Vulnerabilities And Loss Of Privacy In The Digital Age

Great Essays
Technology is currently changing our privacy in the digital age and the implications that has for our private information. The digitization of our life plays a major role in how much privacy we should expect. The digital era has brought new technology to collect, store, and analyze data all with the click of a button. This means that our data is not as private as it used to be when technology was not storing our data. Having something public means something completely different than it did 20 years ago. Today, all of our information is available publicly online and to a wider audience than ever before. With this exponential increase in technology, consumers have been looking for ways that they can protect their privacy. This essay hopes to …show more content…
Farhad Manjoo, a columnist at the New York Times, furthers this idea by stating, “We have decided, as a society, to rush headlong into a world ruled by digital devices, continually weighing convenience versus safety. We’re constantly storing more of our important information on more new kinds of hardware run by more complicated software. All of it is increasingly interdependent, which makes the whole ecosystem more vulnerable” (Manjoo). Websites and software programs are interconnected more than ever before. Our phones can communicate with our cars and computers and we can use a Facebook login or Google login for nearly every website. Even though we value privacy, we continue to look past that and move towards convenience. One login to use for every websites is convenient for the consumer, even though it means that Facebook or Google knows what we are using on other sites. It also means that if either of these accounts is hacked, more of our information can be leaked. The interconnectedness of our information is growing, and with that, comes major challenges to our privacy as it makes all of our information more …show more content…
A consumer wants to know what information a company is holding, without giving hackers a way to view that information. This culminates into creating a false sense of security to the consumer. The data that Google provides may be useful to a consumer, but it 's exponentially more dangerous in the hands of a hacker. To solve this Google needs to institute stronger safety protections when using My Activity in Google. Google should allow this service only on computers that a consumer has verified access on before. They should also restrict access to this feature for those consumers that have a two-step authentication with Google. These two steps would greatly reduce the chance that a hacker could access this sensitive information. Unfortunately, no one yet at Google and those in the technology industry have not discovered that this information could be exploited. When exploring current research, I was unable to find a single source that identified that this information could be hacked and would exploit consumers further. While corporations may worry about security breaches, they also should be weary of the cost that those breaches may bring with

Related Documents

  • Improved Essays

    Mike Lynn: Whistleblower

    • 1252 Words
    • 6 Pages

    Cisco and ISS also had a responsibility to protect their own data and also the data of their clients to whom they provided cyber security. In future maybe the company would’ve changed its way without being exposed to lawsuits and hackers. Mike Lynn left them in a really bad situation as they had to change or modify their systems to avoid problems that were created by the leakage of company information. Mike Lynn may have done the right thing but it was still illegal and harmful to the company. It’s extremely illogical for a company to reveal its own secrets and flaws at a conference where they know it can hurt them very badly.…

    • 1252 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Both are reality today. Alternative search engines as duckduck.com, ixquick.com, startpage.com will become preferred engines and regulatory policies may prohibit data search collection. Google seems to be aware of the risks and is trying to mitigate them using the Internet and its users in a “take action” campaign. Google’s activities are in between these lines and cannot be fully guaranteed. At the same time they promote privacy and fight for government intrusion they break their beliefs by collect data from its users.…

    • 738 Words
    • 3 Pages
    Superior Essays
  • Great Essays

    Things worsened after an incident in 2012 where security analysts revealed Google was bypassing Safari browser privacy settings in order to track user activity. Although initially defending their actions, Google agreed to dismantle their bypassing mechanisms. The first event, appeared an unintended consequence of using complex technology; however, the timeliness of their response creates an ominous tone around their data collection processes. The second instance shows a clear violation of their own core principle of doing no evil as well as violating users’ right to informed consent. These events are unacceptable for a company that…

    • 1224 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Response Essay Rewrite In recent times, Apple and the FBI have been arguing over the creation of software that would be able to reveal encrypted information. The author of the article Biting Apple Bruises Privacy Rights, argues the idea that by forcing Apple to hack their product will result in future violations of security and privacy. Personally, I strongly agree with the writer’s belief that forcing companies to reveal secured information is completely unwarranted and should not be allowed under any circumstance. To begin, if the government were to force companies to reveal secured information, it would lead to further unwarranted or corrupt information gathering. There is no way for Apple to completely restrict the software so it would…

    • 1482 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Kick The Habit Essay

    • 768 Words
    • 4 Pages

    Governments around the world are failing to keep people’s privacy since they do not keep the data they have confidential, they use social networks to invade people’s privacy doing so without informing them about it, and the whole process of privacy invasion hasn’t proved to be totally efficient in most countries. For the governments demanding information for the so-called “security”, citizens as well have the right to demand security of privacy. Citizens need reassurances that the data collected by the government’s security systems is secure, confidential, and invulnerable. What is meant, is that citizens need to know where will the information gathered about them go and know who will have access to these pieces of information. “WikiLeaks”, a web portal devoted to disclosing confidential information from governments, corporations, and other large and powerful entities, is a great example that no databases is 100%…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    With the FBI being professional, Apple could develop a technique that could be shared to enhance personal security while balancing private security. If those that are serving our country isn’t allowed to fully operate, unnecessary conflict will occur which will not only affect the U.S but become a worldwide problem. Terrorist are viewed as people that have given up their rights, therefore obtaining their information shouldn’t be questioned unless the company supports…

    • 1810 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Likewise, if CleverTech does not win the lawsuit, OpenTech’s decision to use the trade secrets and make them OpenSource and available to all could put CleverTech out of the race to market. Ethically, the obligation lies with the current company you work for - not a potential competitor or inflictor. Even if it seems that no harm could be done by creating an unrelated product using CleverTech’s design, the OpenSource aspect may be detrimental to the company the decision maker pays obligations too. It should also be noted that the decision maker could also be potentially sued in the dismissal of trust established by CleverTech (Martin,…

    • 856 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    And my evidence is that only about 51% say that is should be unlocked and about 39% people say that they should not unlocked the phone. But the Apple company is like they should not give the software to the FBI but if they lose the case they will have to unlock the phone. But then the Apple company is have trouble with the FBI but the Apple company has some rules so that they will not unlock the phone. I wonder if the Apple company will still make a updated phone so that the FBI will not get in people phone any more. But I hope the FBI will leave the Apple compon alone and just find some hacker to open it.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    As people use smartphones more and more it is crucial that the smartphone keeps being safe. Important is to distinguish the ways security could be compromised. iOS jailbreaks for example, are bad for third party app developers and Apple since it enables users to download apps for free. However, in this chapter we will look for the security issues that are bad for the user, not for the companies. As there is a restriction as to how much we can cover here, we will only cover some the most important issues: permissions, lighter browsers, unofficial apps, network spoofing and data density.…

    • 787 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Should the government be allowed to force a company to unlock its secrets? Apple should not have to give the FBI access to their secrets because it opens a backdoor for hackers. These Apple vs the FBI cases are subjective realities because what we believe in alters our perception of the nature of things. The FBI says that they are fighting for safety and that if we want them to protect us we have to give up some of our rights to privacy. They want to decide how much we give and to whom we are giving it to.…

    • 2024 Words
    • 9 Pages
    Improved Essays

Related Topics