Vulnerabilities And Loss Of Privacy In The Digital Age

Great Essays
Technology is currently changing our privacy in the digital age and the implications that has for our private information. The digitization of our life plays a major role in how much privacy we should expect. The digital era has brought new technology to collect, store, and analyze data all with the click of a button. This means that our data is not as private as it used to be when technology was not storing our data. Having something public means something completely different than it did 20 years ago. Today, all of our information is available publicly online and to a wider audience than ever before. With this exponential increase in technology, consumers have been looking for ways that they can protect their privacy. This essay hopes to …show more content…
Farhad Manjoo, a columnist at the New York Times, furthers this idea by stating, “We have decided, as a society, to rush headlong into a world ruled by digital devices, continually weighing convenience versus safety. We’re constantly storing more of our important information on more new kinds of hardware run by more complicated software. All of it is increasingly interdependent, which makes the whole ecosystem more vulnerable” (Manjoo). Websites and software programs are interconnected more than ever before. Our phones can communicate with our cars and computers and we can use a Facebook login or Google login for nearly every website. Even though we value privacy, we continue to look past that and move towards convenience. One login to use for every websites is convenient for the consumer, even though it means that Facebook or Google knows what we are using on other sites. It also means that if either of these accounts is hacked, more of our information can be leaked. The interconnectedness of our information is growing, and with that, comes major challenges to our privacy as it makes all of our information more …show more content…
A consumer wants to know what information a company is holding, without giving hackers a way to view that information. This culminates into creating a false sense of security to the consumer. The data that Google provides may be useful to a consumer, but it 's exponentially more dangerous in the hands of a hacker. To solve this Google needs to institute stronger safety protections when using My Activity in Google. Google should allow this service only on computers that a consumer has verified access on before. They should also restrict access to this feature for those consumers that have a two-step authentication with Google. These two steps would greatly reduce the chance that a hacker could access this sensitive information. Unfortunately, no one yet at Google and those in the technology industry have not discovered that this information could be exploited. When exploring current research, I was unable to find a single source that identified that this information could be hacked and would exploit consumers further. While corporations may worry about security breaches, they also should be weary of the cost that those breaches may bring with

Related Documents

  • Improved Essays

    Caftori and Steve (2002) conducted research on issue of privacy in the Information age. The study conducted by Lee on Trust and Privacy online revealed that people are concerned about privacy, but they are ready to share their information when they have some benefits.…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Its a well known fact that technology is becoming more embodied in our lives. The Pew Internet and American Life Project released a study stating the number of adults that own cellphones, laptops or tablets is rising. This increase in ownership of technology has revolutionized access to information through the internet. One notable case is O’Grady v. Superior Court of Santa Clara County (2006). Apple filed a case against an unnamed individual who allegedly leaked information on several online sites regarding new Apple products.…

    • 315 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    “Privacy is not an option, and it shouldn't be the price we accept for just getting on the Internet,” stated Gary Kovacs the president of several software companies (Kovacs). However, since the implementation of the Patriot Act in 2001, the loss of American privacy is one of the many results of the new set of revised laws that have been rewritten to give the government more freedom in observing our electronic fingerprint (“Surveillance Under the Patriot Act”). In their hurry to act on the tragedy of 9/11, Congress passed the Act a mere 45 days of the event, with little to no debate. The result of it’s ratification, was a drastic change in the surveillance laws and restrictions of the federal government (“End Mass Surveillance Under the Patriot…

    • 1537 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Lobbying Exercise

    • 1168 Words
    • 5 Pages

    5. What could you have done differently during our lobbying exercise to ensure the opposite outcome? 5. For the lobbying exercise, my role was Diane Schwier, an aggregate inspector with the ministry of natural resources. In order to change the outcome of the quarry not being built I and the other Diance Schwier could have done more advocating against the quarry.…

    • 1168 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    The word security has changed over time in different ways including what it means, context, and what it really stands for. Security in today’s age means the state of being in good protection from danger. However, looking back the definition was more so related to social status and economic security meaning you were making steady income. Both still mean protection from danger, as in now we think of it as protection for life but back then it was protection from what people thought you were, homeless or poor. Let's look at the text 1, Declaration of Independence, which talks about its contextual meanings.…

    • 457 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    This Generation of society has no boundary on privacy, with social media and connecting through technology more, It is much easier for private/personal information to get out and into the wrong hands. According to Boonsri Dickinson, a researcher for ZDNet states that “The popular social media feed Facebook, got three clever criminals in New Hampshire a lot of loot. They checked on Facebook to when people weren't home, and being the holiday season leaving their incoming gifts vulnerable. Just after 18 homes they accumulate $100,000-$200,000 dollars in stolen goods”(Dickinson) . All because people allowed themselves to be vulnerable!…

    • 1159 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    To support this we look at Nicholas Thompson’s article “Bigger Brother: The Exponential Law of Privacy Loss.” Thompson argues that the internet is designed to collect information from people therefore, even with privacy laws in place, owners of sites will continue to find creative ways to socially connect people (Thompson 284). He continues by referencing software designed by carrier IQ that is specifically created to track searches, locations, and purchases. Thompson states that the purpose of this software is to better enhance the network as well as peoples average everyday lives (285). Nicholas later goes into detail explaining the exponential law of privacy loss.…

    • 974 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In our daily lives, we relinquish some of our private information ignorantly. As human beings, many of us tend to simply hand out our information in exchange for other items or free services. Many times, online shopping offers better prices but at what cost? Sometimes, better prices means relinquishing your private information that could be obtained by anyone at anytime. In the article, The Convenience-Surveillance Tradeoff, the author makes compelling points on how our society is unaware of the repercussions that come with relinquishing our…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Why Privacy Matters

    • 1428 Words
    • 6 Pages

    In this essay the author Solove has contends that the issue of privacy influences more than just people concealing an off-base. He clarifies how this argument originates from a lacking meaning of what privacy is and the worth that privacy has. The disciples of the nothing-to-hide argument express that in light of the fact that the information won't be uncovered to the general population, the privacy hobby is negligible, and the security enthusiasm for…

    • 1428 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Currently, the company clearly states their stance on information sharing on their privacy policy page, but recent company actions have violated these policies, pushing Google to question whether the company should change its current approach to…

    • 1224 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    Difference Between Facebook And Brand Policy

    • 998 Words
    • 4 Pages
    • 7 Works Cited

    That being said Google still has access to your information; they just have a few better policies to protect your identity from being made publicly available. “Google hasn’t won many accolades, either. Eric Schmidt, when he was CEO of Google, famously said that “Google policy is to get right up to the creepy line and not cross it.” He was talking about chip implants, but his statement has been widely interpreted as describing Google’s general approach to balancing its interest with users’ privacy.” (Mui, 2011)…

    • 998 Words
    • 4 Pages
    • 7 Works Cited
    Superior Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays

Related Topics