Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Google inc. case study
Case study of google inc
Google inc. case study
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Google inc. case study
1. Thesis
Through the work performed by Google Company, the world has been able to experience evolution. This is because of services and information that has been made available to many people all over the world. Google was once the only source that most people relied on for online research (Lee, Newton 2013). Many people, all the same benefited from this procedure. Computer users on the other hand thought that there would develop malware sites, which the search engine may link to. There are many software designers who are not of good will. It was thought that these people would create malware sites and disrupt the major activities and objectives of the organization. In the present, little concern is placed to the invasion of privacy by a third party website. This is because electronic devices have become encrypted and they come with quite reliable software, which can be used for detecting and providing protection from malware (Lee, Newton 2013). Google has grown from a search engine to become a developing and acquiring headquarters for computing devices and software. Consumers today have acquired a digital lifestyle. Google has dominated sources of tools for almost all tasks that could be desired by any user. In a set editorial that was found on wiki leaks, Julian Assage discusses information that was gathered through an interview with the former CEO to Google, Eric Shmidt. In this work, we will use Julian Assage's editorial as a source to enable us evaluate what Google could be hiding from its users. This paper will enable us to see if the level of privacy offered by Google is appreciable. We will be asking ourselves a question on whether it is true that Google to some extent invades the privacy of its customers. This will be d...
... middle of paper ...
...mes of customers without compensation g their operations." (Snyder, S 2007).
References
"Google's Privacy Invasion: it is Your Fault." InformationWeek. N.p, n.d. Web. 5 Feb. 2014. Retrieved from .
Lee, Newton. Facebook nation: total information awareness. New York, N.Y.: Springer, 2013. Print.
Lo, Janet. A do not track list for Canada?. Ottawa, Ont.: Public Interest Advocacy Centre, 2009. Print.
Snyder, S.. "Google Maps: An Invasion of Privacy?." Time. Time Inc., 12 June 2007. Web. 5 Feb. 2014. Retrieved from .
"Invasion of Privacy - Android Forums." Android Forums RSS. N.p., n.d. Web. 5 Feb. 2014. Retrieved from .
In the Engineering and Technology Journal, two engineers, Gareth Mitchell and Guy Clapperton, gave their thoughts on both sides of the privacy issue. Is gathering information violating personal privacy? They made their arguments using currency as a metaphor for personal information and online services a product. Mitchell argues the case that giving out personal information is “too high a price to pay” (Mitchell, 2013, p. 26). He says that despite the option to opt out of cookies and certain information, many sites are more covert and make their opt out option less accessible than a pop up asking to opt out. The site makes it hard for the Internet user to say no to being tracked. Mitchell warns the reader to take more consideration into what information they are giving away and that “privacy is not to be taken for granted” (Mitchell, 2013, p. 26). Getting information from the Internet would mean tra...
"Security & Surveillance." Center for Democracy & Technology. Center for Democracy & Technology, 2013. Web. 08 Feb. 2014.
Technological advancements have positively impacted society by increasing safety, promoting global communication, and presenting easy access to knowledge. However, there are many negative impacts to these devices, including the manipulation of privacy.
Carr, Pete. “Tracking Is an Assault on Liberty, With Real Dangers.” The Wall Street Journal. 6 Aug. 2010. Web.
Rosen, David. Four ways your privacy is being invaded. 11 september 2012. 13 february 2014 .
Different people, cultures, and nations have a wide variety of expectations about how much privacy is entitled to or what constitutes an invasion of privacy. Privacy is the ability of an individual or group to seclude themselves or information. Personal privacy has been declining in the past year which is caused by today’s technological society. With the latest technology such as face scanners, data collecting, and highly advanced software’s, privacy can be compromised, which is exactly what is being done today and it is unconstitutionally intrusive.
Carr, Nicholas. "Is Google Making Us Stupid." July/August 2008. The Alantic Magazine. 20 February 2012 .
In Lecture 26 of INFO 3200’s Spring 2014 offering, the instructor talks about the concept of privacy in new media and society. This is a popular topic of conversation in the public sphere. In a world in which the easiest way to keep track of someone is to do so online, it is essential that we know and control what information others get access to.
Garfinkel, Simson. "Internet Privacy Can Be Protected." Privacy. Roman Espejo. Detroit: Greenhaven Press, 2010. Opposing Viewpoints. Rpt. from "Privacy Requires Security, Not Abstinence: Protecting an Inalienable Right in the Age of Facebook." Technology Review 112
Solove, Daniel J. “5 Myths about Privacy” Washington Post: B3. Jun 16 2013. SIRS. Web. 10
Carr, N. (2008, Jul. - Aug.). Is google making us stupid?. The Atlantic, 1. Retrieved February 14, 2012, from http://www.theatlantic.com/magazine/archive/2008/07/is-google-making-us-stupid/6868/
LeRoux, Yves. "Privacy concerns in the digital world." 03 Oct 2013. Computer Weekly. 24 April 2014 .
In terms of government intelligence, in the information age greatest threats to privacy have been the result of technology and business practices related to e-commerce, marketing and information databases, and not the result of government intrusions (Hoffman, Novak & Peralta, 1997). Nevertheless “all things considered, the increasing and overlapping information sharing by governments and businesses about formerly confidential or private activities generates concerns about potential violations of individual’s privacy rights” (Mace, 2008 cited in Gal, Kantor & Lesk, 2008, p.41).
Staff, Proquest. At Issue: Technology and Privacy. N.p.: ProQuest LLC, 2013. Web. 5 Dec. 2013. .