Information Privacy

Submitted by: Submitted by

Views: 122

Words: 2061

Pages: 9

Category: Science and Technology

Date Submitted: 01/26/2014 11:29 AM

Report This Essay

Privacy

CIS 324 Computer Ethics

Abstract

The impact and advancements of technology has spawned a whole new tech-savvy generation of people who rely on digital communication as part of their every day life. Business transactions, sending birthday cards, banking, exchanging business cards, buying groceries can now all be accomplished via electronic devices that make daily tasks much easier to complete. Completing these tasks also creates a digital footprint on the Internet and on email servers. These footprints can be from someone completing honest sincere transactions or from individuals that are looking to commit a crime, stalk or bully another person. Monitoring these actions by those who are authorized to do so can help reduce these types of actions from occurring. Monitoring these types of actions might involve monitoring all in an effort to narrow down the possibilities of potential targets. Our digital age now calls for targeted monitoring to reduce the number of illegal actions from taking place. The same advancement in technologies we use to make our lives easer should also be used to make our lives safer.

Public Enemy Number One: Privacy

Why is my privacy being invaded? Why does the government want so much control of my information? Why is “big brother” encroaching on every aspect of my life? Privacy in the 21st century is on everyone’s mind and these are just some of the questions being asked by concerned citizen in the new digital information age where everything is available at a touch of a finger. The bad guys have embraced technology in this new digital age and use it to their advantage to cultivate information for the possibility of committing future attacks against America, in addition to the average criminal who uses technology to commit crimes in general. Having so much information readily available through technology is precisely why security agencies like the National Security Administration are increasing their efforts to collect...