preview

Privacy

Better Essays

Running Head: THE EXISTENCE OF PRIVACY WITH TECHNOLOGY

THE EXISTENCE OF PRIVACY WITH TECHNOLOGY
Obediah Howard
Bellevue University THE EXISTENCE OF PRIVACY WITH TECHNOLOGY

Abstract
This research paper will discuss the relationship between privacy and technology. It will attempt to ascertain if technology and privacy can share the same plane of existence. Benefits and deficiencies of a particular technology are not hereditary to that technology, but are depend on their application. The public insists on accountability of technological innovation and assurance that privacy will remain intact. Striking a balance between enabling technology to enrich lives and restricting it from invading privacy has to be …show more content…

The convenience of communicating around the world in an instant or purchasing products and services over the Internet, and even online banking is not without risk. In fact, any online activity that involves sharing personal information is inherently risky.
In the social networking arena, users voluntarily divulge personal information online that, prior to the digital age, would have been considered private and restricted. Without careful and fierce examination of information prior to submitting it online, users unwittingly and certainly unwillingly subject themselves to threat of privacy intrusion.
Personal data posted online could be retrieved to take advantage of users, adversely affecting their lives. GPS coordinates embedded in photos taken from smartphones expose the location of where the photo was taken and could be used for exploitation. Online identity theft can occur if users are not more cognizant of online activities. Online social networking services and ecommerce websites generally collect two types of information: personal details provided by a user and usage data collected automatically as the user spends time on the internet visiting different areas.
The public is increasingly concerned about privacy protection but will accept a new technology if the public is properly informed and understand what’s happening to its data and the desired convenience is delivered (Buckler, 2011). The public is aware that, in order to take advantage of some

Get Access