StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Privacy and surveillance in the Information Age - Essay Example

Cite this document
Summary
While technology has been there since prehistoric times, today the term technology is used to refer to ICT. Communication technology has also a long history beginning with inscriptions on the walls of caves to the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Privacy and surveillance in the Information Age
Read Text Preview

Extract of sample "Privacy and surveillance in the Information Age"

Download file to see previous pages

According to Nissenbaum (1998, p.4), information technology has not only affected communication, but has actually led to a need to redefine privacy. With increasing surveillance and information recording, personal privacy is taking a new direction. According to Nock (1993) the cost of surveillance is personal privacy and the American public has to trade between privacy and security. The biggest turn in information technology came at about the mid of 20th century with the invention of the electronic computer.

As soon as the computer was invented, it was used by governments and large corporations for information capture, storage and analysis. Information technology did not only help in increasing the way information is captured and stored, but also in the way the same information can be analyzed as well as manipulated (Hughes, 2004, p.78). As a result, the role of the government and private corporations can in safeguarding information has increased and has also taken a new course. Information stored in computes is easier to disseminate and can be accessed from remote access points.

This leads to the risk of losing this information to hackers and this can lead to private information being disseminated by unauthorized personnel. Information and communication technology has changed the way people communicate and carry out their daily social, political and economic activities. With the arrival of computers and the internet, communication has always increased, and people are today better able to communicate. Business transactions have taken a new route as private firms can now easily capture, analyze and disseminate different formats of communication and information.

A good example of this is the US based international retail giant Wal-Mart. Wal-Mart has been able to develop a system based in computers and wide area network that is able to capture information from all the retail stores and then sending this information to a central database where the

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Privacy and surveillance in the Information Age Essay”, n.d.)
Retrieved from https://studentshare.org/management/1613850-privacy-and-surveillance-in-the-information-age
(Privacy and Surveillance in the Information Age Essay)
https://studentshare.org/management/1613850-privacy-and-surveillance-in-the-information-age.
“Privacy and Surveillance in the Information Age Essay”, n.d. https://studentshare.org/management/1613850-privacy-and-surveillance-in-the-information-age.
  • Cited: 0 times

CHECK THESE SAMPLES OF Privacy and surveillance in the Information Age

Image Recognition and Surveillance

In the golden age, there have been a number of groups responsible in causing chaos in various… Every day, the world is often awakening by threats or attempts of terror attacks by these groups.... Hope of fighting these groups is through having prior knowledge of Ever since the September 11th bombing of the United States, several surveillance units were created to help in fighting terrorism both internally and externally.... It has come to our knowledge that various surveillance systems have been installed in the country's entry and exit points to help in monitoring and identifying such suspects (Winston, 2013)....
4 Pages (1000 words) Term Paper

The Modern Surveillance Tactic

They are web-founded podiums that incorporate diverse media, communication and information technologies, which permit at least the creation of profiles that show information defines the clients, the indication of… Social surveillance involves the use of the web 2.... This information is publicized to be seen, and as such, individuals can look carefully.... People display their information digitally with an audience in mind, often altering social media content to specific individuals (Galloway and Thacker 8)....
6 Pages (1500 words) Essay

Critique of Obesity Assemblages and Surveillance in Schools by Emma Rich

The paper "Critique of Obesity Assemblages and surveillance in Schools by Emma Rich" highlights that Emma believes that the complex flow of information about the body parameters and the pedagogical and individual practices resulting thereupon enforce functions on children's bodies.... Citing the growing propensity of surveillance practices, which became available only recently due to the spurt in IT-based technological tools', and which Emma believes are being used rather overzealously, the author has criticized the manner in which the data is collected and manipulated by a multitude of government as well as other agencies to make hypothetical suggestions for improvement....
9 Pages (2250 words) Book Report/Review

The Privacy and Surveillance in Relation to the Internet

For this reason, privacy violations and unauthorized surveillance continue to expand globally.... The radical increase of privacy violations for Internet users worldwide has led authorities to concerns regarding the effectiveness of existing legislation regarding Internet use.... Gaps have been identified both as the prevention of privacy violations and the punishment of these activities.... Internet users have positively contributed to the expansion of privacy violations since they seem to refuse to follow Internet use terms, as clearly highlighted by Internet providers in all countries....
5 Pages (1250 words) Case Study

Privacy and Surveillance

The paper "privacy and surveillance" states that in general, online privacy is an issue that must be taken seriously.... In light of this, I am going to evaluate and analyze privacy and surveillance.... Physical address and a person's age can be used to point out a person without the disclosure of the person's name since these main elements are unique to each and every person to primarily identify an individual.... Whereas people and consumers, in general, want to share as little information as possible, websites and the government want to know as much information as possible about you....
6 Pages (1500 words) Essay

Privacy under Electronic Surveillance

Based on the information collected, the employer can make various decisions such as to warn the employees and reward the most productive ones.... Furthermore, when an employee files a lawsuit claiming unfair dismissal, the organization can defend itself by submitting surveillance information that acts as evidence for dismissing the subject employee.... The paper "Privacy under Electronic surveillance" highlights that various privacy concerns have emerged as a result of the implementation of electronic surveillance....
5 Pages (1250 words) Essay

Technology and Nature of Surveillance

This paper examines the meaning of surveillance in the information age and seeks to establish who the spies are, and their targets, as well as the impact of surveillance on both privacy and security.... surveillance in the information age Technology has had a revolutionary effect on surveillance.... The paper "Technology and Nature of Surveillance" is focused on surveillance as the collection and processing of personal data, which can be either, personally identifiable or not, with a view to managing or exerting influence on the people whose data or information has been gathered....
6 Pages (1500 words) Essay

The Nature of Surveillance within the Context of Big Data Collection and Privacy Versus Security

In the same light, the internet has been a valuable surveillance tool in the information age.... Nature of Surveillance in information age The individuals who conduct surveillance either for protective or nefarious security reasons have often utilized the available technology to assist them in their efforts of enhancing security (Velastin & Remagnino, 2006).... Recently, there have been technological advancements that have allowed businesses and institutions to mount simple CCTV cameras which will offer surveillance in and around those premises (Cieszynski, 2007)....
6 Pages (1500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us