Preview

The Value of Digital Privacy in an Information Technology Age

Better Essays
Open Document
Open Document
1280 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Value of Digital Privacy in an Information Technology Age
ASSIGNMENT 2:

THE VALUE OF DIGITAL PRIVACY
IN AN INFORMATION TECHNOLOGY AGE.

BY: JERMAINE WEST

1)

1) List and describe at least three (3) technologies that allow an individual to research citizens’ private data.

The first technology that is looked into is cloud computing. Cloud computing in
General is for anything that involves delivering hosted services over the internet. These services are broadly divided into three categories: Infrastructure-as-a Service (IaaS), Platforn-as-a Service (Paas) and Software-as-a Service (SaaS). The name cloud computing was inspired by the cloud symbol that’s often used to represent the internet flowcharts and diagrams. (Search Cloud Computing by Margaret Rouse: Dec 2010) A second form of technology that has been around is Facial Recognition technology. Facial recognition has been around for three decades. But mobile and social revolutions are rapidly driving the field forward, as digital photos proliferate, cloud computing powers accelerate and software capabilities advance. Tech giants including Google, Apple, Microsoft, and Yahoo also employ facial recognition technology in photo, video and gaming products, as do a handful of lesser known mobile application companies. Facial recognition is a computer application for automatically identifying of verifying a person from digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features rom the image and a facial database. The third form of technology that is being used is called Detective Mode. The Federal Trade Commission (FTC) said “a software company called DesignWare sold a 2)

Program that helped rent-to-own stores track and recover rented computers. The software contained a program known as “Detective Mode” that tracked renter locations and collected payments from them if the computer was not returned”, the FTC said.
The program could log



References: Search Cloud Computing by Margaret Rouse: Copyright Dec 2010 Information Commissioner’s Office (ICO) Website, What Security Measures Should I take To Protect the Personal Data I Hold? Opposing Views Website Patriot Act: Pros and Cons By: Alex Groberman copyright May 30, 2011 EPIC. Org (Electronic Privacy Information Center)

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Stanford and University of California alumni Sandra Lim reads from The Wilderness on April 7, 2015, at Prairie Lights. As an alumna from the International Writing Program Lim was making her return back to Iowa City after 11 years. In The Wilderness Lim reads a collection of poems about love, spring and one poem that caught my attention was about the individual struggle of one's body within one’s mind. The poems are open to many interpretations but that is the way that I chose to interpret that poetry in particular. The interesting thing about Lim’s poem is how describes the body parts in some of her poems. It is very vague. It almost makes me feel a little bit uncomfortable but at the same time, I really like her style. The way she describes…

    • 173 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The author makes a good point in his article by explaining that the violation of privacy due to technology is not something new. He backs that point up by evidence of two Boston lawyers at the Harvard Law Review who argued that privacy was under attack by inventions and also business methods in 1890.…

    • 760 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In this report, the Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals examines behavioral surveillance technologies in Counterterrorism programs and make decisions about deploying and evaluating those and other information programs of their effectiveness and risk to personal privacy. Modern data…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    There are many Americans that worry about the invasion of their privacy. An American’s privacy can be lost by- an IP address internet cookies, government surveillance cameras, and social networking sites. There are many ways Americans can control their privacy, but sometimes the invasion of privacy is out of their control. For example, computers save all of the American’s private information without their consent.…

    • 1379 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Cloud Computing

    • 1296 Words
    • 6 Pages

    The world is turning to cloud computing to manage data. Businesses are at the forefront of this new trend with companies such as Google, Amazon, Microsoft, and others leading the way by providing these services. What exactly is cloud computing? According to Turban & Volonino (2011), cloud computing is Internet- based computing in which shared resources (such as hard drives for storage) and software apps are provided to computers and other devices on- demand (p. 48).…

    • 1296 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Privacy is a fundamental moral right in a democratic society. It is the right bestowed upon individuals that strengthen the freedoms of speech, press, association, and assembly which are crucial for a free, democratic society. However, advancement in technology threatens privacy and autonomy which reduces the control over private data and exposes individuals to undesirable consequences. Thus, a loss of privacy leads to a loss of an individual’s freedom in society.…

    • 1755 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    E-Commerce Ch 1 Review

    • 536 Words
    • 3 Pages

    The handheld devices, including mobile telephones and tablet computer. RFID devices and smart cards are being combined with biometric technologies, such as fingerprint readers, and retina scanners…

    • 536 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The Importance Of Privacy

    • 637 Words
    • 3 Pages

    Has anyone ever look through your belonging without asking and thought it was moral? Having privacy is a huge problem in our society too many individuals and celebrity.Without Privacy, anyone could invade your life by stealing your identity and personal records. In the first amendment, The bill of rights says that everyone should have their right of privacy no matter what. Privacy is having freedom way from others. "Individuals who live in a civil country or state deserve their right to privacy under any condition even though they are a celebrity because…

    • 637 Words
    • 3 Pages
    Good Essays
  • Good Essays

    7) If you store personal information you must register with the Information Commissioners Office (ICO).…

    • 1331 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Privacy in a Modern Age:

    • 969 Words
    • 4 Pages

    Changes in technology over the last twenty years has created many wonderful opportunities for the human race to enhance our abilities to communicate with each other, conduct business, and educate ourselves. Through the rapid transfer of information, the human race is reaping great benefits, such as better medical care, weather forecasting and even disaster response. Unfortunately, because the transfer of information has become so effortless, people have also found themselves in precarious positions when it comes to maintaining their privacy when using these technologies. Although the rewards of this new information age are endless, often, privacy may be taken for granted. Students may not realize the implications of this laissez–faire attitude towards privacy until their privacy has been breached. It is only then students realize their privacy is a right and not a privilege. The essay’s printed in The Essay Connection 10th Edition by Lynn Z. Bloom “How computers change the way we think”, Sherry Turkle, “The Paradox”, Tim Stobierski, and “Faux Friendship”, William Deresiewicz, all explore several negative issues that have arisen from the increased use of these new technologies.…

    • 969 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unsanctioned Intrusion

    • 337 Words
    • 2 Pages

    The topic of a citizens' right to privacy or expectation of privacy has been debated and tested since the drafting of the US Constitution. The common and broad understanding of the term defines it as "freedom from observation". The information security professional is concerned with a narrower area of the law that can be defined as "freedom from unsanctioned intrusion". Specific areas of interest to the information security professional involve access to personal information, online privacy, and the right of publicity.…

    • 337 Words
    • 2 Pages
    Good Essays
  • Good Essays

    kiosk

    • 3085 Words
    • 10 Pages

    Currently, Information and Communication Technology is being part of businesses, institutions and individuals. It brings great change and ease management to get the information that will more systematic and efficient. Most of the company used new technologies like finger scanner to make them ease to monitor and compute the number of days worked per employee. Some of the big company used new technology for their security; they used magnetic card or biometric scanner to enter in the restricted area of the company.…

    • 3085 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Latest Inventions

    • 265 Words
    • 2 Pages

    By taking advantage of analytical software, the latest invention from the Japanese researchers can detect more sophisticated behavior. Thus it will be able to match models of common movements. Philip Sugai says that if, for instance, the KDDI mobile phone is attached to a cleaning worker's waist, it will be possible to tell the difference between such activities as walking, sweeping and emptying a rubbish bin.…

    • 265 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Information Systems Review

    • 2555 Words
    • 11 Pages

    * Advances in data analysis techniques: companies can analyze vast quantities of data gathered on individuals for: profiling (combing data from multiple sources to get more info on a person) & nonobvious relationship awareness NORA (combing data from multiples sources to find obscure hidden connections that could help identify criminals or terrorists)…

    • 2555 Words
    • 11 Pages
    Good Essays
  • Good Essays

    A Week Without Internet?

    • 559 Words
    • 3 Pages

    We are living in a very exciting age. Technology surrounds us and is a central part of our work, education, and home life. Now, more than ever, we rely on advancing technologies to help…

    • 559 Words
    • 3 Pages
    Good Essays