StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Pros and Cons of Knowledge Economy - Essay Example

Cite this document
Summary
The essay "Pros and Cons of Knowledge Economy" focuses on the critical analysis of the major issues in the pros and cons of knowledge economy. The search engine is a program that is designed to search databases with specific characters and keywords on the World Wide Web…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
Pros and Cons of Knowledge Economy
Read Text Preview

Extract of sample "Pros and Cons of Knowledge Economy"

Knowledge Economies Table of Contents Introduction 2 Discussion 3 Theories 3 References 11 Introduction The search engine is a program that is basically designed to search databases with specific characters and keywords on the World Wide Web (Barker, 2011, p.19). The search of information may be mix of images, web pages and other files. Around the year 2000, the search engine of Google raised its status and importance. The user-generated content is forms of content which includes chats, video, digital images, audio files, debate forums, wikis and blogs. It is believed that user-generated content is a part of small portion of a website. Moreover, the majority of content required for making a site is prepared by administrators. The user-generated content provides opportunity for website administrators to avoid occurrence of offensive language and content (Gillmor, 2008, p.12). The prime purpose of the report is to focus on case won by Safari users to sue privacy related issues on Google. Furthermore, the importance of understanding benefits of search engines and user-generated content is crucial to determine the outcome of the Safari case example. It is understood that these search engines and user-generated content introduced new ways to make knowledge economics and accumulate knowledge. This facilitation of new ways has created beneficial and problematic for Safari-Google. The advent of shift from constructing online content to individual content has revolutionized the role of passive listeners and views (Zhang, 2008, p.78). This assembling of knowledge though bypass of security settings has become problematic for Safari users. On the other hand, it benefited Google search engine to bombard adverts by tracking browsing habits Safari users. The paper judgmentally engages with the literature subject and defining key terms. Discussion The theoretical discussion of the paper is based on explaining key terms and critical engagement of theory implemented. The theory implemented is harm-based model. Theories The key terms used in the paper are search engines, user generated content and knowledge economics. The knowledge economy is the part of economy that is used by decision support structures cantered on trading, evaluating and creation of knowledge. Moreover, it is services and productions that effectively contribute towards the augmented pace of scientific and technological advancement. On the other hand, a search engine is a program and software system that is specifically developed to find specific sites requested by users through characters and keywords. The term user-generated content is used to describe different forms of content which includes images, posts, audio files, discussion forums, blogs, etc. Moreover, it is believed that user-generated content can work mixture of free software and open source to reduce their hurdles towards discovery, skill-building and collaboration. The search engine of Google is enhanced by the use of knowledge base named knowledge graph. The primary goal of knowledge graph is to use detailed and structured information to resolve any queries (Sobh, 2008, p.81). The case on Safari web browser resembles the importance of nullifying issues started by introduction of new ways. In the advent of globalization and technological advancement, the introduction of several new options to assemble knowledge can have positive and negative on businesses. The Electronic Communications Privacy Act can be implemented in the case study to protect any electronic communication for any violation. The act is believed to impose liability on person who discloses private contents and intentionally intercepts. Based on primary allegation set by Safari web browser, Google set cookies on browser settings to collect information of users. This resembles the fact that Google is reasonably connected to communications. This privacy act was enacted by congress of United States. The prime purpose of the act is to extend restrictions of government. The strength of the act is to prevent any future violation of promises by any organization. This would nullify occurrence of future privacy rights. Many researchers and analyst stated that the Electronic Communications Privacy Act does not provide necessary protection towards online communication of Americans. The factual background of the case study is dependent on internet cookies (Pogue, 2014, p.52). The cookies are generally used to track communications and activities of any individual surfing on specific website. In case of internet advertising, the cookies are used to notify store preferences of individuals. It is believed that many privacy regulators and advocates are concerned by the privacy policy of new-cross platform by Google. This can be primarily due to the track record of the company on privacy concerns. It has by Google that they would not track internet usage of Safari internet browser. The personal settlement agreement was violated by Google and placed cookies on computers of Safari users. The harm-based model is implemented to critically engage with the Safari and Google privacy violation issues. In early 2000, there have been rapid upsurge on concerns regarding the issue of increased convergence and offline data privacy dangers. The privacy approach initiated by Commission is Harm-based model. This rise of privacy concerns has increased focus on consumer harms. The model does not emphasize information of every user. The targeted practice of harm-based model is based on noticing potential treat for users by unwarranted intrusions and economic harm (FTC Staff Report, 2010, p.9). It has been notified that Google has not caused any financial harm to nay Safari users. But as per as rules and regulation, the company has violated the terms of settlement between Google and Safari. Moreover, Google has refused to state that they are unaware of occurrence tracking Apple users. Additionally, the company also stated that the matter was small and unimportant. The company breached the civil rights of consumers. The federal Trade Commission has ordered Google to pay fine 40 million US dollars. The prime benefits of harm-based model include consumer protection on spam, privacy, identity theft, unwanted telemarketing and data security. Since the year 2001, several authorities of Federal Trade Commission have brought 29 cases. These cases are all against those businesses that were unsuccessful to protect personal information of consumers. These 29 cases include several multinational corporations like Microsoft, Google, Choice Point, etc. This case involves failure to comply privacy policies of consumers and failing to protect in contradiction of common susceptibilities (Pogue, 2013, p.42). The prime benefits of harm-based model include taking reasonable steps to nullify sharing of personal data of web browser user. The authorization of third party and following privacy policies are norms and regulation that organizations need to follow under harm-based approach. The order that has been received from these cases is that Safari should implement effective security programs for comprehensive information and introduce operational programs to obtain audits of third-parties. Despite this introduction of programs based on harm-based model have some limitations. Primarily, harm-based approach focuses privacy harms that are caused by unwarranted intrusion, economic and physical injury. On the other hand, the real variety of privacy issues includes fear of people monitoring their personal information and reputation harm. Some of the users of Safari web browser may feel that share of personal information can create harm on their reputation. Furthermore, online advertising work of the Federal Trade Commission has presented the discomfort of Safari web users with the tracing of browsing details and online searchers (Lioudakis, 2014, p.12). The information leaked from social media sites of any other user related content blogs can crease the rate of concerns. Furthermore, this issue of Safari privacy concerns can also harm the reputation of Apple products. Additionally, this can reduce company sales. The consumer privacy is required to be enhanced by the emergence of business models and alteration in technology (Stauffer, 2006, p.66). This can be notified that the implementation of harm-based model can have certain benefits and limitation towards the Safari Google privacy concerns. The harm-based model can be effectively applied to the case study. This model is based on protecting further occurrence of privacy issues. The Federal Trade Commission have selected some of the importance privacy issues like Google bypassing privacy settings to create effective plan and regulation to nullify these issues. This model was selected by Federal Trade Commission to reduce increase data privacy harms. Application of the theory with Case Example The case starts after claim from a group of Safari users that security settings of Safari were bypassed by Google to set up tracking cookies. This could benefit Google to target users of Safari browser with advertising. Primarily, it would be beneficial to understand rise of Safari web browser. Apple Inc. developed Safari web browser and released on the year 2003. It is known that Apple Inc. is a multinational corporation of America that sells, develops and designs personal computers, electronics and computer software (Gritzails, 2012, p.29). The Safari is the default web browser of Apple. The rise of sales of Apple products has augmented the usage of Safari web browser. It is believed that Safari web browser has 16% of market share in United Kingdom. This resembles that rapid upsurge of users has increased the importance of security on Safari web browser. During the period of 2011 and 2012, millions of United Kingdom people that use iPads, iPods, iPhones and Apple computers provides opportunity for Google to advertise target users (Gardner, 2011, p.18). In June 2013, case was filed against Google over misuse of privacy setting. Furthermore, it is believed that United States Federal trade Commission has found out that the loophole of Safari web browser was exploited by Google to install cookies monitoring programs. The privacy alleges and activists of United Kingdom believe that this bypass of browser security settings of Apple products was to target and tract online movements of Safari users. In the year 2012, Google was fined 22.5 million US dollars by the United States Federal Trade Commission to resolve government charges. Additionally on the year 2013, more 17 million US dollars was paid by Google to settle violation of user content and data protection law (Basu, 2014, p.46). The prime example of search engine facilitating the creation of knowledge economics is research at Brown University. In the year 2011, the Institute for Computational and Experimental Research based on mathematics was introduced to address several problems related towards mathematics. Furthermore, computational tools are implemented by researchers to raise learning in mathematics. Search engines are improved by researchers to create knowledge that can effectively benefit towards the base of future economics. This resembles the fact that several institute and organizations are introducing several research strategies to enhance the use of search engines to create knowledge economics. The rise of social media sites like twitter, Facebook, etc. has revolutionized the way people connect with each other (Keenan and Shiri, 2009, p.438). The ability of people to socialize has been enhanced and emerged. This increased the use of web browsers like Safari, Google chrome, Firefox, etc. For example, Facebook is trying to reassure the sociability and redesign web environment for users to enhance user experience and create safe web environment. This resembles the fact that search engine is trying to enhance the ways of interacting with users and introducing effective approach to gather knowledge. The case example of Safari Google privacy issues claims that gathered data about social rate, ethnicity and surfing habits of web users is the act of privacy violation. The emergence of social networking sites and several user content blogs has provided opportunity for users to have full improved aces on web browsers. Sometimes users can view their social networking profile through web browsers. This occurrence of violation of privacy rights can create fear among users. The social websites provides opportunity for users to share their personal content and keep them locked. This rapid influx of knowledge through search engines and user generated content has increased the importance of privacy. The user related content such as wikis, blogs, etc. provides opportunity for amateur to show their skills and share knowledge. It is revealed the approach of User related content is implemented in the learning process of student. Some of the collaborative platforms like blogs and wikis consist of vast assembly of knowledge. This vast amount of knowledge on user generated content platforms has created opportunity for others to bypass security settings and gain access of private information. This can create problematic situation for web users (McFedries, 2009, p.22). The case of Safari Google privacy provides vivid explanation about negative impact on privacy bypass. The issue of privacy setting bypass was discovered by researcher named Jonathon Mayer. The recent mobile operating system of Apply product iOS6 have made significant amount of changes to focus on privacy of searchers. There have been changes within the search box of Safari web browser. This rise of bypass of privacy has forced Apply to update the web browser and introducing option of making third parties off. Additionally, it becomes difficulty for web browser users to trust any application for browsing. This create huge question mark on products of Apple. The knowledge economy mission of Facebook is similar to Google. In today’s world of knowledge economy, the Google search engine is regarded as one of the successful business that has become day to day part of every human being. Like that of Google, the CEO of Facebook Mark Zuckerberg has removed the knowledge economy scope to hold universal labour force. The Google search engine has created knowledge economy by constructing models for everyone to do job efficiently and use information in a better way. The company believes that building better quality of service helps to reach global customers. This makes Safari web browser user to visit Google search engine sites and search desired websites. This global collection of knowledge has raised privacy concerns (Mesko, 2013, p.38). The huge collection of knowledge economics on search engines and user generated content platforms can become more problematic for users. Social media sites have created opportunity for users to keep pictures and personal information private. The occurrence of privacy bypass like Google on Safari web browsers can have severe negative impact towards the welfare of consumers. Furthermore, it is believed that it can risk share of personal identity and sensitive information. Conclusion This can be concluded that search engine and user generated content can have negative and positive impact towards the Safari-Google privacy concerns. The new ways of creating knowledge economics and collecting knowledge has been prime cause of misuse of privacy settings by Google. It is believed that financial and health information of web users is sensitive and can have severe impact towards mental condition. The information that is shared within the knowledge of users can hurt the expectation of users. The group of Safari web browser user claimed that Google have bypassed security settings. This process of bypass is done by installation of tracking cookies. This created havoc among safari users. This raise of privacy concerns has forced the Federal Trade Commission to put fine on Google. It is vital for multinational corporations like Apple to promote privacy of consumers at every level of development of services and products. In modern browsers, the browsing models are required to be analyzed to achieve desired goals of privacy. The severe violation of private information can affect the mentality of users. Furthermore, it is revealed that judicial notice of Google to dismiss the tagline of main culprit has been rejected by the court. Additionally, the Google has paid over 40 million of US dollars to the Federal Trade Commission of United States. These search engines and user related platforms have provided opportunity for searchers to gain knowledge and implement it in a better way. References Barker, D., 2011. Internet Research Illustrated. New York: Springer. Basu, P., 2014. Google Services. London: Kogan Page. FTC Staff Report, 2010. Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers. London: DIANE Publishing. Gardner, L., 2011. Head first mobile web. New York: Springer. Gilmor, D., 2008. We the Media. London: Routledge. Gritzails, D., 2012. Information security and privacy research. New Jersey: Pearson. Keenan, A., and Shiri, A., 2009. Sociability and Social interaction on Social Networking websites. Emerald Group publishing, 58(6), p.438. Lioudakis, G., 2014. Data privacy management. London: Sage. McFedries, P., 2009. Microsoft Windows case study. New Jersey: Pearson. Mesko, B., 2013. Social Media in Business Practice. New York: Springer. Pogue, D., 2013. OS X Mavericks. London: Routledge. Pogue, D., 2014. Switching the Mac. London: Sage. Sobh, T., 2008. Advances in computer and information. London: Sage. Stauffer, T., 2006. Mastering Mac OS X. New York: McGraw-Hill. Zhang, W., 2008. International Trade theory. Stamford: Cengage Learning. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Harm-Based Model Essay Example | Topics and Well Written Essays - 2500 words”, n.d.)
Retrieved from https://studentshare.org/e-commerce/1686624-user-generated-content-and-search-engines-have-facilitated-new-ways-to-assemble-knowledge-and-create-knowledge-economies-examine-why-this-is-problematic-or-beneficial-through-a-case-example
(Harm-Based Model Essay Example | Topics and Well Written Essays - 2500 Words)
https://studentshare.org/e-commerce/1686624-user-generated-content-and-search-engines-have-facilitated-new-ways-to-assemble-knowledge-and-create-knowledge-economies-examine-why-this-is-problematic-or-beneficial-through-a-case-example.
“Harm-Based Model Essay Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.org/e-commerce/1686624-user-generated-content-and-search-engines-have-facilitated-new-ways-to-assemble-knowledge-and-create-knowledge-economies-examine-why-this-is-problematic-or-beneficial-through-a-case-example.
  • Cited: 0 times

CHECK THESE SAMPLES OF Pros and Cons of Knowledge Economy

Peoples Willingness to Buy Hybrid Cars - Pros and Cons

The paper "People's Willingness to Buy Hybrid Cars - Pros and Cons" studies the pros and cons of hybrid cars, intrinsic and extrinsic motives that drive the buying pattern of these cars, and the efforts of government and environmental organizations in promoting the purchase of hybrid cars....
50 Pages (12500 words) Dissertation

Pros and cons of the different learning methods

In the paper 'pros and cons of the different learning methods' the author analyzes several methods in learning social science.... Supplementary MaterialsThe usage of chart to compare and contrast the pros and cons of integrated social studies learning,... Each method has its own pros and cons and this can be better illustrated through comparing and contrasting it through a visual aid.... Transfer of knowledge is typically done on a lecture where a student can ask a question and the teacher answering the same....
4 Pages (1000 words) Essay

The Pros and Cons of In-House Versus Outsourced R&D Activity for Technology Firms

Though outsourcing has become quite popular among companies over the years there are still some organizations that prefer to keep all their activities in-house, and both (that is, outsourcing and in-house) have pros and cons that a company needs to look at before determining which is one would best suit their company (Krugman, 2006).... R & D refers to Research and Development, and it can be described as the process of discovering new information and knowledge about a topic with the aim of creating a new product or improving the current one on the market (Parry & Roehrich, 2009)....
5 Pages (1250 words) Essay

The Pros and Cons of Globalization

This paper 'The pros and cons of Globalization" focuses on the fact that globalization is a complex term to define because it includes so many things in a single word.... The list of the pros and cons of globalization includes various benefits and disadvantages of globalization.... Present a Concise, Articulate, and Supported Argument of a Pro and Con of Globalization Arguing in favour or against globalization is not free from political connotations because the very process is complicated enough to decide what are its pros and cons, as pros considered by some are observed as cons by others....
7 Pages (1750 words) Essay

Research Paper for College Course -- Introduction to Microeconomics

The purpose of this paper is to describe the pros and cons of free trade.... The industrial revolution that occurred in the 19th century created a new world in which nations were capable of producing more goods than were needed for local consumption.... The excess goods that production factories generated were sold in the open market through trade....
4 Pages (1000 words) Research Paper

Pros and Cons of Abortion

This paper ''pros and cons of Abortion'' tells us that abortion, as the name suggests, means abort of finish, miscarriage.... bortion- pros ... An act of instantaneous slaughter of a human before the baby is born.... For the past two decades, the issue has been debated regarding ethical and moral concerns....
6 Pages (1500 words) Research Paper

The Pros and Cons of Outsourcing

The paper 'The pros and cons of Outsourcing' seeks to answer the question of whether outsourcing is beneficial for business or not.... Outsourcing is a potentially debatable subject because of the range of its pros as well as cons for the company hiring the services of the outsourcers....
4 Pages (1000 words) Research Paper

Pros and Con of industrial revolution

The revolution led to the realization of knowledge gaps and ways in which European countries could explore their full potential.... The revolution led to the realization of knowledge gaps and ways in which European countries could explore their full potential.... In addition, it led to the emergence of new social ills, which have been pros and Con of Industrial Revolution The Industrial revolution is the foundation of every economic, political, and social aspect of the modern times....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us