Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

1

Assignment 4:
Privacy and the Impact of the Internet

Kirsten Collingwood
040 771 086

BUS2302: Information Technology and the Business Student


Darin McRae
November 3rd, 2014

Privacy and the Internet: Privacy Rights


When it comes to privacy rights, the internet is no, where people are given the right to
privacy. According to Wikipedia, the right to privacy, the right to be free from secret
surveillance and to determine how, when, who, and if, ones personal information is to be
revealed, is a human right and an element of various legal traditions which may restrain both
government and private party action that threatens the privacy of individuals. Privacy, as defined,
can be divided into four categories: (1) personal, (2) informational, (3) organizational, and (4)
spiritual/intellectual.
First, we are going to look at personal privacy, where there is a restriction on others to
experience a person or situation through one or more of the human senses. To put it more simply,
it is a way for people to prevent intrusions into their physical space. This would include, but is
not limited to, (1) preventing intimate acts or dressing in a certain way to ensure that body parts
are covered, (2) preventing videos being taken of the person, (3) preventing search of personal
property, (4) preventing access to home or vehicle, and (5) medical privacy. With all of this in
mind, this type of privacy does not wrap around the internet, except in regards to videos, or
pictures being put up. This is where you have the privacy rights to share only pictures and videos
you want to share, and you have the ability to set privacy settings or use technology to ensure
that the information does not show up on the World Wide Web.
Second, we are going to look at informational privacy, which refers to the evolving
relationship between technology and the legal right to, or public expectation of, privacy in the
collection and sharing of data about ones self. In terms of informational internet privacy, it is the
ability to choose when, what, where you share information and who has access to the

3
information provided. When reading the article in the text, Your Privacy Rights, one can see a lot
of detail about how to protect your right of information privacy. Specifically, it outlines multiple
tips, such as:
1. Dont give away you Social Security number or Social Insurance number, it can be used
to gather information about you without your permission or knowledge.
2. Dont provide information about yourself. In other words, always question why the
person is asking personal questions on a questionnaire or form. If the information is not
needed, say no to disclose the information.
3. Say no to direct mail, phone, and email solicitations. Also, dont give away your email to
prevent spam and unwanted mail.
4. Think before you post because whatever you post today, could leak and be seen 20+
years from now by your mother, father, significant other, children, employers, etc.
5. Pay attention to privacy preferences and ensure that you know how, when, and what your
personal information will be used for. Dont post public posts, unless you want it to show
up on any search engines. In addition, know your rights to everything you use.
6. Check on information that companies, or the government has on you. In other words, do a
credit search, a background check, and search yourself online to see what comes up.
Ensure that there is no incorrect or damaging information in a file about you.

Third, organizational privacy rights refers to government agencies, groups, corporations,


businesses, and other organizations that may have information on you. There is normally
information set out on the forms you fill out or the surveys you do to disclose your information
to other third party organizations. It is important that one adopts security practices and controls

4
to keep private information confidential. Examples of this can be seen in bullets 2, 3, and 6
above.
Finally, spiritual/intellectual privacy refers to the expansion of rights to include a
recognition of mans spiritual nature, of his feelings and his intellect, and the right to be let
alone. In other words, this gives the right to privacy in regards to intangible possessions.

Overall, there are a lot of privacy rights out there, and with the proper information, tools,
and tips, our society would be better equipped to ensure the protection of privacy of ones self
and have the knowledge to maintain that privacy. I think it is essential that one always questions
the information that they release, why they are releasing it, who they are releasing it to, and what
the consequences might be. This could make or break the future of the person. For example, if
you were to release a video of you doing illicit drugs as a teenager, that video could go viral, be
impossible to remove from the internet, and you would further have to explain yourself to
anyone that might come across that video. Now why would someone release something like that?
Maybe their friends thought it was cool at the time, or maybe they did, but did they think about
the consequences of their actions? I sincerely doubt it. Privacy is at ones fingertips, and it is
their job to ensure that they take full advantage of their privacy rights.

Privacy and the Internet: Settings Enabled


When it comes to a lot of different applications and technologies, there is a big emphasis
on privacy and the internet, where many websites, social networking sites, both online and
offline applications, cellphones, and other websites, have administrators that define a security
policy that contains specific security settings for each and every security aspect. There are two
places where the security policies may be established, this includes the local machine and in
active directories. Of course, if there are problems, the active directories are used as the primary
security policy and it overrides those defined by the local machine. It is important that one
familiarizes themselves about the privacy policy of any websites, social networking sites,
applications, and cellphones that they use to ensure maximum privacy protection, to know their
rights and what information is being released, and to change settings to ensure that all of this is
taking place. To look further into settings, I am going to analyze and describe the settings on my
social networks, online applications, and my cell phone.
First, there are my social networks, which consist of Facebook, Blackboard, and Vampire
Freaks. These sites all have privacy and security policy set in place, that are easy to find,
navigate, and change for the average user. When looking up information, I found an article on
ikeepsafe.org entitled What is the Norm for Privacy Settings on Social Networking Sites, which
reported that only 80% of users of these sites protect their profiles. The cause of this? Virtually
all social networking sites make public their default privacy setting. This means that people
have to know about the posts being public and must make the effort to change their privacy
settings to private. With this in mind, since privacy settings became more newsworthy, I decided
to change all of my settings about 2 years ago, where I changed everything to private, with the
exception of a couple profile pictures, cover photos, and random article shares on my newsfeed.

6
On Facebook I ensure that more things are kept private, that I limit the users that have access to
my information, by setting multiple friends as restricted so that they can only see my public
posts, and I decline a lot of friend requests of people that I do not socialize with. Similarly, with
Vampire Freaks, I have deleted a lot of old pictures of myself, I do not upload any pictures of my
children, limit the location set on my profile, and do not give any information about myself or
my family. Finally, Blackboard has the least information, as I do not need to provide much. I
have simply uploaded a picture to my account. Overall, I think I am doing well with maintaining
these privacy settings, and I have deleted a lot of old accounts attached to my name to ensure that
my information is not across the World Wide Web.
Secondly, when it comes to applications, I make sure to read the terms and conditions
and what they give access to. For example, Facebook Messenger application has an extensive
amount of settings where the user loses all rights to privacy and anyone can gain access to any
information spread. Instead of downloading this, I simply open up my browser on my cellphone
and use messenger on there to ensure that I maintain my privacy and reduce the risk of exposing
everything I say and do to the public.
Finally, the cellphone. I actually recently just purchased a new cellphone, the IPhone 5s,
after my old cellphone had been water damaged, and was yet to go through the applicable
settings, until now. I was happy to find that location settings and GPS were not enabled, this
ensures that when uploading or sending pictures, people would not be able to track my location
or the location where the pictures were sent, that people are unable to find my location through
sent messages, and so that the cellphone company cannot track my whereabouts. I was yet to set
up passcode lock, iCloud backup, find my iPhone, or the erase all data settings. So, these were all
in there defaults. My phone is now password protected, the pictures and information on my

7
cellphone are now backed up automatically through iCloud, I have downloaded and enabled the
find my iPhone application, and I have enabled the device, through the find my iPhone
application to allow me to remotely erase all data on the device to ensure my privacy if the phone
ever gets lost or stolen. This is essential because my last iPhone was stolen, never returned, and
had inappropriate pictures on it, that I would hate to have been leaked to the internet or seen by
anyone they were not meant for, and unfortunately, I did not have iCloud or the ability to erase
all the data remotely.
All in all, after going through my settings, I feel that I have previously, and am now,
ensuring that I am doing everything I can to protect my privacy and my information.

Privacy and the Internet: Is Privacy Dead?

Is privacy dead? The question that boggles everyone, while many people say that privacy
is completely and utterly dead, I feel that the answer to the question is no. Privacy is in the hands
of the user and it is only he or she that can fully kill his or her own privacy. It is true that our
privacy is more at risk, with all of the technological innovations over the decades, than it was
before, but it is difficult to argue that privacy is completely dead because of the information,
settings, tips, and tricks that are available to us. Not only do we have complete control over the
information that is spread, the information we allow to be released, who the information is
released to, and when it is released, websites, social networking sites, and cellphones, have made
it incredibly easy to ensure that these settings are enabled. All it takes is a few minutes of
research online into how to protect my privacy on any of these web based platforms, and voila,
the information, step by step guidelines, etc. are at the touch of the users fingertips!

One should not simply get over a lack of privacy, they should educate themselves on
the resources available to protect their privacy and know their privacy rights. As the article by
Mike Elgan in the text, How Buzz, Facebook, and Twitter Create Social Insecurity, outlines, it
is not as simple as saying you have zero privacy anyways, so get over it. Its much more difficult
than that, as now, compared to over a decade ago, we have social services that exist that werent
available back then, and the privacy issue and debate has gone viral. We still have to worry about
governments, corporations, and companies, but now employers, criminals, family members,
friends, acquaintances, etc. have been added to the mix. There may be a lot more information
available, and privacy is becoming more difficult to protect, but that is why websites,

9
applications, and social networking platforms have the security settings that they do. To give the
user the right to protect their information, change their information protection, and decide the
settings for themselves.

If one wants to ensure their privacy, it is as simple as not using any new technologies,
and just worrying about what was there in the past. However, this is becoming more and more
difficulty with the availability of technology now a days, and how easy it is to perform tasks that
used to take hours upon hours. Who wants to send letters if they need a quick response, why not
just send an e-mail?

All in all, there is the strange new applicable reality of social insecurity, and people have
to become more in tune with their privacy rights to ensure their privacy. As the article outlines,
the best we can do is make the violation of our privacy a little less convenient for those who
would exploit us. All I can say is, do your research, know your rights, change your settings to
suit your needs, and ensure that no one has more information than they require about you.

10

Privacy and the Internet: Internet Altered Thought Process


According to the article by Sharon Begley, Your Brain Online, many psychological
research projects, discussions, and debates today are trying to determine if the internet changes
the way one thinks. Although different psychologists and neuroscientists can argue both sides,
(1) the internet hasnt change the way we think, it has provided us with unprecedented access to
information, but it hasnt changed what [our brains] do with it, and (2) the internet has changed
the way we think as the internet fosters shallowness, credulity, and distraction, with the result
that our minds struggle to discipline and deploy our attention on one thing. In my opinion, it is
inevitable, the internet changes the way that we think and alters our thought process. It does not
alter the brain, so to speak, as neurologists point out as the internet hasnt changed what our
brains do with the information, but it does alter the way we think and how we gather the
information.
Specifically, according to How Computers Change the Way we Think, the tools we use
to think change the way in which we think. With the information available to the user at the
touch of his or her fingertips, there is a plethora of more information available to the user, and
the ability to gain both reliable and unreliable sources. Writing continues to remain our primary
information technology, today, with the impact of all of societys technological innovations, we
think primarily of the computer as a quick source of information. With the internet on the
computers, we can simply open a browser, type in the question we are wondering and have
millions of results come up. No longer do we have to go to a library, borrow books, or read
actual newspapers. Now, we have worldwide newspapers, books, libraries, encyclopedias, etc.
available to us in just a few short seconds. Technology has changed significantly, and with that,
so has our societal norms. According to this very article, there are a plethora of areas that one can

11
witness information technology encouraging changes in ones thought process. Whether these
changes are good or bad varies from person to person, and can be solely dependent on the
information found, gained, how one uses it, and what their intentions are. Some of these areas
consist of, but are not limited to:

Thinking about privacy, specifically, as outlined in a response above, one has to search,
educate themselves, and ensure their own privacy. This becomes more difficult in
comparison to the past as people have to do their own research, and cannot simply join,
post, or share anything without the possibility of them being leaked to the entire world.
Privacy has become a very popular news and studied topic today. With personal family
issues that have come up in my past, I have become a lot more self-aware and protective
of my information and the people I talk to with technology in the mix.

Avatars or a self? Specifically, with all the games and networks available, people begin to
develop alternate personas of said avatars, and develop a difficulty in expressing
themselves. However, through these sources, one who is secluded and lonely can develop
friendships without being wary of intimacy. This is not much of a stretch from playing
Dungeons and Dragons, a game of both the past generations and the present, but it does
increase the risk of talking to some dangerous predators. In the past, I had developed
alternate personas and felt unexplained attachments to them. I felt connections with
people that were perceived as real, but were entirely made up and developed out of madeup context.

Text, what does it mean? Unfortunately, when it comes to technology and text, depending
on the context in which it is written, and can be taken and inferred any number of ways.
This can change a happy, joking environment to a negative, hostile environment from a

12
simple miscommunication, spelling error, or auto-correct text. This can manipulate our
thoughts and make it difficult to determine what the person meant without talking oneon-one. I know I have had difficulties with this, and my significant other struggles to
properly word himself through text, he is much more fluent talking on the phone or in
person. Whereas, I am shy, and typing and texting enables me to release my true feelings,
without being scared and shying away from them. I feel more comfortable talking online
than I do in person, and being able to talk online and take school courses online makes it
so that the social interactions do not have to feel so awkward for me, I can communicate
with people with ease, and I do not have difficulty saying how I think or what I feel.

Of course, like everything, you can argue both sides, but with my personal experience, I
can definitely agree with a lot of people in saying that the internet does alter the way I think
and my personal thought processes!

13

Privacy and the Internet: Internet and Neurological Effects


The internet and technology are not only here to stay, but technological innovations make
it so that technology and the internet are expanding and evolving at an exponential rate. The
internet, as outlined above, does have effects on the brain and ones thought process. Whether
these effects are positive or negative is solely dependent on the individual situation. With that
being said, there is no question that it is possible for the internet to have both positive and
negative effects on ones brain.
On the one side, the internet can pose positive effects on ones brain. According to
Psychology Todays article, Your Brain on Google: Patterns of Cerebral Activation during
Internet Searching, recent research has suggested that spending time in mentally challenging
tasks may improve brain health and delay cognitive decline. Specifically, with the rapid
expansion of technology over the years, a large percentage of the world is engaging in the mental
challenge of searching the internet a few times a day. Although the internet is very popular
among the younger generations, a large amount of older adults, aged 18-29, adding up to 88%
use the internet as well. A couple of advantages that children, although adults have been taking
advantage of the technology of todays day and age, consist of, but are not limited to:

Preparation for the future technology is a stepping stone to the future, and with our
technological day and age, to not be able to use technology would make it difficult to
thrive and advance in life without it. Technology can be seen in all fields of work and is
essential to ones growth. With this in mind, by having a good grasp on technology, how
to use it, and an extensive knowledge, one is paving their way for future success.

Educational Tools specifically, there are a lot of resources available to the user that are
amazing tools to develop learning and to encourage creativity. There are an abundance of

14
programs that teach children and adults alike math, reading, language, multiple
languages, history, science, psychology, etc. skills. In addition to this, the resources at
ones fingertips are countless including social networking sites, the world wide web,
academic web sites, journal web sites, encyclopedia, research papers, medical decisionmaking tools, medical education resources, electronic books, music, global news, etc.
This enables learning, and the possibilities are endless. Where one can go with all of this
information is completely up to them. This is a positive spin to ones mind as it enables
the thought process, develops the mind, and keeps the mind working by researching and
gaining more knowledge.

On the contrary, where there are advantages, there are always disadvantages. A few of the
arguable negatives associated with neurology consist of, but are not limited to:

Health Effects technology can be attributed to health problems, but it is not necessarily
the technology itself that causes these problems. These problems lay in the decisions of
the users, where a lot of people do not limit their daily use of technology and this can be
tied to a very sedentary lifestyle. Where children used to always want to play outside,
children are absorbed into technology, from video games and the computer, to cell
phones and tablets. One of the biggest risks of living a sedentary lifestyle is obesity.
Unfortunately, in todays day and age, obesity, especially childhood obesity is on the rise.
There are many reasons why this is, such as the availability and inexpensive fast-food
options, the fear of society due to everything in the media, technology encouraging a lack
of physical activity, and parents not encouraging more activity in the day and limiting
technology.

15

Addiction technology can be very addictive for some, especially video games,
including online gaming sites and social network gaming. Kids have difficulty putting
technology down in the fear of missing out on something or not finishing a game.

Time Consumption when using the internet, time flies, where hours can pass and it feel
like seconds. This can be difficult when people do not limit their time using technology.

With both of these positive and negative effects that can be applicable to ones self, it
becomes very apparent that the key to successful use of technology is to balance the positive and
negatives through moderation and set times. By using technology in an intelligent way, one can
maximize the benefits that come with our technological availabilities and minimize the
drawbacks that can be associated with over-use. Overall, like any other aspect of life, the
outcome of technology is entirely in the hands of the users and/or his or her parents/guardians!

16

Bibliography

Privacy. (n.d.). Retrieved November 1, 2014, from


http://en.wikipedia.org/wiki/Privacy#Personal_privacy

What is the 'Norm' for Privacy Settings on Social Networking Sites? (n.d.). Retrieved November
1, 2014, from http://www.ikeepsafe.org/be-a-pro/privacy/what-is-the-norm-for-privacy-settingson-social-networking-sites/

Beekman, G., & Beekman, B. (2012).Digital planet: Tomorrow's technology and you (Complete
10th ed.). Boston: Prentice Hall.

Your Brain on Google: Patterns of Cerebral Activation during Internet Searching. (n.d.).
Retrieved November 1, 2014, from
http://www.psychologytoday.com/files/attachments/5230/136.pdf

You might also like