Friday, October 4, 2019
Internet and Social Networking Privacy Essay Example | Topics and Well Written Essays - 1000 words - 1
Internet and Social Networking Privacy - Essay Example I have identified three major trends in approaching this question among the authors of articles and books on Internet privacy. The first one is the view that the Internet privacy does not exist at all. Secondly, some authors acknowledge that privacy on the Internet may be reached through certain measures and that privacy exists/may exist but always to certain extent. Thirdly, there are authors who claim that privacy on the Internet is not something to worry about, since it is normal that it may be violated for the sake of the third partyââ¬â¢s interests. More than a hundred years ago privacy was defined as the ââ¬Å"right to be let aloneâ⬠(Warren & Brandeis 193) While users generally agree that privacy is basically about human dignity as well as protection of private property, in the virtual world, this notion is narrowed. Specifically, information privacy is thought to exist if one is able to control the usage, circulation, as well as release of personal information (Culna n 341). With the rapid growth of the web space and progress of technology, concerns of usersââ¬â¢ regarding personal privacy threats are growing, too. While many people sincerely believe that maintaining privacy while on the Internet and especially while visiting social networking sites is their basic right and the basic thing you need to do to protect your privacy is to merely adjust the privacy settings, Steven Rambam and other authors believe that privacy does not exist on the Internet. A private investigator and head of Pallorium Investigative Agency, Rambam gave a few talks at American conferences whose basic idea was ââ¬Å"Privacy is Dead ââ¬â Get Over Itâ⬠. In particular, in his talk on privacy death at the 8th www.Toor.Con.org Information Security Conference in San Diego back in 2006, Rambam provided an overview of online databases and resources that could effectively be used with investigative purposes. ââ¬Å"Digital footprintsâ⬠left practically by every body today help Rambam retrieve as many as up to 500 pages of personal information in just a few hours about a person he is not familiar with at all (Rambam, ââ¬Å"Privacy is Dead ââ¬â Get Over Itâ⬠) At the Last HOPE Conference, Rambam described the process of finding necessary information on the Internet through intrusion into privacy, which as the speaker remarkably noted ââ¬Å"is out of the bottleâ⬠(Mills, ââ¬Å"The Internet ââ¬â a Private Eyeââ¬â¢s Best Friendâ⬠). Specifically, every search through Google, each blog post, and each photo posted online mean further losing the fight over privacy protection for users. This is because ââ¬Å"anything you put on the Internet will be grabbed, indexed, cataloged, and out of your control before you know itâ⬠(Mills, ââ¬Å"The Internet ââ¬â a Private Eyeââ¬â¢s Best Friendâ⬠). According to Rambam, every kind of information online is digitized, with older information scanned and placed online, after which this mixture gets aggregated into special databases sold to government agencies, marketers, and virtually anyone able to pay for it. Twitter, cell phones, taking photos by iPods, etc are all tools to identify a personââ¬â¢s location; buying preferences and alike information is gathered by marketing databases that are bought by the government. Thanks to using the information provided by
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.