Privacy Issue 1: Zohreh Daeizadeh
Privacy Issue 1: Zohreh Daeizadeh
Privacy Issues in technology: Is access to technology worth the potential loss of privacy?
2018090752
19W-C-ON-B2
Zohreh Daeizadeh
Yorkville University
PRIVACY ISSUE 2
Privacy Issues in technology: Is access to technology worth the potential loss of privacy?
In this growing world of technology, there are multifarious advantages of it to its clients.
But on the flip side privacy is one of the most issued sectors and moreover there is an immense
risk on sharing personal information. To continue with this in this piece of information we would
be talking about the threats and ways in which our personal stuff can be misused though these
advances machines at a specific situation. Looking toward the social organizations are linked
nature and possibility of operation might be connected. There is some amount of public data
which is being sold by the high-profile companies and government too. Also, personal
information can lead to crimes and offences. GPS and Online bank conversations is equal to
opening the wallet to public, a vehicle on for itinerants to exploit and misrepresent. Rigorous
measures to ensure the defense of individuals wherever around the globe turns into a quick need
considering the ongoing ruptures of securities in banks, real online networking sites and family
sites. The harm of risky information, for example, economic balance statistics, private location,
present part, and personal photographs can't be compensated without anyone else's input
powerful vehicles and devices that play music by tuning in to sound instructions.
Privacy is one of the most important things for an individual, the privacy is disturbed it
can affect the feelings, emotions and identity, it can also lead to loneliness. In this contemporary
world of technology privacy is being exploited at a greater extent. But cybercrime and anti-crime
related agencies are working hard to increase the privacy and identity the thefts. For one is a key
perfect for people to have grasped over the data they wish to accommodate the associated
PRIVACY ISSUE 3
workplaces, with resolves and the whole biosphere. In any circumstance, the lacking age
digitized era guarantees confidentiality to the clients of expertise, is also doubtful. The
serviceable advantages of safety, for example, namelessness and pseudonym through web-based
interacting mass media, at public house or out ensure a person's life and furthermore their honest
spirits of peacefulness.
In any case, the companies need to give the facility of cyber-protection and online-safety
they need to increase the service by innovating new software (Rathore, Sharma, Vincenzo,
Jeong, Hyuk, 2017). Moving toward the new software to speed up the process of digitization to
make the servers safe and easy to use. Companies should investigate the matter of money as
securing the internet is bit costly and they should depreciate the prices of security to make people
safe from leaking privacy. By stopping the overuse of mobile phones can help to oppose the
unescapable utilization of cell phones which is directly linked to web-based threats and fears.
Furthermore, new era has made human life inactive. Introduction of new technology has changed
the lifestyle and way of looking of the people around the world. in this people would be properly
attached to the outer environment and the people who are breaking the privacy would stay away
as they would not have any thing to break-in and commoners would be safe from the problem
(Al-Gardaí M.A, 2016). Most of the general public think that protection against cyber is one of
the thing that government agencies should facilitate, or they can give the same opportunity to the
private organizations, this would create more faith on the web which can be a helping-hand for
the working class. This is because people use the internet for many purposes, as this makes it
easy for them to store their data and precious information. Privacy is the only thing which every
person requires and keeping the social limits would help keeping maintain relation and moral
PRIVACY ISSUE 4
values. Breaking any type ethical value can unbalance the social circle and can also cause
Majority of people are concerned about their daily affairs such as their family, work and
their social life, and most of them are trading information on trust bases as they are sharing their
data to administrations, associations, and individuals as they have faith that their data is protected
disagreeing on the account of experts such as legal advisors, medical specialist to an individual
Further continuing, commoner’s do not display their demand to the government and
organization, they agencies should investigate the matter look for the public demands without
just judging only the demanded issues, they can just get over these issues by getting the problem
from old reviews and local public. The probable to convert the downsides and moving upon the
better side to get over the public issues (Varathan K.D, 2016). If the privacy of a person is
dwindled can affect the relationship between the people and can also shameful at some
situations. And being reported the developers and software should investigate the matter and get
over the issue. Additionally, safety/confidentiality guarantees a person's right to highlight the
limits where their life turns into nobody is the same old thing yet their own.
who don't understand the condition. Unbearable over other's impression of one's life, it is
allowancing that protection expels from the shoulders. In the ways of setting up the consequence
of privacy in an individual's life, it is equally important to know the job of modernization its
unlimited access to separate information. The progressive move from origination being a luxury
to turning into a flat out need determines that it is getting gradually doubtful for individuals to
PRIVACY ISSUE 5
outflow its hold (Duncan Smeed, 2013). Cracking from connected life, mobile phones, and
different gadgets is disgraceful for this period because of the reused provision of how helpful
these things are for one's psychological reliability and honesty. Innovation is operated in each
part of one's life. Nevertheless of whether one appeals sustenance from the most unfriendly
edges of the city or gives to newcomer motivations suspended on the opposite side of the planet,
whether it's the space of a task or viewing a motion picture at home, or whether one figures up a
relationship with an unattainable to their reality or finds a real reality assistant from a seeing
submission, it is not part of human life where origination is not applied (Dante, 2010). A quicker
inspection of system life discovers that the relations adjoining to an individual imagine that
Moreover, companies, partners and families should not ever leave to acknowledge the
effects the developers, the over usage of internet and dissimilar kinds of connection needs to
rapid a happiness emergency between the world's youths. Websites such as google, Instagram
and twitter are overpowering the people to use the at high scale internet. Such high standard
technology is being used by higher authorities and government offices to separate from smaller
scale targets offices (Kibet A, Ward S, 2018). Overusing of smart cameras, telephones and web
stuff not good for the mental health and privacy but public is not understanding the depth of the
problem. This is just because this problem seems to be a small problem by the overlook, but
public should also be concerned about their own problems and should always try to be on the
Furthermore, privacy is one of the most important thing far a person and our whole
world needs to stand up together to for a protection shield against the cybercrime in the advance
PRIVACY ISSUE 6
time. Government and internet engineers need to make the system more secure and the data must
need to be gathered in a secure server. This would give the use person to the decision to take part
their own action. The damage of safety is an inimitable damage of chance. Thought of man held
interests to make their relation a hold joint with their near and dear one. Internet security is one
of the most in which created a safe side with the better choice (Christakis DA, 2009). Such
problems can decline their trust on the internet and the internet is remained a fake pretense for
the fights. Administrators are cleaning up the servers to relate the economic compound (Hinduja
S, Patchin J, 2007).
To sum up, life of a people is revolving around the methodology of advancement will be
degrading the safety of people, there are numerous things such as online bank stuff and private
stuff which can be disastrous for a person’s life, they can meet with authorities to meet the
requirement. Its clearly true, privacy is the only thing that a person can be revealed by an
individual only.
PRIVACY ISSUE 7
PRIVACY ISSUE 8
References
Christakis DA, Moreno MA. Trapped in the net: will internet addiction become a 21stcentury
Ybarra ML, Mitchell KJ. How risky are social networking sites? A comparison of places online
Available
at:www.pediatrics.org/cgi/content/full/121/2/e350
Hinduja S, Patchin JW. Bullying, cyberbullying, and suicide. Arch Suicide Res. 2010;14(3):206
Barnes S. A privacy paradox: social networking in the United States. First Monday.
2006;11(9).Available
at:http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1394/1312
Claire R., Chris R.S. Privacy Bucket attack on numeric set watermarking model and safeguards
Information Security Technical Report, Volume 16, Issue 2, May 2011, pp. 59-66
PRIVACY ISSUE 9
Dante S. Social networking threats Information Security Technical Report, Volume 16, Issue 2,
2011, p. 37
Al-Garadi M.A., Varathan K.D., Ravana S.D. Cybercrime detection in online communications:
Kibet A., Ward S.Socially Networked Heterogeneity: The Influence of WhatsApp as a Social
Networking Site on Polarisation in Kenya African Journalism Studies, Volume 39, 2018
George R.S. Weir; Fergus Toolan; Duncan Smeed. Elsevier BV. 2013;28(8):87-98
Shailendra Rathore, Pradip Kumar Sharma, VincenzoLoia, Young-Sik Jeong, Jong Hyuk Park
Social network security: Issues, challenges, threats, and solutions Information Sciences,
support/cyber-security-awareness
PRIVACY ISSUE 10