization to maintain the safety of patients’ medical records under the Health Insurance Portability and Accountability Act of 1996 (HIPPA) Privacy and Security Rules. Even after providing education to health care workers on proper HIPPA practices, there continues to be intended and unintended breaches especially in hospital settings. In 2010, New York-Presbyterian Hospital (NYP) and Columbia University (CU) health care system was under investigation for an accidental release of electronic medical records for 6,800 individuals. The incident impacted the health care industry because it was largest HIPPA settlement to date. At the time, U.S. News and World Reports NYP health care system as number one in the state and number six in the nation. The HIPPA Privacy Rule protects the “privacy of individually identifiable health information”; while the HIPPA Security Rule “sets national standard for the security of electronic protected health information”, and the HIPPA Breach Notification Rule requires business to notify of a “breach of unsecured protected health information” (HHS, 2014). Basically these rules are to protect the privacy of the patients’ health information. It says who can look at and receives information about the individuals. It gives the patients reassurance that their health information is safe and secure. The ethical and legal issues of the article The issue of the article is that “a physician employed by CU who developed applications for both...

Words: 1104 - Pages: 5