The Value of Digital Privacy in an Information Technology Age
Tara Brooks
Professor Bristow, J.D.
Law, Ethics and Corporate Governance, LEG 500
4 May 2012
Abstract
How many of us have paused during conversation in the past several years, suddenly aware that you might be eavesdropped on? Probably it was a phone conversation, although maybe it was an e-mail or instant-message exchange or a conversation in a public place. Maybe the topic was terrorism, or politics, or your church service. You pause suddenly, momentarily afraid that your words might be taken out of context, and then you laugh at your paranoia and go on. But your demeanor has changed, and your words are subtly altered. Privacy is a growing concern in the United States and around the world. As we increasingly use the Internet and the seemingly boundary less options for collecting, saving, sharing, and comparing information trigger consumer’s worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Privacy is very important-especially on the Internet. It is amazing how many websites are designed to reveal private details about people—actually it is a little scary. In this paper, I will be discussing different topics on the value of digital privacy. Keywords: privacy, personal information, digital privacy
1. List and describe at least three (3) technologies that allow an individual to research citizens’ private data.
The three technologies that allow an individual to research citizens’ private data are Bluetooth, GPS, and Google (Internet).
References: Halbert, T., & Ingulli, E. (2012). Law & ethics in the business environment (7th ed.). Mason, OH: South-Western Cengage Learning http://autos.aol.com/article/gps-thief-home-invasion/ http://www.ehow.com/list_6068148_bluetooth-advantages-disadvantages.html#ixzz1u3e6jVDc http://hassam.hubpages.com/hub/Types-Of-Bluetooth-Hacks-And-Its-Security-Issues http://techgyo.com/index.php/3-major-advantages-gps-tracking-system/#ixzz1u44hGdujsOME