Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

PRIVACY ISSUE 1

Privacy Issues in technology: Is access to technology worth the potential loss of privacy?

Yashpreet Singh Matharu

2018090752

19W-C-ON-B2

Zohreh Daeizadeh

Yorkville University
PRIVACY ISSUE 2

Privacy Issues in technology: Is access to technology worth the potential loss of privacy?

In this growing world of technology, there are multifarious advantages of it to its clients.

But on the flip side privacy is one of the most issued sectors and moreover there is an immense

risk on sharing personal information. To continue with this in this piece of information we would

be talking about the threats and ways in which our personal stuff can be misused though these

advances machines at a specific situation. Looking toward the social organizations are linked

nature and possibility of operation might be connected. There is some amount of public data

which is being sold by the high-profile companies and government too. Also, personal

information can lead to crimes and offences. GPS and Online bank conversations is equal to

opening the wallet to public, a vehicle on for itinerants to exploit and misrepresent. Rigorous

measures to ensure the defense of individuals wherever around the globe turns into a quick need

considering the ongoing ruptures of securities in banks, real online networking sites and family

sites. The harm of risky information, for example, economic balance statistics, private location,

present part, and personal photographs can't be compensated without anyone else's input

powerful vehicles and devices that play music by tuning in to sound instructions.

Privacy is one of the most important things for an individual, the privacy is disturbed it

can affect the feelings, emotions and identity, it can also lead to loneliness. In this contemporary

world of technology privacy is being exploited at a greater extent. But cybercrime and anti-crime

related agencies are working hard to increase the privacy and identity the thefts. For one is a key

perfect for people to have grasped over the data they wish to accommodate the associated
PRIVACY ISSUE 3

workplaces, with resolves and the whole biosphere. In any circumstance, the lacking age

authorize safekeeping to the clients; is an issue of straight communication? Furthermore, this

digitized era guarantees confidentiality to the clients of expertise, is also doubtful. The

serviceable advantages of safety, for example, namelessness and pseudonym through web-based

interacting mass media, at public house or out ensure a person's life and furthermore their honest

spirits of peacefulness.

In any case, the companies need to give the facility of cyber-protection and online-safety

they need to increase the service by innovating new software (Rathore, Sharma, Vincenzo,

Jeong, Hyuk, 2017). Moving toward the new software to speed up the process of digitization to

make the servers safe and easy to use. Companies should investigate the matter of money as

securing the internet is bit costly and they should depreciate the prices of security to make people

safe from leaking privacy. By stopping the overuse of mobile phones can help to oppose the

unescapable utilization of cell phones which is directly linked to web-based threats and fears.

Furthermore, new era has made human life inactive. Introduction of new technology has changed

the lifestyle and way of looking of the people around the world. in this people would be properly

attached to the outer environment and the people who are breaking the privacy would stay away

as they would not have any thing to break-in and commoners would be safe from the problem

(Al-Gardaí M.A, 2016). Most of the general public think that protection against cyber is one of

the thing that government agencies should facilitate, or they can give the same opportunity to the

private organizations, this would create more faith on the web which can be a helping-hand for

the working class. This is because people use the internet for many purposes, as this makes it

easy for them to store their data and precious information. Privacy is the only thing which every

person requires and keeping the social limits would help keeping maintain relation and moral
PRIVACY ISSUE 4

values. Breaking any type ethical value can unbalance the social circle and can also cause

conflicts between the people (Kibet A, Ward S, 2019).

Majority of people are concerned about their daily affairs such as their family, work and

their social life, and most of them are trading information on trust bases as they are sharing their

data to administrations, associations, and individuals as they have faith that their data is protected

disagreeing on the account of experts such as legal advisors, medical specialist to an individual

assistant impact the genuineness of the relationship.

Further continuing, commoner’s do not display their demand to the government and

organization, they agencies should investigate the matter look for the public demands without

just judging only the demanded issues, they can just get over these issues by getting the problem

from old reviews and local public. The probable to convert the downsides and moving upon the

better side to get over the public issues (Varathan K.D, 2016). If the privacy of a person is

dwindled can affect the relationship between the people and can also shameful at some

situations. And being reported the developers and software should investigate the matter and get

over the issue. Additionally, safety/confidentiality guarantees a person's right to highlight the

limits where their life turns into nobody is the same old thing yet their own.

It is an armor from embarrassment, dishonor and indignant decision from individuals

who don't understand the condition. Unbearable over other's impression of one's life, it is

allowancing that protection expels from the shoulders. In the ways of setting up the consequence

of privacy in an individual's life, it is equally important to know the job of modernization its

unlimited access to separate information. The progressive move from origination being a luxury

to turning into a flat out need determines that it is getting gradually doubtful for individuals to
PRIVACY ISSUE 5

outflow its hold (Duncan Smeed, 2013). Cracking from connected life, mobile phones, and

different gadgets is disgraceful for this period because of the reused provision of how helpful

these things are for one's psychological reliability and honesty. Innovation is operated in each

part of one's life. Nevertheless of whether one appeals sustenance from the most unfriendly

edges of the city or gives to newcomer motivations suspended on the opposite side of the planet,

whether it's the space of a task or viewing a motion picture at home, or whether one figures up a

relationship with an unattainable to their reality or finds a real reality assistant from a seeing

submission, it is not part of human life where origination is not applied (Dante, 2010). A quicker

inspection of system life discovers that the relations adjoining to an individual imagine that

separate reliably to be available and stay in reliable communication (Claire, 2012).

Moreover, companies, partners and families should not ever leave to acknowledge the

effects the developers, the over usage of internet and dissimilar kinds of connection needs to

rapid a happiness emergency between the world's youths. Websites such as google, Instagram

and twitter are overpowering the people to use the at high scale internet. Such high standard

technology is being used by higher authorities and government offices to separate from smaller

scale targets offices (Kibet A, Ward S, 2018). Overusing of smart cameras, telephones and web

stuff not good for the mental health and privacy but public is not understanding the depth of the

problem. This is just because this problem seems to be a small problem by the overlook, but

public should also be concerned about their own problems and should always try to be on the

safe side of the privacy.

Furthermore, privacy is one of the most important thing far a person and our whole

world needs to stand up together to for a protection shield against the cybercrime in the advance
PRIVACY ISSUE 6

time. Government and internet engineers need to make the system more secure and the data must

need to be gathered in a secure server. This would give the use person to the decision to take part

their own action. The damage of safety is an inimitable damage of chance. Thought of man held

interests to make their relation a hold joint with their near and dear one. Internet security is one

of the most in which created a safe side with the better choice (Christakis DA, 2009). Such

problems can decline their trust on the internet and the internet is remained a fake pretense for

the fights. Administrators are cleaning up the servers to relate the economic compound (Hinduja

S, Patchin J, 2007).

To sum up, life of a people is revolving around the methodology of advancement will be

degrading the safety of people, there are numerous things such as online bank stuff and private

stuff which can be disastrous for a person’s life, they can meet with authorities to meet the

requirement. Its clearly true, privacy is the only thing that a person can be revealed by an

individual only.
PRIVACY ISSUE 7
PRIVACY ISSUE 8

References

Hinduja S, Patchin J. Offline consequences of online victimization: school violence

delinquency. J Sch Violence. 2007;6(3):89–112

Christakis DA, Moreno MA. Trapped in the net: will internet addiction become a 21stcentury

epidemic? Arch Pediatr Adolesc Med. 2009;163(10):959–960

Ybarra ML, Mitchell KJ. How risky are social networking sites? A comparison of places online

where youth sexual solicitation and harassment occurs. Pediatrics. 2008;121(2).

Available

at:www.pediatrics.org/cgi/content/full/121/2/e350

Hinduja S, Patchin JW. Bullying, cyberbullying, and suicide. Arch Suicide Res. 2010;14(3):206

Barnes S. A privacy paradox: social networking in the United States. First Monday.

2006;11(9).Available

at:http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1394/1312

Accessed July 16, 2010 221

Claire R., Chris R.S. Privacy Bucket attack on numeric set watermarking model and safeguards

Information Security Technical Report, Volume 16, Issue 2, May 2011, pp. 59-66
PRIVACY ISSUE 9

Dante S. Social networking threats Information Security Technical Report, Volume 16, Issue 2,

2011, p. 37

Al-Garadi M.A., Varathan K.D., Ravana S.D. Cybercrime detection in online communications:

The experimental case of cyberbullying detection in the Twitter network Computers in

Human Behavior, Volume 63, 2016

Kibet A., Ward S.Socially Networked Heterogeneity: The Influence of WhatsApp as a Social

Networking Site on Polarisation in Kenya African Journalism Studies, Volume 39, 2018

George R.S. Weir; Fergus Toolan; Duncan Smeed. Elsevier BV. 2013;28(8):87-98

Shailendra Rathore, Pradip Kumar Sharma, VincenzoLoia, Young-Sik Jeong, Jong Hyuk Park

Social network security: Issues, challenges, threats, and solutions Information Sciences,

Volume 421, 2017, pp. 43-69

Image retrieved from: - https://www.flickr.com/photos/111692634@N04/18709586962

Image retrived from:- https://www.mohawkcollege.ca/student-life-at-mohawk/student-technical-

support/cyber-security-awareness
PRIVACY ISSUE 10

You might also like