Professional Documents
Culture Documents
Goodwill of The Unhappy Employee Was Most Likely Restored
Goodwill of The Unhappy Employee Was Most Likely Restored
- Our personal data from every account or profile we create online ends up in the cloud
where it exists indefinitely. Once there, our data can be hacked, viewed by
unauthorized personnel, or sold to advertisers. Sometimes it ends up on the dark
web in the hands of criminals.
- Sensitive financial information and our medical data are stored in networks that are
frequently breached. Wearable devices track our vital signs, exercise frequency, and
lifestyle patterns. The end user doesn’t know where all the massive data are stored, as
U.S. consumers are largely unprotected in a yet barely regulated market.
Disinformation and Election Tampering. Researchers tell us that social media have
changed how we consume information and form opinions.
- Such charged information environments make people vulnerable to misinformation.
False news stories and doctored narratives, including targeted disinformation confuse
the public.
- Even more troubling, though, is stealthy interference by foreign agents who use
large bot armies to disseminate fake news stories on social media and incite conflict
to deepen sharp divisions among the American public. Bots are also used to steal
social identities of people by impersonating them. Our carefree sharing on social
media can provide criminals with clues.
Deepfakes, Doctored Videos.
- Advances in AI could soon make creating fake video and audio a lot easier,
permitting ever more sophisticated disinformation.
- Altering photos and videos to distort the truth is not new, but deepfake technology
takes deception to a whole new level. Computers can be trained to synthesize facial
features and create composites of realistic-looking humans. It’s easy to see how such
tampering could be weaponized before an election or might threaten national security;
likewise, people could claim that real videos are fake. Alarmingly, this is already
happening as sizable Internet communities aggressively proclaim the moon landing in
1969 was staged, the Earth is flat, and the terror attacks of 9/11 were “an inside job.”
Incivility, Trolling, and Cyberbullying. The anonymity of the Internet facilitates toxic
behavior. Trolls are users who fake their identity, provoke skirmishes, and disrupt
discussions on social media. They can be vicious bullies who thrive on denigrating others.
Social media may originally have been idealized as a public square whichguaranteed
participants a practically unlimited freedom of expression.
- Cyberbullying is a particularly devastating form of online harassment through the
sharing of embarrassing information online, persistent messaging, and other digital
nastiness.
- In extreme cases, cyberbullying on social media— via texts, e-mails, and other
electronic means has driven victims, many of them teenagers, to despair.
Data Security. Spyware. Ransomware attacks. Phishing. Data breaches. Romance scammers
on dating sites. Fake bot accounts. Hacking of connected security networks. Vulnerabilities in
smart speakers and connected cars. These are but a few problems ranging from annoying to
highly problematic and downright fraudulent. Businesses face a huge expenditure of time and
money combatting cybercrime and ensuring safe data storage.