Digital Privacy In Information Age

Read Complete Research Material



Digital Privacy in Information Age

Digital Privacy in Information Age

Introduction

In this vibrant and unrelenting age of information technology; the standard ecosystems of businesses, societies and communities, cultures, economies and with it rights of individuals are shaping into different dimensions. The point of concern for this research is to discuss the research of individual's private data by others over the web. This broad classification includes researches, technologies, governments, recruiters and other such concerned authorities. The elementary question the following research would address include whether this impersonal act of someone's private information research is and should be a justifiable practice, our focus would be on three such technologies that do these acts of arguable infringements. We would sort the argument by laying out the advantages and disadvantages of this practice for the researcher as well as the individual, under the microscope of such practices. Our arguments would take into focus the federal laws that empower such researches and the public to obtain private information of individuals. Finally, Electronic 'Private Information laws' would also be considered which empowers these researched individuals to contain their privacy infringements by others, and whether they are sufficiently efficient or not. Supporting Arguments

It is an astounding fact that, in this age of information technology, the internet has empowered many online businesses and websites to store and retrieve key private information's of individuals and users of their services. The three technologies that are in command of such personal knowledge or are an avenue for retrieval of such private information disclosures are:

The search engines, most popular of which is Google:

Now, through these search engines, and more so after its integration with its social networking platform Google Plus, the search engine has become increasingly easier for any individual to gain access to some information of the other. Using the service, retrieval of names, primary addresses, Date of birth, even social security numbers (at least the last four) and credit card numbers, and points of contact, current location, pictures, videos and other personalized content can easily be accessible by anyone (www.google.com). This information is also shared with other businesses, mainly marketing companies and business lead providers, with the consent of the user. This undertaking of consent is such that if you do not allow the practice to happen, you cannot even use the service and its added functionalities and features. The users are appeased with the notion that artificial intelligence of their website would retrieve their key information and use it to give them a better, accurate and tasteful experience in the future (www.google.com). This is done so, but there are other things that are also done along with it.

2. Cloud Computing.

As a renowned dictionary defines the technology, “The practice of storing regularly used computer data on multiple servers that can be accessed through the internet”. The first use of this amazing new age and go-to technology of the future was first sighted in 2006 (www.merriam-webster.com). The practical convenience of this technology is that it utilizes data servers in uncharted lands, ...