Sample Technology Paper on Mass media: The Ending of Privacy

Mass media: The Ending of Privacy

Introduction

The evolution of technology is increasing, similar to how individual info is saved, notwithstanding if it’s individual health data, financial reports, as well as additional individual info reserved on the cloud-based podium. Digital safety worries are faced by dissimilar individuals and establishments worldwide due to the internet. The internet exposes people to the issues of confidential info. The matters backing the culmination of confidentiality comprise cloud computing data breaches and cyber-attack (Rittenhouse & Ransome, 2017). Technological transformations that have been witnessed in the mainstream media in recent years have led to the integration of social media into the operations of reputable media companies to reach out to increased audiences. The smartphone revolution and access to the internet are some of the issues highlighted regarding the personal privacy obligations of Americans.

 

Researchers’ opinions regarding the end of Individual confidentiality

            Due to internet growth, personal privacy is dropping at a high percentage caused by information breaches. As a result, individual information linking security risks have greatly increased. Given as an example, “the studies have indicated that 68% of data breaches occur when the devices are lost or stolen” (Lewis, 2014). Consequently, “avoiding the risk is a better option as it will help in ensuring that the company’s information is protected and the organization does not face any vulnerability in fraudulent attacks.” As a result, establishments ought to implement blockchain technical expertise to guarantee that administrations’ gadgets are extremely safe. Where conceivable, workers must not be permitted to leave the office with work gadgets. The establishment must establish guidelines that outline workers not to use office gadgets outside of work. These policies ought to forbid the usage of office gadgets for individual drives.

Moreover, position blockchain tech to each office gadget to safeguard the company’s client information. Additionally, the institute ought to carry out a cost-benefit examination about this situation to recognize the probable method through which office gadgets can work outside. If office gadgets are outside the workplace, paybacks overshadow the costs; thus, the business had better implement blockchain to safeguard the gadgets. If the budgets overshadow paybacks, the business must not permit office equipment to work outside. For that reason, to employ the workplace gadgets outside, the establishment must initially perceive the dangers of losing information and cyber-attacks.

Social media is an illustration of a confidentiality concern. For instance, “Facebook offers a range of privacy options to its members. A member can make all his communications visible to everyone, block specific connections or keep all his communications private. Members can choose whether or not to be searchable, decide which parts of their profile are public, decide what not to put in their news feed, and determine who can see their posts (Krutz,2010). There is a message feature for members who wish to use Facebook to communicate privately, closely resembling email”. Twitter is a micro blook plus a social system that permits people to fit in a spot to answer queries concerning what they are doing by handing out short messages identified as tweets to friends or followers, which comprises approximately a hundred and forty characters. The tweet’s temporary arrangement is a significant distinction of the service that ensures fast sharing of information and informal collaboration, which relieves both IM and email fatigue.

Nevertheless, Twitter is a method of communication that does not restrict information sharing. One can share information with persons that you would never exchange IM messages or emails, which leads to the opening up of one’s contacts to the community and can enhance a person’s continuous growth. To begin with, the procedure of classifying, computing, and highlighting threats crafts Twitter as real and vital for use by managers and employees who may not even have thought of how risk management is essential in an organization. Second, a methodology to threat managing hijacks the whole notion past the normal limits of whatever is insured. It dramatically enlarges the firm’s threat description to comprise everything that endangers the administration’s endurance. This method similarly splits the perception of threat into the dangers that may aid a firm to develop and the ones that might only result in losses. Once a corporate choose an all-inclusive tactic to threat managing, it is habitually regarded as favourable by stockholders (Sotto, Treacy & McLellan (2010) with Facebook. This social networking site’s risk and vulnerabilities present a significant problem to the employer because third parties share your uploaded information. Not to mention, malware is attached to ads and the associated ‘Facebook friends’ of the account, presenting even more vulnerabilities. “Privacy and security are major concerns for many users of social media. When users share information such as data and photos with friends, they can make their friends vulnerable to security and privacy breaches with dire consequences.”

 

Who is Invading our Privacy?

Government, Big Corporations, other people, and we have contributed to the issue of invasion due to information society’s growth. The information society is a society that significantly values

information sharing, usage, creation, distribution, manipulation, and integration (Salvaggio, 2013). The information society’s main drivers are communication and information technologies, which have influenced social organization changes in different societal sectors, such as education, economy, health, government. Regular computer users are considered individuals that partake in this form of society. Information societies have become part of human life activities. With the increased use of information societies, there are increased social problems associated with it, including invasion of privacy: this is a significant issue in the information society. Everyone who uses a computer, whether in business or personal, faces a risk of invasion of privacy from different individuals, including hackers. For example, hackers who have hacked personal data and published it without their approval have targeted organisational data. Another example is when one intrudes into personal affairs through computers and discloses their private information. Also, Information inequity: – access to information is fundamental freedom; however, information inequality is a global issue that comes in different forms. Information control and misuse of information: this is a significant issue in information societies. For example, Larger Corporation, such as Facebook, Twitter, Google Inc., has detailed personal information, and sometimes they tend to misuse confidential information by selling data to a marketing agency. Therefore, the misappropriation of information in society and the current world is a significant concern; however, laws are enacted to offer full protection to individuals from misuse (Salvaggio, 2013).

 

Internet Things have the power to Erode Our Privacy.

Nowadays, we have connected all personal information to our phones, which presents a dangerous future trend. Technology progression has upgraded even the means of communication as humans. Mobile phones are among the technical gadgets that have altered people’s ways of existence. Visualize running through the day with no phone; I am sure it would feel imperfect. The present epidemic, which has troubled the globe, has exemplified the significance of cell phones. Cell phones have fashioned lives easily and conveniently. We may use cell phones for practically everything. The phones are not only used to make calls, but then our lives spin around them (Weber,2010). We dispatch recorded voices, emails, and messages. We also link to social media sites, record films, and click pictures through cell phones. We now withdraw and send money, shop, and carry out all kinds of trades using phones. Therefore, if technology is developed to wipe out gadgets, we will be in big trouble. Privacy is the right given to an individual to have all powers over his personal information. Thus, privacy rights are being threatened. For example, take a look at healthcare personal data and information. The growth of technology and benefits associated with it; have led the health sector to record patient information electronically (Francis,2019). Thus, by promoting electronic health records, the doctors and medical practitioners record the patients’ information using laptops. Thus, electronic health records have improved patients’ (He, Chan & uizani, M. (2015) services provision among the providers and easy retrieval of health info.

 

Conclusion

Because of the safety concerns and confidentiality, the organization and individuals should implement measures that help in protecting and preventing privacy issues. For instance, for the organization’s internal privacy and data security policies: the organization should ensure that it has a particular way of collecting and safeguarding its customers’ and employees’ data. Therefore, policies help in designating personnel who have access to confidential information. Social media policies also help guide employees on how to use their social media on an issue relating to work. Furthermore, an organization should have robust protection from the service providers. Thus, the organization should ensure confidentiality clauses and nondisclosure agreements are made with the service provider. Data security is a problem in information technology strategic management, which is not solved. IT strategic management implies that the organization will adopt the use of technology in keeping data that is collected. Data security is a significant problem in information technology due to cybersecurity concerns of the system. There will be cases of data misuse resulting from an unauthorized person accessing the data that connects organizations to its consumer.

 

References

Francis, M. The Importance of Application Security: A Few of the Benefits and Risks (2019).

Retrieved from https://www.veracode.com/blog/intro-appsec/importance-applicationsecurity-few-benefits-and-risks

Salvaggio, J. L. Social problems of information societies: The US and Japanese

experiences. Telecommunications Policy,  (2013). 7(3), 228-242.

Weber, R. H. Internet of Things–New security and privacy challenges. Computer law &

security review, (2010).26(1), 23-30.

Krutz, R. L., & Vines, R. D. Cloud security: A comprehensive guide to secure cloud

computing. Wiley Publishing (2010).

Sotto, L. J., Treacy, B. C., & McLellan, M. L. Privacy and Data Security Risks in Cloud

Computing. World Communications Regulation Report, (2010) 5(2), 38.

He, D., Chan, S., & Guizani, M. Mobile application security: malware threats and

defences. IEEE Wireless Communications, (2015).22(1),

Lewis, T. critical infrastructure protection in homeland security: defending a

networked nation. John Wiley & Sons. (2014).

Maruti Techlabs. Challenges in Mobile App Security (2019). Retrieved from

https://www.marutitech.com/mobile-app-security/

Rittinghouse, J. W., & Ransome, J. F. Cloud computing: implementation, management,

and security. CRC press (2017).