According to Centertech.org (2014), over the past five years alone, computer technology has resulted in the growth of smart phones and tablets; devices capable of not only communication, but also multimedia processing of pictures videos, email, and text messages. The growth of e-commerce has revolutionized shopping as users can shop online for their preferred products. Additionally, cars are now being manufactured with computerized capacity, making driving more safe. However, with such technological advancements, various issues of concern regarding the safety of sensitive personal information arise. This paper seeks to argue that despite the numerous technological advances made so far, human beings are still in control of their
According to Centertech.org (2014), over the past five years alone, computer technology has resulted in the growth of smart phones and tablets; devices capable of not only communication, but also multimedia processing of pictures videos, email, and text messages. The growth of e-commerce has revolutionized shopping as users can shop online for their preferred products. Additionally, cars are now being manufactured with computerized capacity, making driving more safe. However, with such technological advancements, various issues of concern regarding the safety of sensitive personal information arise. This paper seeks to argue that despite the numerous technological advances made so far, human beings are still in control of their