Value of Digital Privacy

In: Business and Management

Submitted By coupongirlie
Words 979
Pages 4
The Value of Digital Privacy in an Information Technology Age
A weekend getaway in Vegas…$400, dinner at a fine restaurant…$200, digital privacy in the information technology age…PRICELESS. No value can be put on the importance of digital privacy in today’s world of the Internet. There are numerous technologies that allow individuals to research citizens’ private data. Websites such as Facebook, Intelius, and Spokeo allow for easy access to individuals’ personal information.
Technologies That Allow Research of Private Data
For today’s generation, Facebook has become as conventional as the telephone. You will not find many people functioning in today’s technological environment without a Facebook page. With so many people using the website, it has become a prime source in gathering personal data about individuals. So many users post personal information about where they work, what schools they attend, what vacations they’ve taken, the names/ages of theirs kids, and much more. And, of course, there are usually pictures to go along with all of the unsolicited information that’s posted. Social networking sites usually allow their users to join and host their information for free. These companies sometimes make their money by helping marketers to target advertising campaigns--a service for which advertisers pay tremendously. This creates profit for social networking companies as they provide a free service to users (Petryni, 2013).
Intelius is one example of a people search where various types of information can be obtained about individuals. By inputting only a name, anyone can acquire someone’s age, a list of previous addresses as well as relatives. Additional information that can be gathered is date of birth, phone numbers, emails and social networking information. This information can easily be used in identity theft.
Another way of gathering personal…...

Similar Documents

The Value of Digital Privacy in an Information Technology Age Brenda Steen Strayer University Leg/500 December 19, 2012 Professor: Dr. Pino the Following Assignment Contains Information Regarding Individual

...The following assignment contains information regarding individual privacy in this age of information technology. On today’s vast information superhighway, private information can be found on most individuals within a couple of clicks of a computer mouse. This assignment will describe a minimum of three technologies that allow people to research the private information of citizens. This report provides and analysis of the advantages and disadvantages of having this information made public. Additionally, this report includes options individuals have to protect their private information. Last, this report discusses the existence and effectiveness of electronic privacy laws enacted to protect private information. Google is probably the most used search engine on the internet. It is usually the first step used to research private information. Google collects all available private information and conveniently places it at a researcher’s fingertips. Such information as address, telephone numbers, pictures and work history is available on Google. Facebook is another popular website people use to obtain private information. Researchers can gain information such as posted pictures, family/friend information, and place of employment. Researchers can also find out recreational information such as local establishments a person frequents or when he or she is on vacation. Many states use have county property tax websites. A researcher can simply type in a person’s name and......

Words: 951 - Pages: 4

The Value of Digital Privacy

...Assignment 2: The Value of Digital Privacy Strayer University Law, Ethics and Corporate Governance – LEG 500 1. List and describe at least three (3) technologies that allow an individual to research citizens’ private data. Google Inc. offers what may be the largest and most used tool to search for information over the internet. Their mission statement says it best: “Google’s mission is to organize the world’s information and make it universally accessible and useful.” (Google, Inc., 2013). By typing any word or set of words into the search field, Google is able to bring together information about individuals, businesses; just about any subject imaginable. Google is increasingly used by employers to gather information about job applicants. Private individuals use it to find information about family members, friends, or complete strangers. Features like Google Earth can give you a bird’s-eye view of someone’s home by simply typing in an address, and Google Maps can take you straight to their front door. The global reach of Google Online phone books and reverse directories such as White Pages provide a limited amount of information free of charge, but offer the opportunity to provide more information for a one-time or recurring fee. These directories normally display information such as current and past addresses, possibly phone numbers, age, and household members or relatives. These tools are useful for individuals who are simply......

Words: 1950 - Pages: 8

Digital Privacy

...The Value of Digital Privacy in the IT Age The Value of Digital Privacy in the IT Age Digital Privacy in the IT age is almost extinct. The World Wide Web houses information about anything and everyone. People use the digital technology everyday with the impression that what they are doing is protected from others, unless they chose. While few consumers are fully aware of how their data is being used and even fewer are capable of actively managing it, most individuals expect their digital identity to be treated responsibly and openly: 79%, for example, said companies should be more transparent about use of personal data. There are systems and technologies that people use to gain access to a person’s information. The information obtained can be an advantage or disadvantage. The government has implemented laws for years to try to establish some controls There are many technologies that will allow an individual to research citizens, but the three that will be discussed are Facebook, Intellus, and Google. Facebook is a web based social app use to contact friends. A person can either download for free or buy “apps” for a small amount of money. Apps are games, quizzes and sharing services. These “apps” are consists a host of personal information which includes emails, current locations, sexual preferences of “app” users and their friends. Intelius allows people to access personal records by name, social security number or phone number. People use this system to find family or......

Words: 963 - Pages: 4

Assignment 2: the Value of Digital Privacy in an Information Technology Age

...Assignment 2: The Value of Digital Privacy in an Information Technology Age Professor Weekley Law, Ethics and Corporate Governance May 5, 2013 There are many reasons you may want to get someone’s personal information, maybe you just need their address to send a card, but there are many people who have access to citizen’s private data with the click of a button. Your information can be searched for by anybody for any reason, and there are companies out there willing to help for a fee. The fourth amendment states, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated” (Halburt/Ingulli 2012). This law keeps people safe from searches for absolutely no reason, but the same protection does not expand to the internet, where these searches happen every day. There are a few ways of obtaining information about someone, and all you need to do is pay a small fee then you can have access to their address, phone number, criminal record and much more. You should only be able to get a background check on a person if you are a potential employer and after the person has signed a waiver. One such site offering these services is For $39.95 I can get the following information about anyone: Full Name, Photos & Profiles, Address, Property Records, Phone Number, Public Records, Relatives, Court Records, Month/Year of Birth, Sex Offender Check, Address History, and Criminal Check....

Words: 1128 - Pages: 5

Technology and Privacy

...Running head: TECHNOLOGY AND PRIVACY 1 Technology and Privacy Shawna Greiner SOC 120 Jenna Soard April 22, 2012 Technology 2 There was not such a thing known of as technology back in the beginning of time, but now technology has become the biggest thing used; it is so powerful throughout the world, that it is the number one thing used for just about everything in our everyday life. People have to have technology at a majority of their jobs in order to complete their tasks, Hospitals have to have it in order to take care of people and most of all keep track of files and records of people, government offices are the biggest one to have the technology that keeps all or a majority of information about every single human being that has lived. Another big technology that is done, but has been taken out of proportion is the internet and privacy. People that want to steal, take advantage of another person’s personal information, whether their social security number, physical address, work and income information along with credit, and bank accounts, then it is used to the person stealing it for their own advantage which later destroys the victim a lot of times. Technology has advanced to our own......

Words: 1852 - Pages: 8

Value of Digital Privacy

...Assignment 2: The Value of Digital Privacy in an Information Technology Age Since the personal computing revolution, popular entertainment has given us nightmare scenarios of computers and machines taking over the world or threatening our security. From War Games to The Matrix to the Terminator movies, each depiction has seemed like science-fiction at the time, but in the new digital age, they may be closer to reality than we care to admit. And while cyborgs from the future aren’t coming back to exterminate us or are we playing against a machine capable of setting off a doomsday attack, the implications of how much information is available about us on the World Wide Web can set off a personal doomsday. Ways to Find Data For many people with questions, the first step towards an answer is logging on to the popular search engine Google. Simply type in a subject and click the search button and users are provided with page after page of information. You can easily find that recipe you’ve been looking for, the latest news headlines or personal information on yourself or your family and friends. A Google search can provide background information, phone numbers, addresses, photos and even directions and maps to your address. The popular search engine also provides e-mail services and cloud-based storage for documents. And while these services are password protected, e-mails stored on Google’s server for more than 180 days can be turned over to governmental agencies......

Words: 1248 - Pages: 5

Teachers, Privacy, and the Ethical Use of Digital Media

...Teachers, Privacy and the Ethical use of Digital Media OUTLINE Digital Media and Teachers - Ethical implications for teachers and their personal use of social media - Is it ethical for teachers and students to be friends on social media sites? Expected Privacy While Using Digital Media - Privacy Breaches - Ethical use of personal identifiable information Conclusion References Digital media has greatly enhance the way that we share things in both our personal and business lives. It has enabled us to share things with our communities so fast and so easily that we to forget about the ramifications that could come of this technology if we don’t fully understand its power. As more and more people and organizations turn to digital media the implications of our actions begin to present themselves. There are various ethical concerns that need to be addressed as we consume digital media in our everyday lives. These challenges are widespread and can be applied to virtually every corner and medium of the internet. In this research paper we will address just a few areas of concern listed below: • Should teachers be allowed to communicate with students via social media? • Should a teachers personal posts affect their professional life? • What amount of privacy should we expect and who is responsible to maintain that privacy? • Just because you can say it does it mean you should? These questions touch on the huge subject of......

Words: 2849 - Pages: 12


...journal homepage: My privacy is okay, but theirs is endangered: Why comparative optimism matters in online privacy concerns Young Min Baek a,⇑, Eun-mee Kim b, Young Bae c a Department of Communication, Yonsei University, Republic of Korea Department of Communication, Seoul National University, Republic of Korea c Department of Information Sociology, Soongsil University, Republic of Korea b a r t i c l e i n f o a b s t r a c t It is easy to trace and compile a record of individuals’ online activities, and cases of online privacy infringement (i.e., improper use of personal information) have been reported in advanced societies. Based on existing risk perception research, this study examines comparative optimism regarding online privacy infringement (i.e., users tend to believe privacy infringement is less likely to happen to oneself than to others) and its antecedents and consequences. Relying on large-scale online survey data in South Korea (N = 2028), this study finds: (1) comparative optimism is higher when the comparison targets are younger; (2) online knowledge and maternalistic personality traits increase comparative optimism mainly by influencing perceived risk to others, while prior experience of privacy infringement increases comparative optimism mainly by influencing perceived personal risk; and (3) comparative optimism is related to both greater adoption of privacy-protective behaviors and a higher level of support......

Words: 5399 - Pages: 22


...Running Head: THE EXISTENCE OF PRIVACY WITH TECHNOLOGY THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Obediah Howard Bellevue University   THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Abstract This research paper will discuss the relationship between privacy and technology. It will attempt to ascertain if technology and privacy can share the same plane of existence. Benefits and deficiencies of a particular technology are not hereditary to that technology, but are depend on their application. The public insists on accountability of technological innovation and assurance that privacy will remain intact. Striking a balance between enabling technology to enrich lives and restricting it from invading privacy has to be addressed. Implementing controls to protect private data is imperative. Technological advances over the years have challenged the public’s perception and expectation of privacy. Technology and one of its preeminent by-products, convenience, will continue to grow exponentially for the foreseeable future; there is no evidence to suggest otherwise. Privacy finds itself in a precarious position in the face of evolving technology. The collective concept of privacy has to be revisited. With the advent of technological innovations and the accessibilities they bring, privacy in its purest form does not exist. From an anthropological perspective, privacy is a relatively modern development. Ancient cultures practiced......

Words: 1783 - Pages: 8


...Privacy ‘The Limits of Privacy’ and ‘The Case for privacy’ are written by Amitai Etzioni and David D. Friedman respectively. Both of them have opposite views about privacy, which Etzioni states that less privacy is good for us and Friedman claims that more privacy makes the world a better place. In this paper, I will argue that Etzioni’s argument fails because privacy is really important for us to protect ourselves. I am going to explain in detail based on three different points in the next three paragraphs. First, in ‘The Limits of Privacy’, Etzioni argues that privacy is not important as many other goods. Based on his argument, he claims that “there are numerous values that trump or take precedence over privacy” (p.254) such as safety. However, I totally disagree his standpoint. Although safety also considers as a part of importance, it does not mean that safety can take priority over privacy consideration. Privacy does have significance effect for us to protect ourselves. Some people may think that it is worth to sacrifice their individual privacy in order to get freedom for safety. Once you give up your own privacy and allow anyone like governments to access to your information freely, your information is disclosed and you cannot get them back anymore. For example, after 9/11 attack in the United States, a lot of new measures about surveillance are introduced. The government can have authorities to wiretap, record or trace orders for email made by all Americans.......

Words: 1250 - Pages: 5

Privacy and Security at the Digital Age: the Innovation of Business in the Online World

...Privacy and security at the digital age: The innovation of Business in the online world Over the past decade the world has solely relied upon technology and its transformation throughout the years allowing for the revolution of social media to completely change how everyone communicates especially for businesses, allowing them to extend out and provide large opportunities for themselves. According to ISACA (2010), through the use of social media, it allows businesses to gain serious advantages through research and evaluation of their competition, their consumers, and the market. This enables them to not only help develop them to be on top of their issues, but using it as a tool for enhancing a better relational experience with employees and customers. For businesses to be successful with their organisations or products, social media is the key to their communication with their stakeholders through privacy and security, where it strongly impacts business to improve, but can be considered also to be a big risk where that barrier can be invaded, which can cause legal and ethical issues. Privacy and security are known to be the most important issues surrounding social media and the innovation of businesses today. Although it may be argued that users voluntarily sign away their privacy by using these social media when creating accounts and putting their personal data online, it is not clear how consent actually works in these situations (Custers et al. 2014). But overall......

Words: 1757 - Pages: 8

Is Privacy Possible in the Digital Age?

...Privacy and security (Initial essay) Introduction When I think back one of firsts times I thought knowingly about privacy and security in my life at category of every data being stored and maybe later analyzed it was back my previous student days when one of my friend refused to pay with bank card in Alco-store. At that time it seemed to me really paranoiac and weird, but now I get his idea behind it. If one is a gambler for instance, it really isn’t very smart to pay with credit card in gambling-den. But at the other hand nobody can also blackmail you at basis of your sins which are known to everybody. Is privacy possible in the digital age? In current days one of the biggest and influential databases about private persons Facebook is launching a new profile type “Timeline” – it really brings users history in silver plate to everyone interested – unless he has taken precautions in privacy-settings. Many people say they’re not worried about the info reachable to everyone, “I’ve got nothing to hide,” they declare. Those advancing the nothing-to-hide argument have in mind a particular kind of appalling privacy harm, one in which privacy is violated only when something deeply embarrassing or discrediting is revealed, says Solove (2011). Privacy itself is a concept in disarray. Nobody can articulate what it means, claims Solove (2006). It isn’t seen everywhere same way as in Western countries, also understanding differs individually. Already in 1976 the secretary-general......

Words: 1609 - Pages: 7

Value of Digital Currency

...1. The benefits to using a digital currency like Bitcoin for transactions are based on it being independent from the government and central banks. Being in control of your own currency, its accessibility, security, and remaining virtually anonymous while using it are what give it value. For both parties, the information for transactions using Bitcoin is transparent. This transparency protects merchants from losses incurred via fraud, robbery, or NSF since the transaction cannot be reversed. Since it is a digital currency, which is community regulated, it inherently carries less fees in use and conversion. The costs for using Bitcoin for transactions are ones which can be seen as opportunity costs. The volatility of its price and demand tend to stem from the current events that affect digital currencies. These events can reflect positively or negatively for its value in such instances as the Silk Road or foreign bank crisis & capital restrictions increasing demand for secure anonymous currency. The increased exposure over its volatility acts to stabilize it; as it becomes more well-known it is accepted in more places. The most significant issue Bitcoin faces is the uncertainty of its future. With improvements and innovations being made daily in the fields which control digital currency it reduces the likelihood that BTC will keep up, rather than be replaced with a newer iteration of itself. Digital currencies are not going to leave us, but in fact they will inevitably......

Words: 643 - Pages: 3

It Privacy

...Information Technology Practices and Privacy Concerns David Rebovich TS5536 – Ethical and Legal Considerations in Information Technology Professor Gold November 27, 2011 Technology has made it hard to live a life that is truly private. Many devices and services that people use on a daily basis are repositories for private information. Cell phones, with GPS services, can be helpful, but can also be used by authorities to track a person’s location. Social networking sites make it easy to stay in touch with people, but they also store personal information, and activity history that can be subpoenaed and used against a person if they are ever accused of a crime. Facebook postings in March, 2011 led to the arrest of one of the five suspects in the killing of a teenager in Queens New York. Anthony Collao, 18, was killed after attending a birthday party that was being hosted by gay hosts. The five suspects crashed the party, made slurs, and caused Collao, who was not gay, to leave because of the impending trouble. Collao, after leaving, was chased, beaten and killed, by the suspects. A fifth suspect charged in the fatal beating of a teen in Queens bragged about the attack in anti-gay Facebook postings, law enforcement sources said. (Mark Morales, 2011) The Patriot Act, signed into law shortly after the terrorist events of September 11, 2001, has the ability to be interpreted, by lawmakers, to allow the use of cell phone tracking by government agencies on......

Words: 1123 - Pages: 5

The Value of Digital Privacy in an Information Technology Age

...The Value of Digital Privacy in an Information Technology Age Diana Flynn Strayer University Professor James Merola April 30, 2012 1. List and describe at least three (3) technologies that allow an individual to research citizen’s private data. is a technology that helps people find family members, friends, classmates, military buddies and almost anyone living in the United States. It sells background information to anyone or anybody regardless of who you are. DateCheck is a site hosted by Intelius which stores reports including names, addresses, birth dates, court records, and cell phone numbers. People can access personal records by name, social security number or phone number through Intelius. The second technology is If you are looking for information on someone, searching the web using Google is one of the best places to start. A person can find background information, phone numbers, addresses, maps and more. On the flip side, anyone can find the same information about you. Information is given by citizens opening up an account. It is the basic information such as name, address, phone, email or credit card number. Information is shared with companies, organizations, and in individuals outside of Google with consent. Data searched on the web is stored to improve and maintain the security of their systems. Government agencies request information......

Words: 1451 - Pages: 6

Joru Ka Ghulam | Press Kit FIM Superbike World Championship Assen, 20th Edition April 2011 | Sarah Paulson