Digital Privacy in an Information Technology Age Essay

Total Length: 870 words ( 3 double-spaced pages)

Total Sources: 2

Page 1 of 3

Digital Privacy in an Information Technology Age

Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy and its impacts (Belanger & Crossler, 2011). There are many definitions for information privacy, but there is little variance in the elements of the definitions, which typically include some form of control over the potential secondary uses of one's personal information. Secondary use refers to the practice of using data for purposes other than those for which they were originally collected. Digital privacy has been a concern since the Internet became such a popular means of communication. The abundance of computers and smart phones, the proliferation of communication, and the explosion of digital information has precipitated people's disclosure of very personal information online, thus creating concerns with three types of technology that invades the privacy of citizens: Google (Internet), Carnivore, and Surveillance.

Types of Technology Invasion

Google (Internet)

A skilled user might be able to locate a great deal of information about a person through Facebook, MySpace, blogs, news articles, or any resumes that exist on the Internet. Companies, the government, and others can use tracking cookies and other widely available software to observe a user's shopping habits and visited websites. These tools also permit third parties to obtain unique identifying information such as a user's IP address, which is a unique number assigned to a computer or router when it accesses the Internet.

Stuck Writing Your "Digital Privacy in an Information Technology Age" Essay?

Every click of the mouse, site visited, and page read creates a trail of digital cookie crumbs that can be analyzed and exploited by merchants, webmasters, and the government. In addition, all of this information presents a potential goldmine for law enforcement agencies to use in investigating crimes.

Carnivore

To address the changing times, the Federal Bureau of Investigation (FBI) developed "Carnivore," digital monitoring software that allows FBI officers to monitor suspects ' online communications (Kerr, 2003). The FBI "taps" into Internet Service Providers (ISPs) using Carnivore. The software then scans huge volumes of communications for those fitting the search criteria flagging and storing any messages meet those criteria. Carnivore thus allows the monitoring of vast amounts of personal information without a dramatic increase in marginal costs.

Surveillance

Within weeks of September 11th, Congress passed the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act more often known by its intentional acronym, USA PATRIOT Act, or just as the Patriot Act (Kerr, 2003). With very little congressional debate, the Patriot Act sped through Congress hastily in response to the perceived….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Digital Privacy In An Information Technology Age" (2012, November 09) Retrieved May 15, 2024, from
https://www.aceyourpaper.com/essays/digital-privacy-information-technology-age-83028

Latest MLA Format (8th edition)

Copy Reference
"Digital Privacy In An Information Technology Age" 09 November 2012. Web.15 May. 2024. <
https://www.aceyourpaper.com/essays/digital-privacy-information-technology-age-83028>

Latest Chicago Format (16th edition)

Copy Reference
"Digital Privacy In An Information Technology Age", 09 November 2012, Accessed.15 May. 2024,
https://www.aceyourpaper.com/essays/digital-privacy-information-technology-age-83028