Professional Documents
Culture Documents
Order 36318.edited
Order 36318.edited
Name
Instructor
Course
Date
Online Privacy
Even though privacy has become a matter of concern in the past recent years, many
people are yet to understand it fully. Human beings value the protection and privacy of their
personal lives. No one is comfortable with having confidential matters about them being in the
public eye. The 21st century marked the commencement of big data and the advancement of
information technology, together with the development of high-tech organizations. The paper
seeks to look at online privacy and how it is related to information technology. Developments in
information technology today affect privacy where the quantity of control over individual data is
rights search as personal autonomy and freedom Saeri et al. feels that respecting the privacy of
others is a duty that does not allow room for any exceptions (3). Personal information is one that
is connected to an individual person. There are various categories of private information that
include the body’s privacy, personal communication, personal information, and information
The up-to-date technologies almost go hand in hand with confidentiality from biometrics,
heredities to smartphones, big data, and social media. Fefer proves that there are two receptions
Surname 2
that hold a vast range of technology, together with the implication on individual and cloistered
information (2). The first reception is that all the data of people are in a way held by the
Information Technology world that shows that people have no privacy in the technology world
where the digital era has taken control. It shows that there is no substitute technique for the
protection of secrecy and moving past it. The last reception carries that one’s privacy and
personal information is imperative than ever. Privacy is, therefore, a critical aspect to the society
as it helps in the formation of relationships that allow people to know part of themselves to
friends and family while keeping from the rest of the world.
Security, privacy, and trust are all interlinked to form ethics and laws. The measure of
security and privacy are different with each person and depend on diverse factors. For instance,
in the health sector, privacy may have ethical values that vary when compared to other sectors,
like finances and banking. Saeri et al. insist that trust is dependent on privacy security and
safeguarding (18). Ethics grand people the measure of the law, where they offer individuals to
trade different data fairly. Breach in privacy may result in the dilution of measures of privacy
and loose of trust, which is an implication defilement of the ethical issues and degradation to the
law. Policies and law regulations for the protection of data are expected to be economically
good, efficient, and ethical. They should also be accepted by all people by all means and basis.
The data discretion shield is perilous and multifaceted in the world of today.
Barth insists that the changes in technology have altered the ordinal universe and are now
on the verge of taking over personages’ confidentiality (58). As the access to information and
connectivity increases, the threats to the breach of personal data increases. With every day that
Surname 3
passes, social media plays an imperative role and is an integral part of the activities that people
perform in their daily lives. Social media privacy has, therefore, become more critical than ever.
Hacking on social platforms like Twitter, Facebook, and Instagram may share valuable
information. Cyberbullying and stalking have turned out to be a threat, where social media is
making it easy to perpetrate it. Fefer says that the use of the by the public generates vast amounts
of data during online surfing, which provides the insight of the user and, apart from this, offer
voluminous statistical data (13). Big data affects just online operators, even though depending on
the data that is shared with other individuals, there may consequence to online operators.
Information technology affects surveillance tasks. ICT techniques are used in the digital
domain normally. Online systems such as social media are essential in obtaining large sums of
material about other folks. Barth et al. say that machine learning techniques and data are used to
create estimate copies of distinct users that can be used (57). The use of upright encryption
methods in communication structures that make it tougher to collect operative scrutiny material,
Information technology provides design methods that concentrate on privacy, which has
principle guidelines for the preservation of the security of the users. The privacy by design
method has rendered online security a centered stage in all phases from the first design to the
final product. Also, technology provides various tools for users to get privacy in some form.
Technology offers various that allows users to share and browse content through unspecified
Cryptography is a scheme that has been applied in the protection of data. Techniques of
modern cryptography like homomorphic encryption are widely used today as probable methods
Surname 4
for the protection of data. Feng et al., the technique undertakes calculation on information that
has been initially encrypted without having to decrypt it (45). The online privacy of
data and privacy. Lastly, technology has a means of permitting and substantiating folks to have
admission to their schemes and accounts in an association over the network. Feng et al. present
that ethics and policies in identity management play a critical role in the technology world to
reduce misuse and fraud (47). The management of identity in an organization plays a vital role in
the breach of data and security plans since many organizations offer access to the workers
Conclusion
Online privacy is critical for the preservation of human respect, and it plays an imperative
role in society when it comes to the maintenance of relationships that are stepping stones of a
well-functioning and happy society. If internet privacy was not a thing, affectionate and social
associations among individuals would take downside, and there would be many differences.
Once one's data is exposed and collected, it cannot be undone. With the upsurge in dispensation
power and competences in technologies that maintain a keen lookout on every move of
processing of the data facts of our lives to massively budding data. There is, therefore, a lot of
potential in online privacy, and serious considerations should be made on how society addresses
Works Cited
Barth, Susanne, et al. "Putting the privacy paradox to the test: Online privacy and security
behaviors among users with technical knowledge, privacy awareness, and financial
Fefer, Rachel F. "Data Flows, Online Privacy, and Trade Policy." CRS Report 45584 (2019).
Feng, Yang, and Quan Xie. "Privacy Concerns, Perceived Intrusiveness, and Privacy Controls:
43-57.
Saeri, Alexander K., et al. "Predicting Facebook Users' Online Privacy Protection: Risk, Trust,