private information you shared through the internet was accessible. What would you do if privacy disappeared? Well it has. We are currently living in a world that’s more connected than ever before. Information is just a few clicks or taps on a screen away. But this connection has allowed corporations all over the world to control us by seeing exactly when, where and what we are doing. In a few years, the term privacy won't be a fundamental right, but a luxury few of us will have. This is all…
computers have been hacked into, and the user has been completely unaware of the illegal activity happening at the time. What methods are being used to get this information? Well it’s quite easy actually. Here are just a few threats that put our internet privacy at risk: Cookie proliferation: The invisible cookie software agents that track your browsing habits and personal data are likely to multiply in 2013. Advertising networks, marketers, and other data profiteers depend on cookies to learn…
In the United States the government collects data from everyone either from their social medias accounts or their browsing history. These large corporations cooperate with the government in order to collect data and store it for them, in which the NSA looks for suspicious behavior that may involve terrorism. Although the USA PATRIOT Act, a sweeping law that allows the gov’t to collect data and wiretap subjects, was created after the 9/11 attacks, all citizens weren’t aware of it for many years…
As the world increases its dependence on technology, it is inevitable that this technology is brought into voting machines. Electronic voting machines are a relatively new invention which allow voters to vote via a computer rather than a ballot sheet. Some people are uncomfortable with electronic voting machines either because of fear that they can be hacked or because of lack of electronic literacy; however, electronic voting machines should be used because of their easier and more secure vote…
Home Depot appropriately handled its data breach crisis through the company’s quick acting with an initial statement to the general public and through crisis management emails sent to its customers. In Home Depot’s initial statement spokeswoman Paula Drake reassured their customers that the company had been actively working with forensics and security teams since they had become aware of a potential breach (Li, 2014). According to W. Timothy Coombs, Ph.D. in his research paper Crisis Management…
On December 2, 2015, 14 people lost their lives and 22 people were injured when a terrorist attack occurred in San Bernardino. Both shooters were killed on the scene during a police shootout. However, one of the shooter’s iPhone was found on the scene of the crime. Up until now, the FBI has been working closely with Apple to help gain information from the iPhone that was needed to help insure national security. However, recently the FBI wanted Apple to create a new form of IOS, Apple’s…
access to surveillance systems that can monitor our phone calls, text messages, emails and etc if needed. I agree that the government should have this right, but I believe there must be some strict guidelines placed in order to ensure the personal privacy of citizens. While discussing this topic, it may seem scary to think as a citizen, that everything in our personal lives isn’t as private as we imagined it to be. But, the questions we all seem to ask ourselves about this issue is, “Why is…
FBI wanted 100% access to people's phones so they could find out what American citizens were doing on their cellular devices 24/7. However, Apple refused to help the FBI with open access to other phones because American Citizens have the right to privacy of their own belongings by law, above all Apple refusing the FBI was a good choice. In addition, Apple kept refusing the FBI, but the FBI found another way to get into the iphones. “Government said that it had found a third-party that was able…
While social media has affected the society in many ways, it has mainly spread the negativity among people by invading their privacy in terms of collecting data, tracking them, and selling it to the third parties to make profit out of it. Working Bibliography Kubis, Kathleen E. "Google Books: Page by Page, Click by Click, Users Are Reading Away Privacy Rights." Vanderbilt Journal of Entertainment and Technology Law, vol. 13, 01 Oct. 2010, p. 217. Ebscohost,…
Data brokers or information brokers are someone or a company that collects data on a consumer information around the world and selling it to whoever will pay. Privacy Rights Clearinghouse writes that data brokers are “companies that collect and aggregate consumer information from a wide range of sources to create detailed profiles of individuals. These companies then sell or share your personal information with…