Вы находитесь на странице: 1из 6

The Future of Privacy

Student’s Name

University Name

Date
Running Head: The Future of Privacy 2

Privacy

Privacy is the individual life condition that is characterized by exclusion from publicity. It is

the right of an individual to control how the information about his/her is used, stored or shared

(Haney et al). Data privacy is a great matter of concern these days (Britz,n.d). Nowadays

everyone prefers online deals and transactions as people are fond of or can say addicted to the

internet. And why not? This practice is making our lives smoother and easier. But every good

thing has a harsh truth. However, we all lead a smoother life using this internet, but certainly

at the cost of losing our data privacy. Privacy and the internet have a very much complex

relationship. On one side, technology is enhancing privacy by providing more accessible means

to access information (UNICEF,n.d.) But simultaneously, new threats to privacy are also

emerging along with the growth of the information technology. The records are somewhere

available on the internet which anyone can inspect and then that information might be used in

combination with data extracted from other sources. Information technology is the automated

system that is used for storing, processing and for distributing the information. These

developments have started changing the practices of keeping the information in the devices

(Privacy and Information Technology, 2014).

Concerns about privacy in countries are alarming at a faster rate. Australian Community

Attitudes to Privacy Survey, 2017 reported that the major population of Australia is concerned

about online privacy. The privacy of information is protected by the legislation in the Health
Running Head: The Future of Privacy 2

Record System such as My health records (database of medical records), privacy act (protect

the privacy of individuals) My Health Record(n.d.). As per the recent research, it is found that

if the records were made anonymous, then the individual records could be identified with

acceptable accuracy in conjunction with information assessed from other available facts.

Individuals are protecting their private information that might vary from country to country.

As in China, users are leaving the most popular social networking application such as WeChat

over growing fears of data breaching. In a few countries, strict privacy laws i.e., the Privacy

Act in Australia is there that prevent the company from sharing the information of the client

with the other units or entities.

The data breach is a release of private or secure information whether intentionally or

unintentionally to an untrusted source. One of the current best examples is Cambridge

Analytica where the application provided to Cambridge Analytica. Cambridge Analytica then

arranged a process of informed consent for research where thousands of Facebook users

provided their personal information for academic use. After this, they acquired the data from

millions of Facebook users (Boldyreva 2018). Human beings value and protect their private

information, but still how someone gets your data? The use of digital technology is impacting

the privacy of people in a variety of ways. One of the major threats to privacy is the crackers

and hackers which may break into the computer system at any time. Online credit card frauds

are increasing day by day. Inside a card, a computer chip is embedded that records details of

every purchased item. Skimming techniques are the most common technique where a credit or

debit card is swiped through a skimmer. Skimmer captures and stores all the card details present

in the magnetic strip. Then the thieves use this data to make fraudulent transactions whether

online or by making counterfeit credit cards (Britz,n.d). Perhaps the most impactful threat in

information technology has been the arrival of mobile technologies. Identity theft is also a type

of threat where someone uses another's personal information using low tech methods such as
Running Head: The Future of Privacy 2

stealing details from mailboxes, tricking someone to give away their details over the call and

the high tech ones such as phishing, attacks on databases misleading phone messages on cell

phone

As the field of information technology moving forward, we are constantly being challenged by

innovations and capabilities that sometimes will amaze us and disgust us as well. As discussed,

countries have made laws against the data breach so that the information provided by the

individual should always be protected. In my view, there are two kinds of people exists one

who knows that their data privacy is being compromised and the others who don't know about

it. Unfortunately, the mass is from the latter one. As the economy is advancing and becoming

more and more digitally driven, data confidentiality has become a big concern. These days

social media are playing an important role in our daily routine. Hacking social networking

accounts such as Facebook, Instagram, twitter may share an individual's valuable and personal

information. Online hackers target personal data and then use that information to blackmail

scams. In recent times, stalking and cyberbullying have become a threat and social media is

helping to carry them forward. The development of information technology has both positive

and negative effects, but the data breech is the main threat people are facing nowadays. So, it

should be taken care that where should enter your details or where not as it does not harm you

in any ways.

It is advisable to stop avoid downloading unknown applications from untrusted sources and

don't click on any suspicious links. Do not ever provide your personal information to anyone

as it may get used by someone. Pirated software sometimes also harms your digital device, so

it is better to install them. Studies also suggest that not all social activities of information

technology concern data privacy such as friendship effects on social networking sites. The

positive side is to get transparency in the market with the development of information
Running Head: The Future of Privacy 2

technology, where customers, consumers are informed about business opportunities. It also

provides an opportunity for every individual to grow and know about the things going around.

However, there is a need to develop and execute a variety of strategies for protecting personal

information. Data privacy policies, guidelines, and standards should be introduced which in

the future will work efficiently with the advanced technologies to prevent a data breach. As per

UNICEF, some of the policy measures were recommended. One is the development of

guidelines for business entities and others are to review the measures for child protection

(UNICEF,n.d.).

So, how we can address this concern, or the needs of a future is still not written, in terms of

how the governments and certain authorized companies will be permitted legally to construct

new technologies. Meanwhile, we should all be thinking that what kind of digital future

everyone wants and how we can promote digital technologies as transparent and fair.

Development of information technology requires to provide new architectures, systems,

services and law enforcement (Rooy and Bus, 2010).

References

Britz, J. J (n.d). Technology as A Threat To Privacy: Ethical Challenges to the Information

Profession. Retrieved from http://web.simmons.edu/~chen/nit/NIT'96/96-025-Britz.html .

Privacy and Information Technology. (2014, November 20). Retrieved from

https://plato.stanford.edu/entries/it-privacy/ .

UNICEF. (N.D). PRIVACY, PROTECTION OF PERSONAL INFORMATION AND

REPUTATION RIGHTS. Retrieved from

https://www.unicef.org/csr/files/UNICEF_CRB_Digital_World_Series_PRIVACY.pdf
Running Head: The Future of Privacy 2

My Health record(n.d.).Learn about My Health Record system security. Retrieved from

https://www.myhealthrecord.gov.au/for-you-your-family/learn-about-my-health-record-

system-security .

Boldyreva, E. L. (2018). Cambridge Analytica: Ethics And Online Manipulation With

Decision-Making Process. The European Proceedings of Social & Behavioural Sciences, 91–

102. doi: 10.15405/epsbs.2018.12.02.10

Rooy, D. V., & Bus, J. (2010). Trust and privacy in the future internet—a research

perspective. Identity in the Information Society, 3(2), 397–404.

McHaney, R., Reychav, I., Azuri, J., McHaney, M. E., & Moshonov, R. (2020). Impacts of

information technology on patient care and empowerment. Hershey, PA: Medical

Information Science Reference (an imprint of IGI Global).

Вам также может понравиться