Power Of Privacy: Documentary Analysis

Improved Essays
The Power of Privacy
‘The Power of Privacy’, is a short documentary film about privacy issues that the modern digital world exposes individuals and businesses to, as seen through the eyes of journalist Aleks Krotoski (Budge, Cooper & Hoeff, 2016). As Aleks opens up her own digital footprint to be examination by hackers, information security specialist and data consultants, both her personally and professionally information that she willingly and unwittingly shared online, is accessed and the security is scrutinised. The central message of this documentary film was to raise awareness about the vulnerabilities that exist within the information security (Budge et al., 2016, 6:50) platforms, and the significance of controlling one’s digital footprint
…show more content…
Although there are measures in place to secure information (Budge et al., 2016, 0:19), once your data is saved to the cloud and third-party providers don’t necessarily protect your interests. Hackers look for the vulnerabilities (Bradbury, 2012, p. 12) in security measures because they know that the developers of IOTs are more focused on getting their product to market than they are in incorporating security measures into their devices (Budge et al., 2016, 25:29). IOTs may have provided individuals and businesses with mobile access to their digital world; but the price being paid for this access is their privacy (Samani, Ghenniwa, & Wahaishi, 2015, p. …show more content…
However, with the pace at which IOTs are evolving, digital security will only be able to maintain a reactive disposition (Bradbury, 2012, p 14).
I will highly recommend this documentary to my friends and family to watch, especially those who are considering any future business ventures. Digital privacy has become a crucial factor that individuals, businesses and governments must be aware. Future IOTs will link the world through ordinary objects, as they communicate with each other, and use the data gathered to provide smart services (Jayaraman, Yang, Yavari, Georgakopoulos, & Yi, 2017, p. 540). With this in mind, it becomes imperative that privacy needs are not an afterthought (Budge et al., 2016, 26:58) when it comes to digital

Related Documents

  • Improved Essays

    Rhetorical Analysis: Why Privacy Matters While listening to and reading the lecture, Why Privacy Matters, given by Glenn Greenwald at the TedGlobal event in 2014, it because clear to me that this speech presented information that was methodically and strategically conceived to make an argument that would try to change the perception of its targeted audience. The main argument in this lecture is about our privacy when it comes to the internet and its various forms such as services like, Google, or Facebook. The author argues that in an era where more and more intrusion is occurring into our digital lives, people are conforming their actions around the notion that they may be under the watchful eyes of various entities. That’s where the importance…

    • 962 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    In Rebecca Solnit’s article, “Easy Chair” I realized that we do not have privacy at all if we use the technology and take care of our things online on the Internet. The article Poison Apple made me realize that we do not have privacy at all if we use technology. For example, Rebecca Solnit mentioned, “Google is the world’s biggest advertising company, watching you on nearly every website you visit’’ (Solnit 5). This passage demonstrates how technology has been part of everyday human's life. Google knows everything about everyone’s interests and it can share this information with its partnerships and use it for their benefits.…

    • 166 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    In an article entitled “A Day in the Life of Big Brother” by Erik Sherman, the components of services that citizens use daily are observed as to how they track, and in turn report, the actions of their users.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    9/11 Security Issues

    • 1440 Words
    • 6 Pages

    We live in a society now that is more inter-connected than any other in history. There are cameras in every phone and on every street corner, microphones in all 'smart' devices and a seemingly infectious apathy towards these windows in to our private lives. Post 9/11 saw the world, primarily the United States, crack down on its security by instituting legislation like the Patriot Act, which was a law basically stripping away the basic rights granted to an American citizen if the government deemed you a threat. Now that the innate fear of terrorism has fallen since then, a massive discussion has arisen regarding what information the government can ethically obtain through digital means and what is really ‘too far’ and should not be breached…

    • 1440 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Dbq Privacy

    • 800 Words
    • 4 Pages

    Privacy should be kept intact even for sake of security. One of the main supporting arguments for security is that if an individual has nothing to hide, then they have nothing to fear. In The Accountability Matrix by David Brin, Brin highlights the fact of having tools…

    • 800 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    “Privacy is not an option, and it shouldn't be the price we accept for just getting on the Internet,” stated Gary Kovacs the president of several software companies (Kovacs). However, since the implementation of the Patriot Act in 2001, the loss of American privacy is one of the many results of the new set of revised laws that have been rewritten to give the government more freedom in observing our electronic fingerprint (“Surveillance Under the Patriot Act”). In their hurry to act on the tragedy of 9/11, Congress passed the Act a mere 45 days of the event, with little to no debate. The result of it’s ratification, was a drastic change in the surveillance laws and restrictions of the federal government (“End Mass Surveillance Under the Patriot…

    • 1537 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    In this opinion Connecticut`s law also is found unconstitutional and infringing upon marital privacy, however, the 14th Amendment does not include all of the first eight Amendments. Liberty embraces the right to marital privacy, even though not being specifically mentioned in the Bill of Rights, but based on case law, history and language of the 9th Amendment it suggests to do so. The language of the 9th Amendment shows that there are rights, alongside with the existent rights, which are not mentioned in the Bill of Rights, but still are protected from governmental infringement (O`Brien, 370). The 9th Amendment was written by James Madison, who understood that all rights cannot be specifically defined and mentioned in the Amendments, and…

    • 512 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Spying In 1984

    • 825 Words
    • 4 Pages

    Everything you do electronically can be tracked, saved, and manipulated, regardless of where you are. Widescale spying occurring today eerily mimics George Orwell’s 1984 in an imminent and frightening way, as average people are no longer as private as they used to be. In 1984, Winston is trapped within a totalitarian government that watches everything its residents do or say. These residents are spied on everywhere they go and are never immune to government overwatch. In the United States today, normal citizens are being watched by internet-connected devices, government big-data collection, and businesses looking for profit.…

    • 825 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The similar threat of constant surveillance in our modern lives is prevalent. The technological and corporate control of firms such as Facebook and Google, show that we are being constantly tracked. “Progressive migration online raises concerns over surveillance and exposure. Even casual Facebook users develop a presence that matters” (Trottier 2012.) Social media has the power to track everything that one may connect or have to do with it.…

    • 1109 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Citizenfour

    • 589 Words
    • 3 Pages

    We are currently living in a world that’s more connected than ever before. Information is just a few clicks or taps on a screen away. But this connection has allowed corporations all over the world to control us by seeing exactly when, where and what we are doing. In a few years, the term privacy won't be a fundamental right, but a luxury few of us will have. This is all highlighted in the award winning documentary Citizenfour, which through…

    • 589 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    New technologies are putting more pressure on the boundaries of privacy. New ways are emerging that aid in tracking private information on individuals. No matter what new technology emerges, individual privacy rights should be respected at all levels. Americans are concerned of how to maintain an equilibrium between their personal privacy rights and the need for government to track potential terrorist threats since Edward Snowden leaked National Security Agency's (NSA) documents which included collections of information regarding data from cellphone and internet of millions of Americans. Freedom, privacy and safety are the rights of Americans and should not be compromised to confirm safety from terrorism.…

    • 542 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In our modern day society, individuals are actively on the internet, exposing themselves in every aspect unknowingly. We are oblivious to who is watching and collecting our information. Many of us are oblivious to how far the government is willing to go to uncover any secrets or imminent threats. In Peter Singer’s essay, Visible Man, we explore how we have currently encircled ourselves in an environment that calculates our every choice and action because we constantly reveal our information. Singer explains how we have deliberately invited the government into our private lives.…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    With the continuing development of the Internet, the center stage of individual, business, and government discussions became a new globally sought after resource, data. Since its origin, Internet users have been warned about the dangers of posting personal, intimate information publicly; however, recent events have shifted privacy discussions away from discouraging posting ill-advised information to bringing awareness to under the radar data collection. Data is a very broad term that encompasses almost all Internet activity. What users search, click, view, and type is all collected and processed by either the website, Internet browser, or even the device itself. The demand for this personal data is enormous.…

    • 1224 Words
    • 5 Pages
    Great Essays