Free Essay

Abstract for Privacy

In:

Submitted By ant1oni2
Words 568
Pages 3
CSC 480: Social & Prof. Issues in Comp.
Instructor: Joe Khalife
Name: Antonio Saad
ID: 201002709

During the past ages people have been searching for a way to improve their lives, and they searched and searched until the year 1960 when a bunch of people came up with the idea of internet. Since then the internet has been improving and expanding its reach throughout the world. Nowadays internet has become an integral part of humans’ lives, with such powerful capabilities, it has almost the solution for every problem we face in our lives. Internet has connected all ends of the world and made in a small village, but eventually it had some negative effects. Most of our personal data that we share on social networks, trades we do on e-markets, and all conversations are being monitored and stored even after we remove them from the web. But who gave them the right to hijack our info isn’t it a form of illegal hacking.
A motivation for threats to online privacy arises from factors that are particular to the victim. A relationship between two individuals – a couple going through a break-up, an employer and ex-employee, etc. – may cause one party to target the personal information of the other. “Cyber stalking” is perhaps the most common form of this kind of attack on personal information. Whereas both commercially motivated threats to privacy and attacks on privacy motivated by fraud, at bottom, share a common interest in money, personally motivated attacks seldom focus on financial assets. Rather, the motivations may be more basic: revenge, jealousy, hate, and control. Accordingly, regulatory approaches that might be expected to rearrange some of the harms associated with fraud and market-based threats to privacy – such as laws regulating use of computing resources, for example – may have little deterrent effect on personally motivated privacy attacks. But the issue over here is that most government today are keeping track of everything we do online, claiming the need for this info to insure national security. Well who made it legal or better who gave them the right do so, is it the privacy policies they keep hiding behind? Well we cannot do anything about we can only sit and watch because they are our protectors. The best thing you should do if you think you are being watched, or being tracked is go back to the nineteenth century or remain in this century but be careful on what you put online and what you say.
Are these governments invading our privacy or are they just protecting us? Well in the sake of protection government need to monitor travelers in the airports to prevent any terrorist act, but can they take revealing images of us. Well they are and they claim that they are not storing or saving these images, but researches have shown that they are being stores and it is only a matter of time before these images are leaked and you’ll see revealing images of yourself online. And again what can you do can you blame them for protecting you.
As a conclusion, we advice all internet users to think of their future and act accordingly. If they think that there is nothing wrong going on just keep using internet as they are using it know, and if they think they are being watched start thinking before you share any image online……….

Similar Documents

Premium Essay

Business

...The Right to Privacy Ramon Rubalcava Redlands University Abstract [The abstract should be one paragraph of between 150 and 250 words. It is not indented. Section titles, such as the word Abstract above, are not considered headings so they don’t use bold heading format. Instead, use the Section Title style. This style automatically starts your section on a new page, so you don’t have to add page breaks. Note that all of the styles for this template are available on the Home tab of the ribbon, in the Styles gallery.] Keywords: [Click here to add keywords.] The Right to Privacy In this new generation the right to privacy is getting lower by the minute due to all of the social media and new electronic devices being invented daily. The right to privacy should not even be a question everyone should have the right to privacy to a certain extent. The right to privacy is a recent creation of little consequence other than cultural custom. The right to privacy is a big part if not the biggest part of everyone’s freedom because if anyone can come into anyone’s house at any given time or listen to all their calls and read all their text people will feel unsafe and without any freedom; It will feel like a prions where everything is being monitor. Everyone likes their privacy even if they do not have anything to hide just knowing that whatever they do or where ever they go will be only known to them and those they chose to share it with making them feel in control of their life...

Words: 1256 - Pages: 6

Free Essay

Business

...Running head: ELETRONIC SURVEILLANCE OF EMPLOYEES Electronic Surveillance of Employees Lorrie Bass Strayer University Assignment # 1 Submitted in Partial Fulfillment Of the Requirements for the Course LEG500: Law and Ethics in the Corporate Lateefah Muhammad Fall 2011 Contents Lorrie Bass 3 Date: January 12, 2012 3 Abstract 4 Discussion 1 Explain where an employee can reasonably exspect to have privacy in the work place…………..4 Answer 5 Discussion 2……………………………………………………………………………………………………………..5 In the office there is typically two types of workspaces, an open area, in which there are several desks and he conversations can be overheard, or an enclosed office, in which-when the door is closed-conversations cannot be heard and where one would exspect virtually total privacy. Explain whether it makes a difference if an employee ia an open area or in an enclosed office. 5 Answer 5 Discussion 3 6 Explain if Herman’s need to know whether his sales person are honest is a sufficient ground for utilizing electronic surveillance 6 Answer 6 Discussion 4 7 Explian to what extent an emlpoyer can engage in electronic surveillance of an employee 7 Answer 7 Discussion 5……………………………………………………………………………………………………………..8 Explain to what the inclusion innocent, unaware third parties in such surveillance determine whether it is legal……………………………………………………………………………………8 Answer……………………………………………………………………………………………………………………9 ...

Words: 823 - Pages: 4

Premium Essay

Code of Etthics

...care of individuals, families, groups, and communities. Individuals who become nurses are expected not only to adhere to the ideals and moral norms of the profession, but also to embrace the part of what defines a nurse. The Code of Ethics for Nurses developed by the American Nurses Association explicitly states the primary goals, values, and obligations of the profession. Part Three According to the American Nurses Association’s Guide to the Code of Ethics for Nurses Interpretation and Application, Provision Three states “The nurse promotes, advocates for, and strives to protect the health, safety, and rights of the patient (Fowler, 2010).” In the interpretation of provision three, the definitions of privacy and confidentiality are provided and explained separately. Privacy refers to “those aspects of a patient’s life and information that he or she can control” while confidentiality is described as...

Words: 1309 - Pages: 6

Premium Essay

Computer Ethics

...Privacy and Policy By Amanda Mullens Heales Computer Ethics 324 Professor Abedin May 2, 2012 Abstract Can we protect ourselves on the internet? Although the internet is a wonderful place to shop, explore and interact with other people we should always keep our guard up, to protect our privacy. Privacy and Policy Many services are very diverse, so sometimes additional terms or products may apply. Terms of Service for You Tube/Google states that using services do not give you ownership of any intellectual property rights in content you access. And you must obtain permission from its owner or are otherwise permitted by law. Many terms do not grant you the right to use any branding or logo’s used in services. Privacy policy for MySpace describes that use and sharing of personally identifiable information (PII). You must obtain written permission from the member directly. Profile information in a member profile is provided at his or her sole discretion. Facebook privacy states that you must respect others people’s rights. That member will not use Facebook copyrights or trademarks without written permission. Members are not allowed to infringe others peoples intellectual property rights. Or your account will be disabled. If you collect information from users including video, you must obtain their consent and must state clearly what information you are collecting and why. Facebook has changed its privacy policies making information more public...

Words: 261 - Pages: 2

Premium Essay

Ifsm 304 B1

...Medical Privacy and Your Information IFSM 304 Abstract With the increasing amount of personal data which is being compiled on the Internet and specifically medical information we must look at the ethical dilemma of who has access to our data. Not only general demographic data such as full name, home address, phone number and date of birth but also extremely sensitive medical information such as diagnosis, and medication prescribed. Even though the convenience of digital records accessible to care providers via the web can expedite service, security and privacy have to be considered and maintained. Ethical dilemma: Medical Privacy and Your Information | Stakeholders | Veracity | Confidentiality | Autonomy | 1: Individual | Individual must ensure truthfulness and accuracy in providing any information to medical personnel. | Individuals must the right for privacy of all medical information . | The individual patient must ensure their right to make any decisions in dealing with their treatment and how their personal information is handled. | 2: Medical Personnel | Have the responsibility to provide truthful information concerning a patient’s diagnosis and treatment. | Responsible to maintain the personal privacy of all patients’ information. | Have the responsibility to make appropriate decisions when dealing with patient data. | 3:Website/Cloud Administration | Must maintain the appropriate level of ethical and legal obligations and ensure all site users are...

Words: 549 - Pages: 3

Premium Essay

Hippa

...Health Insurance Portability and Accountability Act (HIPPA) Privacy Rule Abstract As one of the regulations of the Health Insurance Portability and Accountability Act (HIPPA) of 1996, Public Law 104-191; the HIPPA Privacy Rule sets “the standards for privacy of individually identifiable health information” (Speers, Wilcox, & Brown 2004). Established by the U.S. Department of Health and Human Services (HHS) in 2002, this set of national standards deals with the use and disclosure of health information, in addition to the principles guiding patients’ rights over their health information; which includes the right to review, obtain a copy of their health records, and request corrections. The ultimate goal of the Privacy Rule is to protect the confidentiality of patients’ health information while enabling the use of this information for appropriate health care related purposes. Health Insurance Portability and Accountability Act (HIPPA) Privacy Rule The Privacy Rule contains standards that outline terms for the electronic exchange, use, and privacy protection of patients’ personally identifiable medical information; also referred to as protected health information (PHI). These standards apply to the following covered entities: health clearinghouses, health plans, and health providers who transmit health information in electronic form; (Hoffman & Podgurski, 2007). Health clearinghouses are businesses that are utilized to process PHI into...

Words: 620 - Pages: 3

Premium Essay

Data Privacy Trends

...Bessie Napper IT 547 OL Data Privacy Trends April 28, 2016 Abstract: The purpose of this paper is a reflection on Data Privacy Trends of 2015. This paper will summarize my opinion on the talk about what matters most in data privacy. It will show how the panel has laid out a compelling discussion about the issues facing data privacy. Churchill Data Privacy Trends 2015 presented on what matters most in data privacy. They talked about the ever-growing demand for big data. How increasingly effective “bad actors,” leading to the worst year on record for data breaches. That privacy practices was designed only to deal with compliance or breach response. The conflicting global privacy laws and a growing concern among consumers about whose doing what with their data. Businesses are very aware of how consumers are increasingly aware of the risks and options as their personal data has effectively become a form of currency. As an example, telemarketers are always selling your information to other telemarketers in ways of contacting you in order to get you to buy things from them. As we live and breathe privacy all day we want to feel safe that we are not being violated whenever we go online and open a web page or email attachment. So by choosing the encrypted form of email is one way they talked about helping with privacy issues. With privacy and security one of the things they talked about is understanding where the risks are and how you can alter your behavior. This to me would mean...

Words: 621 - Pages: 3

Free Essay

Policing Information Technology

...Policing Information Technology Bill Smith BIS/220 July 11, 2012 Alisha Johnson Abstract Policing Information Technology Over the past 30 years technology has advanced at an alarming rate. Since the inception of personal computers and the World Wide Web a need for individual protection occurred. Government reform was needed. In the 1980s two Acts of Congress were passed, the Computer Fraud and Abuse Act of 1986 and the Electronic Communications Privacy Act of 1986. Initially we will examine the advances in technology that caused each Act to be passed. Last we will determine what new ethical issues came about from this new technology. Although some may see these Acts as an invasion of one’s right to privacy, they are essential to protect stored information from being used in a negative way. “A survey by an ABA task force in 1984 estimated that businesses and government agencies lose as much as $730 million a year to computer crime” (Wolf, 1986). Two years after this survey was published the U.S. House of Representatives passed the Computer Fraud and Abuse Act of 1986. During this time computers are becoming widely used across the country. The major change is the type of information being stored. Financial institutions both in the private and government sectors are using computers to store valuable financial information. Computer hackers illegally could gain access to this information and sell it to individuals with the means to use it or vandalize the company’s...

Words: 529 - Pages: 3

Premium Essay

Not Finished

...The author Abstract Terms of reference This report was written on the instructions of Jill Sinclair, a tutor of Professional issues in nursing BN 511 at Sourther Institute of Technology. This report was assigned during orientation week in Fbruary 2015. The aim is to demonstrate that the author is compentant in research by, cdemonstrating the ability to use relevant search parameters in suitable databases. Identify and discuss the not only the methodology but the ethical and legal considerations relating to the said research topic . To understand key components of the research design and discuss the current and/or future implications on nursing practise. The report is to be submitted by 8th June 2015 no later than 1600hrs in assignment box C2-06 Database search procedure The course of action undertaken to find the research study ‘Older persons have ambivalent feelings about the use of monitoring technologies’ are as follows: The author logged onto the Mysit webpage located at web address https://student.sit.ac.nz/MySIT/pages/Home.aspx The author then selected the Study and Course Resources hyperlink on the on the web address https://student.sit.ac.nz/MySIT/pages/MyStudy.aspx t The author then found several further options. The option chosen was Health and Sport under the Online Data bases As the summative assessment required a research article that related to innovation, implementation or delivery of contemporary technology in nursing, the CINAHL (Nursing &...

Words: 627 - Pages: 3

Free Essay

Paradigm Shift

...Is Google GPS Maps tracking you? January 18, 2015 Abstract It seems the possibilities are endless using Google Maps with GPS-enable devices and services. While most people still feel lost sometimes without it, even though they’ve probably travel the same route hundred times. It’s the added information that brings us to use it frequently. This paper bares the question do we use it without regard, making our gadgets seem so magical for the places and things of interest that it shows; nearby restaurants or stores we didn’t even know existed before or are we afraid to let anyone know where we are for privacy sake. Keywords: Google Maps; GPS, privacy. Is Google GPS Maps tracking you? Google Maps is the one of the two most used GPS services. Google is probably tracking your location right now, especially if you use Google as your browser or using Google Maps, it’s all in Google’s own location history map, When you set up a new Android device, or install any Google app on your iOS device, you're prompted to share location data which lets you see the path you’ve traced for any given day., now if you didn’t opt out when you first signed in then its been tracking you all along. It tracks any exact place you’ve visited and how long you’ve spent at that place. Don't be alarmed— even our teacher was surprised that it was very possible. It’s the trade-offs you make for the features you get. Go ahead check it out. 1. What kind of data does it have on you and is it private information...

Words: 1029 - Pages: 5

Premium Essay

Internet Security

...Internet Security Embry-Riddle Aeronautical University Table of Contents Abstract 3 Discussion 4 Background 4 Analysis 5 Conclusion 7 References 8 Abstract This paper focuses on five major areas of security issues on the Internet. Security concerns relate useful information to the average web surfer at home. There are tips on safeguarding one’s security and privacy over a network connection, plus some definitions of typical security problems individuals will come into contact with. The second focus of this paper includes the initial internet security measures. It will discuss the early security protocols and how technology has increased the security of the internet numerous times. Invention of internet security is the third topic of this project and focuses the invention and its impact on the Internet. The forth topic deals with the legal measures which have taken place regarding internet security issues. Finally, the fifth topic deals with the consumer privacy concerns, for the most part, people are becoming aware of internet security as online activities continue to skyrocket. As the technology becomes more available and easy to use, people seem to accept security risks in exchange for the convenience. Internet Security Since the early 1990’s, the solitary thing most people knew about internet security that there was a colossal computer network that had been inundated by a computer virus. Today it is difficult for anyone, to remember the...

Words: 1424 - Pages: 6

Premium Essay

Unprofessional Conduct

...Abstract Regardless of your occupation, employees have the right to privacy. Case 9.1: Unprofessional Conduct shows how Pettit privacy was violated. Pettit was a teacher of many years and never had a bad evaluation of her work. What she did outside of work was labeled unprofessional by the Board of Education and they chose to fire her because they believed she was unfit to teach. I disagree with them completely and they did violate her privacy. Business Ethics is defined as “the study of what constitutes right and wrong (or good and bad) human conduct in a business context” (Shaw, 2014, p. 4). Based off this definition, I believed that Pettit should not have been fired. I also believe that the Board of Education definitely violated her right to privacy and they were not justified in firing her. Pettit was a dedicated teacher for many years and she did not involve her personal life in the workplace. Because of her sexual preferences, she was judged and fired from her job. The Board of Education should not have fired Pettit is due to the fact that they had no evidence to prove that she was not doing her job correctly and her privacy was violated. Pettit was an elementary school teacher who taught children with disabilities. The case study said that “Mrs. Pettit was one of those dedicated teachers”……and “she had been working with mentally challenged children for over thirteen years” (Shaw, 2014, p. 342). Pettit did not promote her sexual lifestyles in the...

Words: 325 - Pages: 2

Free Essay

Security Survellience

...2010 Dr. C. Phil Campos Abstract It has just been discovered that Herman Hays, the owner of a car dealership, has been eavesdropping on his employees from his office. Tony Sulka, a salesman, was attempting to sale Ms. Drummand a car one afternoon. His sales skills were a little unorthodox which led Ms. Drummand to be confused about her soon to be purchase. Tony oversold the value of the car by potentially misleading Ms. Drummand to purchase a vehicle that literally did not exist. Tony was however just pulling Ms. Drummand’s leg and eventually came clean about the vehicle but not before Mr. Hays came out his office to reprimand him for his behavior. Tony’s fellow co-worker, Shelly Rice was curious to know how Herman overheard Tony’s conversation. She followed Herman into his office and saw that he was wearing a headset. To Herman’s surprise Shelly interrupted and caught him red handed eavesdropping on conversations taking place on the sales floor. Shelly voiced her opinion about Herman’s antics and told him that she could not work in a place where her privacy was invaded. She then left Herman to ponder whether eavesdropping on his employees was wrong or right. Employee Surveillance will be discussed in the pages that follow to determine and discuss both sides from the perspective of the employer and employee. 1.     Explain where an employee can reasonably expect to have privacy in the workplace. Employees cannot reasonably expect to have privacy in the workplace, not exclusively...

Words: 417 - Pages: 2

Free Essay

File

...Summary “Privacy is something cherished by almost all Americans. It is the right to live life without the government prying into what we done right to be let alone. Privacy allows us to develop into individuals with our own thoughts, beliefs, hopes, and dreams. It permits us to decide how to live our lives in our own homes. Privacy allows adults to decide who to marry, whether to have children, and how to raise a family. The right to privacy restricts how the government can investigate our lives.” – Ellen Alderman Today, when voyeurs, marketers, and the curious are invading so many aspects of what has traditionally been considered the individual's inviolate personal domain, this book is a God- send in helping us understand what it is we have with the right to privacy, and also in helping us to focus on what is so much at risk. While the word "privacy" appears nowhere in our Constitution, a majority of Americans fervently believe that their right to privacy is a key element which is central to the way they live their public and personal lives, and that it is also key to the viability of the democratic system. Given the fact that it is a somewhat abstract, ambiguous, and difficult idea to define, privacy is indeed seen as being a critical and irreplaceable basic right of individuals. For example, the freedoms of expression and religion in the First Amendment protect the right to have private thoughts and ideas. The Fourth Amendment says the government...

Words: 2131 - Pages: 9

Free Essay

Implementation of Pgp

...ABSTRACT Implementation of Pretty Good Privacy (PGP) Pretty Good Privacy (PGP), is a cryptosystem used for the purpose of secure e-mail message communication over an open network. The main idea behind introducing PGP, introduced is to increase the degree of security and efficiency of e-mail message communication. 1 Introduction Since the beginning of the era of e-mail message communication over open networks, the security of electronic mail (e-mail) has been a growing concern [1]. There have been several protocols developed and implemented to assure the security of such communication. These protocols provide the security services of message confidentiality and message authentication for an e-mail message, basically. Some e-mail security protocols that have been developed include: Simple Mail Transfer Protocol (SMTP) [2], Multipurpose Internet Mail Extension (MIME), and its enhancement, known as Secure MIME (S/MIME) [3]. Other protocols are: Certified Exchange of Electronic Mail (CEEM) [4], Secure E-mail Protocol (SEP) [5], Privacy Enhanced Mail (PEM) [6] etc. We will implement PGP(Pretty Good Protocol) which is the most popular protocol used nowadays in order to provide email security over the network. Pretty Good Privacy (PGP) [7] is an integrated cryptographic system, invented by Phillip Zimmerman in 1991, in order to establish the integrity, authenticity, compactness, confidentiality, and compatibility of e-mail message communication. Since its invention...

Words: 327 - Pages: 2