Internet privacy is one of the most controversial debates all over the whole today. It is defined as the freedom from intrusion enjoyed by an individual. Privacy is the right to be left alone, to be free from surveillance and to have control over the information accessed by the government about an individual. Internet privacy involves the right of personal privacy against a collection of personal information and displaying of information to third parties without the consent of the individual via the internet. Some argue that legal limits should be placed on the collection of data and information about an individual online. Proponents of this argument believe that an individuals information is private and should not be shared publicly without the knowledge of the individual. In case this happens, this would violate an individuals right to liberty. There are some issues which have aroused in this debate, i.e., the discussion on internet privacy. These include among others; surveillance, privacy invading laws, privacy-protecting laws, digitization of information, etc. This paper seeks to discuss the issues mentioned above.
Digitization of information and Big Data
Digitization of information refers to the process by which information is converted into digital format. The information about an individual or an organization is arranged in bits and presented in the form of an image, signal, sound, object or document. Digitization is the initial cause of internet privacy concerns. Though the process is crucial is crucial in data processing, storage, and transmission because it allows all kinds of formats to store the data, the process as led to the emergence cyberbullying. This involves the access to an individuals or organizations information by third parties who use the information for personal gains.
Big data refers to the rapid accumulation and compiling of vast amounts of an individuals or organizations information. The information available can be exchanged over various digital communication systems. Big data allows agencies to access information about clients and customers which is analyzed by analytic scientist through the uses of programs. This provides information vital in making vital business decisions.
Privacy protecting laws
Internet privacy has led to the introduction of privacy policies which are geared towards protecting individuals and organization against online invasion. Various governments around the world have formulated data protection regulations set to regulate internet users and unauthorized data usage. Identity theft law is an example of such a provision. This legislation provides legal rules which are used to govern crimes associated with internet privacy. The rules protect individuals and organizations whom sensitive personal information has been accessed by perpetrators and used to commit frauds. The law protects individuals and organizations from impersonation which may result in financial gains for the affected parties.
Information protection regulations are also used to prohibit organizations from sharing or information about clients online. This ensures that customers who provide personal information while shopping on online shops are protected from access to the personal information by third parties for selfish gains.
Privacy-invading laws
In contrast to privacy protection laws and regulations, governments around the world have also formulated privacy invading laws. These laws allow access to personal information about individuals and organizations under the provisions of the law. The federal government of the United States has access to personal information through the Patriot Act of 2002. This act allows the federal to invade the privacy of an individual while under the protection of the law.
Surveillance
This refers to the monitoring of the activities of an individual of a group of people. It involves the collection of information with the aim of protecting, managing and directing the organization. Surveillance in internet privacy consists of the monitoring the behavior of an individual or a group of individuals through the use of electronic technologies. These technologies include; remote video and audio monitoring, wiretapping, GPS, and RFID. The main aim of internet surveillance is to collect data and information which will later be used against the victim party.
Request Removal
If you are the original author of this essay and no longer wish to have it published on the thesishelpers.org website, please click below to request its removal:
- Machine Learning Algorithms Using CNV Data to Classify Cancers - Literature Review Example
- Case Study of Developing Countries
- Boot-camps: The Effectiveness of Reducing Recidivism or Not
- Preventing Street Gangs Through Psychology and Understanding - A Research Paper
- IoT Data Acquisition using OMNeT++
- Paper Example: Mass Shootings
- Essay Example: Project Management Methodology and Tools