Loo1 Unit 2 Research Paper

Improved Essays
Blackboard Name: Sanya Murgai
PSID: 1264832

LO1: Discuss information privacy and methods for improving the privacy of information.
LO2: Explain the effects on information privacy of e-mail, data collection, and censorship.
In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it. Because social media has become a huge part of our everyday life, companies search these websites to find background information about applicants, and make decisions based on that. Big organizations gather our data and most of time abuse it, and dishonor our privacy. Every bit of our information on the web has become easily accessible. For example, information can be bought and sold at a company’s expense. These companies might send us emails, which would land up in our spam folder. A person not familiar with spam could open that email and give the sender access to everything! Large firms have databases with information on millions of people, tracking their every move. Though there are privacy laws protecting us, enforcement has been laid back. A major use of social security number is to cross-reference it with all our records, making every
…show more content…
Google launched its fast Internet service in Kansas City in 2012, the Web giant said it wanted to spread broadband widely and close the "digital divide." The survey, in six low-income Kansas City, Mo., neighborhoods, found that just 10% of residents subscribe to Google's Fiber service. The results suggest that the digital divide is less about where broadband service is offered -- the subject of fierce debate when Google first arrived in Kansas City -- and more about who finds it useful and can pay for it. For years people dint have the Internet, so now when it is available they question the need to have it. (124

Related Documents

  • Improved Essays

    Caftori and Steve (2002) conducted research on issue of privacy in the Information age. The study conducted by Lee on Trust and Privacy online revealed that people are concerned about privacy, but they are ready to share their information when they have some benefits.…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Unit 33 Research Paper

    • 1848 Words
    • 8 Pages

    I was working a midnight shift at the entry control point with my partner on Security 12, patrolling the F-4 ramp, conducting a 100 percent hands-on “Restricted Area Badge” check. Anyone requiring access to any restricted area had to display the proper credentials prior to gaining access. During random points in our shift we were directed to conduct checks to ensure only authorized personnel gained access to these areas. After conducting checks for thirty minutes, my partner and I headed over to Security 33’s post.…

    • 1848 Words
    • 8 Pages
    Superior Essays
  • Great Essays

    P1 Unit 2 Research

    • 1410 Words
    • 6 Pages

    Question #1 Word Count: 245 P1: The Critical lure in Experiment 1 is a word that was related to the studied words but wasn’t actually present in the original list. Studied words that were not omitted were recalled with a 75% confidence level. Unrelated lures stuck out like a sore thumb at (80%), and weakly related lures showed little significant, but critical lures were recalled with false confidence of (58%). This data demonstrates that we falsely remember things related in subject matter but fail to identify the source of these items especially when there is in-between time recall. P2: The fact that we can misjudge the source of our memories by creating what we think to be a realistic origin of memory can help explain why the critical…

    • 1410 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Oto Research Paper

    • 288 Words
    • 2 Pages

    Otocinclus catfish can be very handy fish to have in your aquarium. They will gladly graze on any soft brown or green algae that grows in your tank. However, what happens when your Oto eats all the algae and it doesn't grow fast enough to sustain your catfish? Well, there are several other types of food that you can add to supplement your Oto's diet. 1.…

    • 288 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    LO 2.1 I understand that free energy, the portion of a biological system’s that can perform work when temperature and pressure are uniform throughout the system, is used in systems to cause change. I also understand that empirical data proves all organisms require a constant energy output to maintain organization, to grow, and to reproduce. (Campbell 119-123) LO 2.2 I understand that although free energy is always required in living systems in order to maintain organization, to grow, and to reproduce, there are multiples ways in which living systems use the energy. (Campbell 119-123) LO 2.3…

    • 391 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The Federal Communications Commission (FCC) adopted a set of rules that would make sure the internet would remain an open and free place. This issue was sparked up when it was discovered that Internet Broadband Providers (ISPs) had the ability to manipulate data as they saw fit for their own profit. In order to uphold the policies that help keep the average person’s data out of their ISP’s hands, a presidential candidate who supports net neutrality must be elected. Bernie Sanders is the best candidate to defend net neutrality because he's against corporate control, spying on American citizens, and supports the FCC's regulations. The internet has become an integral part of American educational, business, and recreational life.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Since the government is invading our privacy it’s like having them watching our every move and constantly looking through our photo’s, Facebook messages, and text messages. For example when the FBI wanted Apple to unlock a terrorist phone so that they could look at the text messages. Apple informed the FBI that if they unlock that phone then they would be forced to unlock all of the phones. If they did this then hackers or the government could get a hold of something they don't need to know about. The government need to stop invading our privacy because if something gets leaked it could cost the government a lot of money or ruin someone’s life.…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The word security has changed over time in different ways including what it means, context, and what it really stands for. Security in today’s age means the state of being in good protection from danger. However, looking back the definition was more so related to social status and economic security meaning you were making steady income. Both still mean protection from danger, as in now we think of it as protection for life but back then it was protection from what people thought you were, homeless or poor. Let's look at the text 1, Declaration of Independence, which talks about its contextual meanings.…

    • 457 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    This Generation of society has no boundary on privacy, with social media and connecting through technology more, It is much easier for private/personal information to get out and into the wrong hands. According to Boonsri Dickinson, a researcher for ZDNet states that “The popular social media feed Facebook, got three clever criminals in New Hampshire a lot of loot. They checked on Facebook to when people weren't home, and being the holiday season leaving their incoming gifts vulnerable. Just after 18 homes they accumulate $100,000-$200,000 dollars in stolen goods”(Dickinson) . All because people allowed themselves to be vulnerable!…

    • 1159 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The 21st century is often referred to as the era of information. This is due to the radical amount of social networking that takes place on a day to day basis. This includes everything from Facebooking your close friends to googling answers for that last minute history assignment. Information is constantly being streamed onto the internet and it only takes a matter of seconds to go viral. The question is then raised, are privacy rights being violated and if so who is to blame?…

    • 974 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    The internet, a global network consisting of interconnect networks represents a connected world where data and information can be discovered and shared without limits. Information and communication technology (ICT’s) acts as a gateway to the internet connecting people globally. The problem is that Information and communication technology, is not evenly distributed around the world and thus there is the issue of the digital divide. The digital divide is the inequality between people with access to these information and communication technology and those do not. On a global scale, the global digital divide covers disparities between the developed countries which have access to this form of technology verses the developing countries which do not have access to this technology depriving them from developing into a developed country.…

    • 1380 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Change is inevitable. It is no secret that advancements in time and ideas are destined to change the status quo, but the foresight to analyze the gray area where change occurs is often times unknown because change does not come easy. From the world’s most renowned scholars in ancient Greece detesting the shift from oral-based rhetoric to writing, to influential elites hindering the printing press from breaking long-standing institutions, these examples parallel the modern case of writing alongside automation facing venerable opposition while sitting on the cusp of a similar seismic shift. Momentum garnered from automation is changing numerous facets of everyday life, and it is only a matter of time before automation breaks through and changes…

    • 1613 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The 21st century has not hindered concern surrounding this digital divide within international agencies such as the United Nations Development Program (Norris 2000). The disparities between developing societies and advanced are considered to be increasing and gap widening. This lends itself to putting countries at an economic advantage or disadvantage, leading to many flow-on effects. Poorer nations such as India, Africa, and southern parts of Asia have been in large, unable to invest in the internationally growing technologies, which would allow their nation to have and maintain Internet access, due to the initial start up investment necessary (Reference). A country not having Internet access in today’s digital age leads to a number of economic consequences.…

    • 1589 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    In her article, she discussed about how useful is social media in finding jobs, she said, “ job searchers are migrating away from traditional sites and toward social networks like LinkedIn and Facebook, where many feel more comfortable and in control. They 've helped LinkedIn raise its market share in job search from 4.7% in 2010 to a projected 12.2% by 2013”. This date shows that how social media is in progressing its advantage to the public users. In end, social media has advantages and disadvantages, but the advantages of social media can’t change the fact that you all ways at high risk of privacy and security issue. The advantages social media we can gain from other sources, but our privacy, security and emotional stability we can’t find it somewhere else.…

    • 1117 Words
    • 4 Pages
    Improved Essays