Access over 20 million homework & study documents
search

Privacy And Technology

Content type

User Generated

Subject

Computer Science

Type

Homework

Rating

Showing Page:
1/4
1
Running head: PRIVACY AND TECHNOLOGY
Privacy and Technology
Name:
Institution:
Professor:

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/4
2
Running head: PRIVACY AND TECHNOLOGY
Introduction
The development of technology has made it almost impossible for people to have
privacy. Anybody is able to access or post information on the internet hence there is a need
for people to be aware of how to protect (Samarati & Sweeney 1998). Advances in
technology have greatly threatened the privacy of people and anyone can create an account
using someone else’s profile and put them in jeopardy. The profiles are mostly aimed at
conducting certain things that are illegal and calls for government action.
There is certain information that needs to be kept private like medical records, bank
records, and personal documents. With the advancement of technology, this has been made
difficult since one can easily hack systems that have this information and obtain them for
different purposes. This kind of information is often valued by many and in most cases do not
wish that they get out to the public.
Siponen (2000), states that the problem of privacy does not only lie on emails but on
almost every aspect of social networks. A solution towards the protection of information from
emails being tap should be found but that is not all. Privacy in the other social networks like
Facebook, twitter, IMO and many others is not guaranteed as well. Therefore, solving email
issues will not be the end of the privacy issue since any information posted on social is not
deleted and can be obtained at any time.
Conclusion
Organizations have to, therefore, put policies that ensure that any information about
the employees is well protected. It is in organizations that most important information about
all the employees are stored by the use of big data technology hence they should put in place

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/4

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 4 pages?
Access Now

Unformatted Attachment Preview

1 Running head: PRIVACY AND TECHNOLOGY Privacy and Technology Name: Institution: Professor: 2 Running head: PRIVACY AND TECHNOLOGY Introduction The development of technology has made it almost impossible for people to have privacy. Anybody is able to access or post information on the internet hence there is a need for people to be aware of how to protect (Samarati & Sweeney 1998). Advances in technology have greatly threatened the privacy of people and anyone can create an account using someone else’s profile and put them in jeopardy. The profiles are mostly aimed at conducting certain things that are illegal and calls for government action. There is certain information that needs to be kept private like medical records, bank records, and personal documents. With the advancement of technology, this has been made difficult since one can easily hack systems that have this information and obtain them for different purposes. This kind of information is often valued by many and in most cases do not wish that they get out to the public. Siponen (2000), states that the problem of privacy does not only lie on emails but on almost every aspect of social networks. A solution towards th ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Very useful material for studying!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4