There are many problems surrounding the Internet and its current privacy systems, one of the biggest ones being the current user accountability arrangement. Currently, individuals are accountable for fixing their own privacy breaches. This means that if a problem occurred and a user’s privacy was violated, the user would be largely responsible for the majority of the restoring process, whatever that may entail. The problem with this is that individuals rarely know that a privacy breach has, in fact, occurred (Stefoff). Many skilled online scammers can steal a person’s personal information so clandestinely that the victim isn’t aware of the dangerous theft. Additionally, tracing problems to their causes or sources is nearly impossible (Brin). Because scammers are so skilled at their immoral occupation, they are adept at leaving no trail to be followed that would allow their incrimination.
Another better-known example of large scale Internet destruction is cyber bullying. Cyber bullying is when a child, preteen, or teen is tormented, threatened, harassed, humiliated, embarrassed, or otherwise targeted by another child, preteen, or teen using the Internet, int...
... middle of paper ...
...Bullying: Outlook.” Issues: Understanding Controversy and Society. 27 Jan. 2011. ABC-CLIO. Web. 14 Sep. 2011.
Dinev, Tamara and Paul Hart. “Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact”. International Journal of Electric Commerce 10.2. (2005): 7-29. Jstor. Web. 14 Sep. 2011.
Kasper, Debbie V.S. “The Evolution (or Devolution) of Privacy”. Sociological Forum 20.1 (2005): 69-92. Jstor. Web. 21 Sep 2011.
Nehf, James P. “Shopping for Privacy on the Internet”. Journal of Consumer Affairs 41.3 (2007). Print.
Orwell, George. 1984. New York: Penguin, 2002. Print.
Stefoff, Rebecca. “Security vs. Privacy”. New York: Marshall Cavendish Benchmark, 2008: 23. Questia. Web. 18 Sep 2011.
Subrahmanyam, Kaveri and Patricia Greenfield. The Future of Children. 12 Jan 2008. Jstor. Web. 10 September 2011.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- George Orwell foresees a nightmarish-future for the world in his book 1984, where individualism loses precedence to "the good of society," and with it goes the individual's private life. "The [controlling] Party" in the socialist government knows the intimate details of all citizens, and prosecutes those who violate social orders through threatening speech, behavior or thoughts. The omnipresent visual warning "Big Brother is Watching You,” reminds citizens that no personal information is safe from the "Thought Police." While this may seem far-fetched to some, Orwell envisioned technology facilitating government's abuse of power in 1950; in the twenty-first century, progress has left one's pr... [tags: Privacy Essays]
3921 words (11.2 pages)
- The government gives each American citizen a set of unalienable rights that protect them from the government’s power. These rights cannot be broken, yet the government violates the Fourth Amendment daily to find ways to spy on the American public under the guise of protecting against terrorism. In 2007 President Obama said the American administration “acts like violating civil liberties is the way to enhance our securities – it is not.” Americans need to understand that their privacy is worth the fight.... [tags: american government, big brother]
1686 words (4.8 pages)
- Ethical Issues Raised by Privacy Service Providers Abstract: This paper examines the use of Internet technologies (specifically SafeWeb.com) to counteract invasions of personal privacy and censorship. The paper begins by exploring the methods by which governments, corporations, and commercial agents invade personal privacy. It also discusses Internet censorship on the corporate and governmental levels. It then proceeds to discuss SafeWeb.com, a technology that allows Internet users to surf the Web privately and view censored content. The paper finishes by exploring some of the ethical issues raised by Internet privacy and censorship in specific relation to SafeWeb, concluding... [tags: Exploratory Essays Research Papers]
2877 words (8.2 pages)
- The process of fighting piracy and copyright infringement has become increasingly difficult with the advent of new technologies. The transitioning of music and videos to an online platform has impacted the entertainment industry as well as consumers. The availability of online content has changed the way consumers purchase and listen to music. There are several legal channels available for consumers to obtain music and videos online, through live stream, on demand, pay per view, live tv, and other authorized music services and websites.... [tags: consumer, music, video, illegal]
3208 words (9.2 pages)
How the Growth of Electronic Monitoring Has Changed Employee Expectations of Privacy in the Workplace
- The use of the internet for personal pursuits in the workplace has seen phenomenal growth over the last quarter century. Along with this growth, employers and employees alike have used the internet as a tool to increase profit, manage time and facilitate communications. However, such technological advancement has its issues. The problem investigated is how the growth of electronic monitoring has changed employee expectations of privacy in the workplace. Should employees be able to use the internet for personal items while working.... [tags: Business Management ]
1155 words (3.3 pages)
- The enhanced employment of technology in the places of employment has resulted in emerging concerns for both workers and employers. The concerns are on the area of privacy. Many companies progress to endorse the use of technology in the workplace due to its many advantages (Howard, 2006). For instance, the use of email incalculably reduces operating expenses via automation of human duties, eases communication on numerous levels, enhances the efficacy in almost all duties, facilitates geographic and business expansion, and less apparent, it can minimize business space and inventory needed to start a business.... [tags: Privacy Expectation, Federal Legislation]
2270 words (6.5 pages)
- ... Internet users don’t realize that the risk is real and can compromise identity, financial and personal information. Privacy and security are two things that are hard to find on the Internet today, there are millions of skilled computer professional trying to get people information, but sometimes they don’t use their computer skills they use tool such as social engineering. Believe it or not tricking a person into giving personal information away is not that hard to do. Hackers know this, and use it in so many ways that the user is usually confused about the different histories and circumstances and end it up falling in the trap.... [tags: Social network service, Internet, Facebook]
1138 words (3.3 pages)
- More people can reach one another today than in years past because of social networking sites. The world has become a lot smaller because of sites like Facebook, MySpace, LinkedIn, and many others. There are certainly many advantages to using these resourceful social networks, such as keeping up with friends and family, sharing photos, and staying up to date with current events. Nonetheless, there is a growing concern about privacy, or the lack thereof, because of these sites. The ability to determine your privacy settings is at times confusing, and at other times, simply misleading.... [tags: Social Network Sites, Privacy, Internet]
987 words (2.8 pages)
- Privacy is mentioned in the Bill of Rights, but in which amendment does privacy on the Internet fall. In the website “The Right of Privacy” it says that “The U.S. Constitution contains no express right to privacy” (n. pag.). Freedom of religion is given to us in the First Amendment. The Fourth Amendment protects you from searches and seizures unless the officials possess a warrant. The Fifth Amendment gives us the right to interpret the first eight amendments in ways that can protect the people.... [tags: Internet]
1268 words (3.6 pages)
- The Privacy Invasion of Consumers Through the Internet and Bluetooth Devices ABSTRACT Faster, easier, and cheaper access to a plethora of information, products and people is a primary stimulus for the growing number of online consumers who use the Internet to fulfill information foraging, communication and commerce needs. Oddly enough, these conveniences appear to override users concerns of privacy invasion. As the mechanisms behind information technologies become increasingly transparent, users must trust the companies producing the products to protect them from privacy invasion and refrain from deceitful consumer information practices.... [tags: Internet Privacy Web Cyberspace Essays]
4206 words (12 pages)