Privacy Concerns in Information Computer Technology

  • Length: 1042 words (3 double-spaced pages)
  • Rating: Excellent
Open Document

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Text Preview

More ↓

Continue reading...

Open Document

Information Computer Technology has already played an important role in people’s daily lives. It is widely used in information gathering, communication and mutual operation. Modern people have been benefited from more efficient information flow, less cost and faster communication. However, every coin has both sides. ICT also has brought people’s lives some concerning issues at the same time along with advantages.

One of the concerning issues is the personal privacy. In internet age, privacy, as defined by Alan Westin in Privacy and Freedom (1970) is “The claim of individuals, groups or institutions to determine for themselves when, how and to what extent information about them is communicated to others.” The current advanced computer technology increases capabilities to track, store and analysis personal data, which threatens individual’s privacy and security in using ICT. Though surveys showed that individuals have strong concerns about privacy (Widespread concerns about privacy, no date), many are still not aware the ways how privacy can be infringed. The threats of privacy are indicated in following aspects.

Firstly, individual’s personal data can be tracked and gained through databases, spyware and cookies, which give providers wider chances to access personal information. The WWW servers can create extensive log of the users who are accessing the web. It is even possible to record the address of the user and the previous address from where the user connected to the web service. Service providers can then collect and analyse these information to generate commercial market reports. Searching engines like Google and Yahoo store users’ personal data’s for years, some information is used for commercial purpose. It is said that Google filters its users’ emails to provide them with targeted advertisement. To show constraints, Google currently announced that they plan to partially delete the IP addresses after 18 months and create automatically expiring cookies with duration of 2 years (EU mulls new measures to protect privacy on the Web, 2008). And the same kind of thing also happened for credit card companies. They produced extensive models of users’ buying habit by using records of consumers’ purchases and sold models to other commercial companies.

Secondly, email is becoming an essential tool of communication nowadays but it is not a secure way to protect privacy. On the way emails travel from host computers to their destination, they pass through several relaying hosts. Administrators of these hosts can easily access to mails. In a local network like a company’s intranet, network administrators have chances to change users’ passwords in order to read and modify messages.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

How to Cite this Page

MLA Citation:
"Privacy Concerns in Information Computer Technology." 19 Jun 2018
Title Length Color Rating  
Essay about Is Personal Privacy Dead? - Have you ever felt violated. Like somebody knew too much about you that they didn’t need to know. Or have you ever felt like someone was watching you. As if somebody knew your every move. Most people don’t normally feel this way; most people feel safe in their general surroundings. Although with the constant use of technology in today’s era, it’s time to ask: Should we, as American citizens, feel as safe as we do. Personal privacy is such a simple phrase for such a complex idea. The definition given in the Merriam-Webster’s dictionary of privacy is, “the quality or state of being apart from company or observation.” And “personal” meaning, “Relating to the person or body.” In other words: set...   [tags: technology, privacy, hacking, computer] 1024 words
(2.9 pages)
Strong Essays [preview]
Privacy of Digitized Personal Information Essay - Privacy of Digitized Personal Information Privacy of personal information is a fundamental right of any person. No one wants his/her private details to be known to other people, especially ones who they are not familiar with. However, human society is based on cooperation between people. Society simply cannot function without this vital interaction between two human beings. No one is that capable or skillful enough to fulfill his/her daily requirements alone. The very fabric of society exists because a person has to depend on other people to get things done....   [tags: Private Privacy Information Argumentative Essays]
:: 5 Works Cited
3497 words
(10 pages)
Strong Essays [preview]
The Internet, Technology, and Privacy Essay - ... For example, most of the information required to steal someones identity can be found on social networking sites that users are a part of. According to the RCMP, some of the information required for identity theft includes full name, date of birth, and address. [4] With the amount of private information being collected and shared across networks and their services, a need for protection of information begins to rise. About 68% of internet users' in America believe that the current laws that are in place are not good enough in protecting people's online privacy, according to a report on Anonymity, Privacy, and Security Online....   [tags: privacy on the web, growing concern]
:: 12 Works Cited
960 words
(2.7 pages)
Strong Essays [preview]
Social Ethical Changes Caused By Information Technology Essays - The problem to be investigated is the connection between ethical foundations and the challenges presented by information technology in today’s high intensity electronic environment. The discussion centers on the topics of societal ethical changes caused by information technology, the ethical usage of information the technology, and the development of a code of ethics surrounding these ethical issues. These topics are reviewed using Brooks (2010, October) article titled, The development of a code of ethics: An outline classroom approach to making connections between ethical foundations and the challenges presented by information technology....   [tags: Information Technology ]
:: 4 Works Cited
1946 words
(5.6 pages)
Term Papers [preview]
Computer Privacy Essay - Today a profound shift in the privacy equation is under way. Technology brings enormous efficiency to the collection, sorting and distribution of personal information. This efficiency has revolutionized countless organizations but it has also increased opportunities for snooping. The ability of computers to sift though personal information may make much of your life an open book, unless privacy policies are implemented. In many countries a large number of records are public, available to anyone....   [tags: Computer Privacy Essays] 368 words
(1.1 pages)
Strong Essays [preview]
Privacy and Ethical issues with Google Glass Essay - ... For example, an animated advertisement on a static web page may increase fixation since the motion will grab the user’s attention throughout the search process. Fixation location involves the part of the visual range that the studied person fixates on. Commonly, the areas that eyes fixate on are the most important due to experience, curiosity, shock, and significance. It has been more than a century that psychologist use eye tracking for psychoanalysis. Complex psychological profiles can be created from people by using eye movement analyzing....   [tags: wearable computer, privacy, secrecy]
:: 8 Works Cited
1733 words
(5 pages)
Term Papers [preview]
Computer Technology Essay - Computer Technology I. Introduction Over the past few decades, the advances of computer technology have undoubtedly increased the rate of information exchange. Communication across the globe is now done with ease, convenience, and speed. Accessing online bank accounts, instant messaging, online auctions, and communication via electronic email are just few examples of normal transactions that occur today. Although these advances have provided a tremendous positive impact on our society, it has also caused some controversial ethical issues, namely the privacy of personal information....   [tags: Argumentative Technological Computer papers]
:: 6 Works Cited
2557 words
(7.3 pages)
Strong Essays [preview]
Essay on Threat to Internet Privacy - Threat to Internet Privacy Abstract At what level is Internet surveillance by the United States government acceptable to society, considering a balance between security and privacy, what are the short and long term implications, and how does it affect the rest of the world. Introduction Privacy from governments has been under assault increasing amounts in the last 100 years. Technology has revolutionized the concept, as before we had microphones, telephones, wiretaps, video cameras, someone would actually need to trespass to violate your privacy....   [tags: Technology Technological Privacy Essays]
:: 5 Works Cited
2650 words
(7.6 pages)
Powerful Essays [preview]
Privacy in the Workplace Essay - Privacy in the Workplace Introduction Technology has developed in leaps and bounds over the past few decades. The case is that the law always has difficulty keeping pace with new issues and technology and the few laws that are enacted are usually very general and obsucre. The main topic of this paper is to address the effect of technology on privacy in the workplace. We have to have an understanding of privacy before trying to protect it. Based on the Gift of Fire, privacy has three pieces: freedom from intrusion, control of information about one's self, and freedom from surveillance.1 People's rights has always been protected by the constitution such as the Fourth Amendment, which prot...   [tags: Workplace Privacy Essays]
:: 5 Works Cited
2466 words
(7 pages)
Powerful Essays [preview]
Essay on Privacy - Privacy Globalization is the tendency of businesses to spread throughout the world to offer their products and services. To reflect their global market presence, multi-national companies have adopted management models such as region-specific management, and product-specific management to maximize the potential to offer efficient products and services to their customers. One such management model that has been successful in the past few years is the business process outsourcing model. Businesses outsource processes such as back office operations and customer support services offshore....   [tags: Business Information Essays]
:: 8 Works Cited
2203 words
(6.3 pages)
Strong Essays [preview]

They also have possibilities to monitor and read any files send over the network. It is often the case in a company’s office that the boss try to monitor staffs’ activities.

In addition, it is inevitable now for people to provide some very private information to organizations. Despite the fact that online services such as hotel booking, flight tickets booking and internet banking have already made people’s lives more convenient, individual’s privacy is posed threats meanwhile. Personal information, passwords and pin numbers can be obtained via hacking or the use of software such as keystroke loggers on publicly used computers. Moreover, In order to improve the performance of services and information delivery to citizens, governments now operate more via ICT which requires authentication of a person’s identity. For example, demanded by United Kingdom, individual’s finger printers have to be scanned and stored in system and used in border check before coming. The issue is that those significant data’s should be protected by governments to ensure no one other than the owner can use the information.

Another popular use of ICT is GPS and RFID technology. However, surveillance concern has been raised consequently. GPS allows tracking of people’s movements by mobile signals. And RFID enables companies to track customers’ purchases and profile their behaviours and preferences in a use of commercial purpose.
Lastly, internet media’s are booming these years. Youtube offers people a platform to share films and images and broadcast themselves. But some images and films of people in private situation are uploaded online without permission. Furthermore, the images and films of individuals on websites like Facebook are easily to be downloaded and used by others. These certainly infringe others’ privacy. Besides, newsgroups and discussion boards are also places that lack of privacy protection. Some internet users gather and track others’ IP addresses and further get others’ private information like home addresses. There are a lot of cases that people receive telephone harassment or threatening letters from unknown persons.

All in all, private privacy calls for more concern in ICT area because individual’s rights can be violated and social, academic reputation even life may be put at risk. European Union has established related regulations to restrict ICT providers’ activities to protect private privacy. But more important is the awareness of self protection on individual users’ side, such as logging own account off every time when finishing using public computers. Never provide personal information to non confidential websites or organizations. There can be an organization or website which share the privacy knowledge and promote awareness to publics. By working on both sides, the improvement of privacy in ICT will take effect.

Referencing list
1 EU mulls new measure to protect privacy on the Web (2008). Available at: (Accessed: 10th November 2008).
2 Westin,A. (1970) Privacy and freedom. The Bodley Head Ltd
3 Widespread concerns about privacy (no date). Available at: (Accessed: 10th November 2008).

1 A matter of trust: privacy and security issues in the information age (2004) Available at: (Accessed: 10th November 2008).
2 Current ICT safety and security issues (2006). Available at: (Accessed: 10th November 2008).
3 EU mulls new measure to protect privacy on the Web (2008). Available at: (Accessed: 10th November 2008).
4 ICT, EU acts on growing privacy concerns (2008). Available at: (Accessed: 10th November 2008).
5 Westin,A. (1970) Privacy and freedom. The Bodley Head Ltd
6 Widespread concerns about privacy (no date). Available at: (Accessed: 10th November 2008).

Return to