Privacy And Library Database Analysis

Improved Essays
The steps I took with this assignment I first searched Privacy and Security in The Internet through Googles search engine then the Library Database. I read through the title of the articles to see which one came close to the topic. I then followed same steps on the Library database looking for Scholarly articles only.
This article referenced how President Obama Administration is increasing our cybersecurity against cyberattacks. The internet holds thorough information about our lives, but the fact it’s been in existence for only 20 years makes it easy access for problems like crashing and hacking. It also mentioned how people are able to mask their being and also give a false testify because their identity remains unknown. They know in due time people will transition to smartphones which allows us to store personal information on these portable devices. It also mentioned the fight for internet freedom in developing countries is a life and death issue. It also gave a view how we will store more information as the
…show more content…
The article I chose from Google was more focused about how the internet’s effect our lives, because we trust these newly developed devices with very important and personal information it could one day lead to extremely threating situations. Whereas, the Library Database search was more about technical problems with security, which mostly caused by humans not the devices themselves. I believe the author of the Google article only chose to write this article in order to draw attention to the business in which he is a Cofounder and CEO, but do think the article he wrote was very clear and easy to read. I feel as though the article from the library database was more difficult to read because it was full of jargon from the topic, but it did give great insight on how to secure your computer’s hardware in better

Related Documents

  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Why Privacy Matter Even If You Have “Nothing to Hide” In the article “Why Privacy Matter Even If You Have ‘Nothing to Hide,”’ Daniel J. Solove, talking about the government governed the information to analyze without the permission. Many people didn’t realize how many problems by let the government take their information to analyze. Solove does a great job to persuade the readers that we deserve more the privacy by using the appeal to authority and anecdote.…

    • 704 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The very idea of a worldwide system that could send messages instantly was a mere fantasy until the year of 1969. Of which the first internet message was sent, “Lo”. In direct result, the era of the Internet was kickstarted into existence. It would be twenty years, in 1989, until the first service providers were erected into existence. Major companies such as Comcast wouldn’t start to provide high speed internet until the late 2000’s.…

    • 713 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The author uses her knowledge of the topic to further her own argument against it, and to ultimately scare her readers. Whether they are the older generations who did not grow up with the internet, or the younger generations that are unaware of the effects of their browsing history. Andrews knows her target audience and how to tailor her words to them, similar to news agencies choosing what to report to each user based on their history. This “weblining” that she discusses in her essay, she is guilty of herself (334). She rattles off buzzwords that, to a layperson, sound quite intimidating.…

    • 758 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    There has been an increased interest and knowledge in relation to privacy rights and issues. The reason for this is that they are a fundamental right which ensures the personhood of individuals by allowing them to control who has access to personal information about them. Privacy issues are also of importance because it helps individuals avoid unwanted intrusions in their personal dealings. Consequently, for the reason that privacy is such a complex concept, there have been ongoing concerns and discussions in relation to the legal concept of privacy rights. Various theorists have provided their interpretation of privacy which includes an understanding of how privacy rights should be defined as well as what they should protect.…

    • 1075 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    New technologies are putting more pressure on the boundaries of privacy. New ways are emerging that aid in tracking private information on individuals. No matter what new technology emerges, individual privacy rights should be respected at all levels. Americans are concerned of how to maintain an equilibrium between their personal privacy rights and the need for government to track potential terrorist threats since Edward Snowden leaked National Security Agency's (NSA) documents which included collections of information regarding data from cellphone and internet of millions of Americans. Freedom, privacy and safety are the rights of Americans and should not be compromised to confirm safety from terrorism.…

    • 542 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In his journal article entitled “Privacy versus Security”, Derek Bambauer discusses the differences between security and privacy. He states that a number of legal and scholarly professionals tend to consider them the same; however, he feels they are distinct subjects that should be addressed individually. First, he addressed privacy which he views as a values issue. He states, “privacy theory supplies an account of who should be permitted to access, use, and alter data, and why those particular actors should be viewed as having legitimate entitlements thereto” (Bambauer, 2013, p. 673).…

    • 625 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    One example that the book gives is in “May 2006, […] more than 17.5 million military veterans when electronic records containing their Social security numbers [...] were stolen from a government employee’s home.” This shows that although digitalization and data keeping has made it much more efficient for companies and governments to keep track it has become a bigger issue when just a single missing computer of a snafu could lead to the threat of identification in a…

    • 1249 Words
    • 5 Pages
    Great Essays
  • Great Essays

    Why Privacy Matters

    • 1428 Words
    • 6 Pages

    Assignment Submitted By Yours Name here Submitted To Yours Instructor Name here To Meet the Needs of the Course Nov., 2015. For this rhetorical analysis task, I have selected the article which is titles as Why Privacy Matters Even if You Have Nothing to Hide, written by Daniel J. Solove.…

    • 1428 Words
    • 6 Pages
    Great Essays
  • Great Essays

    With the continuing development of the Internet, the center stage of individual, business, and government discussions became a new globally sought after resource, data. Since its origin, Internet users have been warned about the dangers of posting personal, intimate information publicly; however, recent events have shifted privacy discussions away from discouraging posting ill-advised information to bringing awareness to under the radar data collection. Data is a very broad term that encompasses almost all Internet activity. What users search, click, view, and type is all collected and processed by either the website, Internet browser, or even the device itself. The demand for this personal data is enormous.…

    • 1224 Words
    • 5 Pages
    Great Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Superior Essays

    Introduction The most powerful and prominent force in the world has without a doubt has been, the rapid advancement of technology following the industrial revolution. From the introduction of the steam engine by James Watt to the mass expansion of railway lines, technological advancement has increased productivity and globalization exponentially. By breakthroughs in communication, transportation, and information technology, the world in which we reside has become unrecognizable to what it was 200 years ago. This essay encompasses these three ways in which technological advancement has completely restructured and revamped the world of as we know it. Cementing itself as the most powerful force on the planet.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    1. We are advisors to the president. The nation is experiencing the following: a) It has a high unemployment which stems from an insufficient use of resources. The issue of unemployment is a big challenge in the world because it affects both the developing, underdeveloped and developed nations. One of the reasons why there is high unemployment is because of the nation’s resources are not comprehensively utilized.…

    • 912 Words
    • 4 Pages
    Improved Essays