Technological Development Threat to Privacy

Free essays 0 Comments

TechnologicalDevelopment Threat to Privacy

TechnologicalDevelopment Threat to Privacy

Thetechnological era is characterized by sharing information acrosssocial networks of organizations. The development of technologyfacilitates the process of information sharing due to the advancementof the communication equipment. Workers in most organization have atleast acquired knowledge of information and technology. Due to theknowledge acquisition, they can communicate ideas and reach outdifferent customers. Information and technology make the world moreopen hence enabling people from remote locations exchange ideasquickly. The sense of communication makes the world become a globalvillage (Akrivopoulou &amp Psygkas, 2011). However, the developmentof information and technology processes are characterized byproblems. The shift in the technological advancement has contributedto the violation of freedom of people and organizations. The right toprivacy of individuals and a group is under threat. This is becauseof the free flow of information from people to the organizations.Protecting the economic interests of other people is a contributionfactor to the violation of the right to privacy. The individualswith high intellectual property have taken advantage of the shift inthe sector of information technology. Privacy concerns are affectedby the development of information and technology. Since peopledemand protection of their privacies, the information, andtechnological device, comments counter the desires of most citizensand consumers. As such, the analysis offers an explanation on theimplications of technology on people’s privacy.

Breechingpersonal information

Technologyis used to gather information and store as well as retrieval of thesame information. Information collected at a workplace of anindividual is likely to be manipulated by the technological expertsfor their personal gains. The implication of using technology inprocessing information is that the information can be use to accessan individual’s private information. In this relation, the privacyof a person is violated. In an organizational setup, workers arelikely to be denied confidential information that is necessary tothem by a configuration of passwords. Manipulation of informationprovided by employees at an organization can be done by mergingdocuments (Akrivopoulou &amp Psygkas, 2011). In this relation, theadvancement of technological knowledge becomes a disadvantage to theworkers in an organization. Ethically, the use of information andtechnology becomes a problem in accessing the privacy of anindividual worker. The meant purpose of using the expertise knowledgeis corrupt for private gains. People feel compelled to provide theirinformation in exchange for services.

Useof electronic means to keep surveillance on employees in anorganization violates the privacy of the workers. Integration of thecontrol systems in a workplace are the aspects of electronic means ofkeeping watch on employees. Most organizations argue that they usethe surveillance systems to increase their productivity. However, theproductivity of the organization is not improved by the electronicmonitoring systems. Workers themselves are the key participants in agroup, hence, would be considered the people responsible forincreased production (Franceschetti, 2011). There are privacyconcerns with the use of the electronic surveillance in that theworkers are not able to perform without supervision. Workers have inmind that they have to do their job right because they are beingwatched. Workers are forced to work in the conditions of beingwatched because they want to earn and maintain their families. Thesense of an individual working without being supervised has lost itsrelevance in most organization. They are also deprived off theirprivacy of the fact that the electronic surveillance systems displaytheir weaknesses to their employers at all time of work.

Privacyis determined by the ability of particular information being relayedto a specified individual. In a regulatory environment, emails sentto individual workers are synchronized to the administrative system.In this regard, the ethical problem is generated by the accessibilityof private information of an employee. Firms use technology processesto intercept or tap emails of employees in the workplace, whichaffect people’s privacy negatively (Albashrawi &amp Motiwalla,2015). In this case, the privacy concern is violated by theorganization. The organizational management uses the technical teamsto review their employee’s messages before they receive them. Filtering of individual messages to employees is manageable in anorganization with technological experts. Privacy of an employee isbreached in the sense that they are not able to send emails to theirrelations without being assessed by the organization (Franceschetti,2011). This is enabled by the fact that an employee is required toprovide necessary information including their email address to thegroup in exchange for a job. Provision of the information facilitatesthe ability of a technological expert to intercept and manipulateindividual email. The fact that groups perceive technicalinfrastructure as a facility owned by the group makes it justifiedfor them to review an individual’s email. Organizations also checkon their workers emails to see if they are utilizing the facility toenhance production in the group.

Creditand debit cards violation of privacy

Technologicaladvancement has enabled the use of cards for making purchases instores. Commonly used cards have a chip in them, which containsinformation about the bearer. The chip also contains records of everypurchase raised by the customer. In this regard, the consumers arenot safe from the management of the retail store. The administrationof a retail store might decide to use the history of an individual’spurchase list to determine the economic development (Franceschetti,2011). This becomes a threat to the privacy of the consumer becausethey are not involved in the process of acquiring information aboutthem. The organizations can use the information to the chip toanalyze their market trends as well as the economy. The security ofan individual is guaranteed since the consumer has presented theirinformation to the management of a retail store in exchange for acard. Consumers do not conflict the idea due to theirmisinformation.

Inadvanced societies, technology enables individual develop criminalintentions toward organizations. In this regard, a person withadvanced knowledge of the information and technology might desire tohack a computer system. Criminal intentions to rob financial systemsof organizations have led to the hacking of information systems inorganizations for personal gains. When an information and technologysystem of an organization is hacked, the hacker has an advantage ofaccessing the intended activity as well as accessing informationabout key participants (Albashrawi &amp Motiwalla, 2015). Thedevelopment of the criminal intention on an individual hence makes sprivacy of the innocent people threatened. Accessibility offinancial commitment of the consumers and the key participants in theorganization are provided to the hacker. This practice poses a gravethreat to the freedom of both organization and the people whoseinformation has been accessed.

Thegradual development of the information and technology sector ischaracterized by the development of new ideas. In this regard,software is developed to create an effective working environment forthe organization as well as the consumers. Advanced software that canbe used to decode digital information is a threat to the privacy ofusers (Albashrawi &amp Motiwalla, 2015). Most organizationsintegrate software in the databases to enable them to access moreinformation about their clients. Information access can be privateinformation hence making the privacy of a common citizen become knownto an organization. In some cases, the government investigativebodies integrate the use of complicated software to hack into privateaccounts. This is argued to be helpful in combating criminal casesthat might be aided by a citizen. Consumers do not act against thepractice due to lack of knowledge in advanced technology(International Franceschetti, 2011). Insofar as the software is usedto access people’s accounts for verification of claims, the factare that the information being analyzed without an individual’sconst is a violation of their privacy.

Mergingof people’s data in central databases

Databanking is prevalent in the most organization that has advanced intechnological knowledge. Most organizations depend on a centraldatabase. For this reason, the group combines the privateinformation of its employees from various databases into one majordatabase. In most occasions, the employees are not always informedabout the process of merging their information. The group keeps theiremployees from being informed about the reason for the action. Thebreach of information becomes a critical issue to the privacy of aworker. The organization does not keep the employee are about thebenefit of merging their personal information in and a shareddatabase (Hossain &amp Dwivedi, 2014). Furthermore, the managementof an organization plays a significant role in the activities ofcombining employee information. In this regard, the management doesnot keep their employee updated to the existing information. Thismakes the management also unaware if the presented information in thedatabase is correct. In this regard, the management does notexperience resistance due to the employee lack of awareness.

Technologicaladvancement enables accessibility of information about peopleregardless of their consent. In this relation, the accounts held bydifferent people are easily accessed hence contributing to a loss ofdignity. Technology is expected to be helpful to the people but inreal the sense it gradually becomes a constant threat to the privacyof individuals. This is not worrying the consumer due to theoverdependence on technology

Thegovernment uses a technological platform to effect its administrationto the citizens. The provision that a government need to know everyindividual citizen in a state makes is possible for the government toaccess every person’s information. The allocation of an individualmay be traced to the government without their consent (Hossain &ampDwivedi, 2014). In this relation, the government with the help oftechnology is able to access a person’s information. Insofar as thetechnological advancement is use to ensure the people are safe, thegovernment can take advantage of the situation. People do notconflict the use of their information by the government because theyfeel the government uses it to protect them. Information provided bythe government such as the identification number of an individual andthe place they are from enables the government to access theinformation.

Technologyis used to offer the variety of services to its users. Regarding theexplosion in the number of users due to the knowledge of informationand technology, internet connected devices have been linked to manymalicious intentions. There are malware on the Internet, which isused by people to deprive the community its moral foundation (Hossain&amp Dwivedi, 2014). People have developed new ways of exposing theimmoral activities through internet. In this regard, an individualcan decide to use another person’s picture to communicate asocially unacceptable behavior. Violation of the privacies ofindividuals is shown when the hackers use an innocent person’simage to show immoral activity to the world. Insufficienttechnological skills deny people the opportunity to argue and reportcases of rights violation through internet. Due to this development,people are not immune to the risk of getting the pictures used toconvey incorrect information.

Privacyof an individual faces a threat to technological advancement in thatthe private information of people is disclosed to the public. In somecondition, the presented data about an individual might e sensitive,such as their medical history. The overexploitation of informationand technology leads to the accessibility of the information throughthe photos and videos found on people’s phones and applications(Hossain &amp Dwivedi, 2014). In this regard, the information andtechnology evolution becomes a source of threat to the privacy of anindividual.

Regardingthe attacks on personal information of an individual, theunauthorized access to information is regarded to be a violation ofthe person’s privacy. The use of fingerprints in the databasesbecomes a channel to accessibility of people’s stocks. As aresult, the configurations available on the web and differentbrowsers make it difficult for people to make their informationprivate. Accessibility of a person’s information in the entrypromotes the device, moment of criminal cases they become the targetfor offenders.

Thereis need for a detailed analysis of the threats to the privacy ofindividuals. Privacy violations s a threat to future internet usersas it would become more complicated if not combated. Interactionmechanisms need to be improved to enable protection of the privaciesof individuals. Individuals have the right to protection. Hence,their privacy entails the protection needed.

References

Akrivopoulou,C., &amp Psygkas, A. (2011).&nbspPersonaldata privacy and protection in a surveillance era: Technologies andpractices.Hershey, PA: Information Science Reference.

Albashrawi,M., &amp Motiwalla, L. (2015). The Moderating Effect of Privacy andPersonalization in Mobile Banking: A Structural Equation ModelingAnalysis.

Franceschetti,G. (2011).&nbspHomelandsecurity threats, countermeasures, and privacy issues.Boston, Mass.[u.a.: Artech House.

Hossain,M. A., &amp Dwivedi, Y. K. (2014). What improves citizens’ privacyperceptions toward RFID technology? A cross-country investigationusing mixed method approach. InternationalJournal of Information Management,34(6),711-719.