Академический Документы
Профессиональный Документы
Культура Документы
Student’s Name
University Name
Date
Running Head: The Future of Privacy 2
Privacy
Privacy is the individual life condition that is characterized by exclusion from publicity. It is
the right of an individual to control how the information about his/her is used, stored or shared
(Haney et al). Data privacy is a great matter of concern these days (Britz,n.d). Nowadays
everyone prefers online deals and transactions as people are fond of or can say addicted to the
internet. And why not? This practice is making our lives smoother and easier. But every good
thing has a harsh truth. However, we all lead a smoother life using this internet, but certainly
at the cost of losing our data privacy. Privacy and the internet have a very much complex
relationship. On one side, technology is enhancing privacy by providing more accessible means
to access information (UNICEF,n.d.) But simultaneously, new threats to privacy are also
emerging along with the growth of the information technology. The records are somewhere
available on the internet which anyone can inspect and then that information might be used in
combination with data extracted from other sources. Information technology is the automated
system that is used for storing, processing and for distributing the information. These
developments have started changing the practices of keeping the information in the devices
Concerns about privacy in countries are alarming at a faster rate. Australian Community
Attitudes to Privacy Survey, 2017 reported that the major population of Australia is concerned
about online privacy. The privacy of information is protected by the legislation in the Health
Running Head: The Future of Privacy 2
Record System such as My health records (database of medical records), privacy act (protect
the privacy of individuals) My Health Record(n.d.). As per the recent research, it is found that
if the records were made anonymous, then the individual records could be identified with
acceptable accuracy in conjunction with information assessed from other available facts.
Individuals are protecting their private information that might vary from country to country.
As in China, users are leaving the most popular social networking application such as WeChat
over growing fears of data breaching. In a few countries, strict privacy laws i.e., the Privacy
Act in Australia is there that prevent the company from sharing the information of the client
Analytica where the application provided to Cambridge Analytica. Cambridge Analytica then
arranged a process of informed consent for research where thousands of Facebook users
provided their personal information for academic use. After this, they acquired the data from
millions of Facebook users (Boldyreva 2018). Human beings value and protect their private
information, but still how someone gets your data? The use of digital technology is impacting
the privacy of people in a variety of ways. One of the major threats to privacy is the crackers
and hackers which may break into the computer system at any time. Online credit card frauds
are increasing day by day. Inside a card, a computer chip is embedded that records details of
every purchased item. Skimming techniques are the most common technique where a credit or
debit card is swiped through a skimmer. Skimmer captures and stores all the card details present
in the magnetic strip. Then the thieves use this data to make fraudulent transactions whether
online or by making counterfeit credit cards (Britz,n.d). Perhaps the most impactful threat in
information technology has been the arrival of mobile technologies. Identity theft is also a type
of threat where someone uses another's personal information using low tech methods such as
Running Head: The Future of Privacy 2
stealing details from mailboxes, tricking someone to give away their details over the call and
the high tech ones such as phishing, attacks on databases misleading phone messages on cell
phone
As the field of information technology moving forward, we are constantly being challenged by
innovations and capabilities that sometimes will amaze us and disgust us as well. As discussed,
countries have made laws against the data breach so that the information provided by the
individual should always be protected. In my view, there are two kinds of people exists one
who knows that their data privacy is being compromised and the others who don't know about
it. Unfortunately, the mass is from the latter one. As the economy is advancing and becoming
more and more digitally driven, data confidentiality has become a big concern. These days
social media are playing an important role in our daily routine. Hacking social networking
accounts such as Facebook, Instagram, twitter may share an individual's valuable and personal
information. Online hackers target personal data and then use that information to blackmail
scams. In recent times, stalking and cyberbullying have become a threat and social media is
helping to carry them forward. The development of information technology has both positive
and negative effects, but the data breech is the main threat people are facing nowadays. So, it
should be taken care that where should enter your details or where not as it does not harm you
in any ways.
It is advisable to stop avoid downloading unknown applications from untrusted sources and
don't click on any suspicious links. Do not ever provide your personal information to anyone
as it may get used by someone. Pirated software sometimes also harms your digital device, so
it is better to install them. Studies also suggest that not all social activities of information
technology concern data privacy such as friendship effects on social networking sites. The
positive side is to get transparency in the market with the development of information
Running Head: The Future of Privacy 2
technology, where customers, consumers are informed about business opportunities. It also
provides an opportunity for every individual to grow and know about the things going around.
However, there is a need to develop and execute a variety of strategies for protecting personal
information. Data privacy policies, guidelines, and standards should be introduced which in
the future will work efficiently with the advanced technologies to prevent a data breach. As per
UNICEF, some of the policy measures were recommended. One is the development of
guidelines for business entities and others are to review the measures for child protection
(UNICEF,n.d.).
So, how we can address this concern, or the needs of a future is still not written, in terms of
how the governments and certain authorized companies will be permitted legally to construct
new technologies. Meanwhile, we should all be thinking that what kind of digital future
everyone wants and how we can promote digital technologies as transparent and fair.
References
https://plato.stanford.edu/entries/it-privacy/ .
https://www.unicef.org/csr/files/UNICEF_CRB_Digital_World_Series_PRIVACY.pdf
Running Head: The Future of Privacy 2
https://www.myhealthrecord.gov.au/for-you-your-family/learn-about-my-health-record-
system-security .
Decision-Making Process. The European Proceedings of Social & Behavioural Sciences, 91–
Rooy, D. V., & Bus, J. (2010). Trust and privacy in the future internet—a research
McHaney, R., Reychav, I., Azuri, J., McHaney, M. E., & Moshonov, R. (2020). Impacts of