The Washington Post, 29 Sept. 2006. Web. 13 Mar. 2014. "What Is Internet Piracy?"
Techopedia. Janaita Interactive Inc. Web. 19 March 2012 “Legal downloads swamped by piracy”. BBC.
N.p., 2011. Web. 06 Dec. 2013. "The Dangers of Cyberbullying." Parental Control.
“5 Ways the iPhone Changed Our Lives.” CNN, 30 June 2012. Web 4 March 2014. Putorti, Jason. “ Technology Can Push Our Crazy Buttons, Rewire Brains.” USA Today, 26 March 2012. Web.
Web. 23 Feb. 2014.
Internet Privacy The concern about privacy on the Internet is increasingly becoming an issue of international dispute. ?Citizens are becoming concerned that the most intimate details of their daily lives are being monitored, searched and recorded.? (www.britannica.com) 81% of Net users are concerned about threats to their privacy while online. The greatest threat to privacy comes from the construction of e-commerce alone, and not from state agents. E-commerce is structured on the copy and trade of intimate personal information and therefore, a threat to privacy on the Internet.
Roman Espejo. Detroit: Greenhaven Press, 2013. Opposing Viewpoints. Rpt. from "My Smartphone, the Spy: Protecting Privacy in a Mobile Age."
With the rise of cloud storage services, people even appear to coin a new phrase to present their panics about the threats from cloud storage as same as the habit of snubbing someone in favor of mobile phone described as “phubbing.” In such a technological world, people tend to overtly concerned with current latest technology, and the Internet and the cloud storage are becoming necessities of the public life. Cloud storage services attract many people because they help people overcome the difficulty of transmitting and receiving information over long distances. However, at the same time, people fail to grasp the risk they entail. As a result, the leakage of personalized privacy becomes an uncontrollable issue. Although the effects of globalization and government’s laws are factors not being neglected to make up for the deficiency.
This necessity has created the booming of an era of new technologies with the only purpose of boosting out communication powers. We have access to technologies like smartphones, social networks, videoconferences and more. As any other creation, these technologies eventually started to be used with negative purposes. The erroneous use of these technologies created a new issue in our society known as Cyberbullying. Society needs to understand what cyberbullying is, the reasons behind, the process it undergoes and how to prevent it.
The recent revolutions of the world have changed how individuals live their lives. With the creation of new and advanced technology every era, individuals begin to trust new ways of communicating and storing our personal life. This has caused the Internet and cellular networks to be the newest information banks that all societies trust to keep their personal information safe. With these sources being accessed by people around the world, spy agencies are now looking at these information banks as sources to access the personal information of millions of individuals. With Internet privacy becoming increasingly questionable, the debate arises “Is it ethical for the government to access our personal viral information?” Since gaining access to this personal information, many individuals are more vulnerable to attacks and have been denied the right to privacy.