This website uses cookies to ensure you have the best experience. Learn more

Privacy Concerns In Information Computer Technology

1108 words - 5 pages

Information Computer Technology has already played an important role in people’s daily lives. It is widely used in information gathering, communication and mutual operation. Modern people have been benefited from more efficient information flow, less cost and faster communication. However, every coin has both sides. ICT also has brought people’s lives some concerning issues at the same time along with advantages.

One of the concerning issues is the personal privacy. In internet age, privacy, as defined by Alan Westin in Privacy and Freedom (1970) is “The claim of individuals, groups or institutions to determine for themselves when, how and to what extent information about them is ...view middle of the document...

And the same kind of thing also happened for credit card companies. They produced extensive models of users’ buying habit by using records of consumers’ purchases and sold models to other commercial companies.

Secondly, email is becoming an essential tool of communication nowadays but it is not a secure way to protect privacy. On the way emails travel from host computers to their destination, they pass through several relaying hosts. Administrators of these hosts can easily access to mails. In a local network like a company’s intranet, network administrators have chances to change users’ passwords in order to read and modify messages. They also have possibilities to monitor and read any files send over the network. It is often the case in a company’s office that the boss try to monitor staffs’ activities.

In addition, it is inevitable now for people to provide some very private information to organizations. Despite the fact that online services such as hotel booking, flight tickets booking and internet banking have already made people’s lives more convenient, individual’s privacy is posed threats meanwhile. Personal information, passwords and pin numbers can be obtained via hacking or the use of software such as keystroke loggers on publicly used computers. Moreover, In order to improve the performance of services and information delivery to citizens, governments now operate more via ICT which requires authentication of a person’s identity. For example, demanded by United Kingdom, individual’s finger printers have to be scanned and stored in system and used in border check before coming. The issue is that those significant data’s should be protected by governments to ensure no one other than the owner can use the information.

Another popular use of ICT is GPS and RFID technology. However, surveillance concern has been raised consequently. GPS allows tracking of people’s movements by mobile signals. And RFID enables companies to track customers’ purchases and profile their behaviours and preferences in a use of commercial purpose.
Lastly, internet media’s are booming these years. Youtube offers people a platform to share films and images and broadcast themselves. But some images and films of people in private situation are uploaded online without permission. Furthermore, the images and films of individuals on websites like Facebook are easily to be downloaded and used by others. These certainly infringe others’...

Other Essays Like Privacy Concerns In Information Computer Technology

The Evolution And Impact Of Information Technology In Businesses

1273 words - 6 pages speeding up the work flow process. Digital filing systems save space, paper and printing costs. The use of computer systems allows corrections to be made instantly. Resources like electronic files and access to information technology are available with the click of a button (Scott,). In the field of Human Resource (HR) it has improved the efficiency of screening, recruiting and hiring potential candidates. Businesses utilize the internet to spread the

The Role of Information Technology in Evidence-Based Medicine

1382 words - 6 pages Table OF Contents Introduction Background and Definition - Evidence-Based Medicine (EBM) Effect of EBM in the healthcare industry Information Technology and the healthcare Industry Information Technology on Evidence-based Medicine Conclusion References Introduction Evidence-based medicine is the now the new paradigm in the healthcare industry. Information Technology plays an important role in the practice of evidence

Using Information, Communication and Technology (Ict) in Childcare Studies

2326 words - 10 pages Xq2z5S Unit 1- Using information, communication and technology (ICT) in Childcare studies. Applying ICT Principles, tools and strategies to personal study Task 1 During this course I will use email and my TMAs to communicate with my tutor enabling us both to keep track of my progress. This can help to let her know if I am struggling or finding a particular unit a little difficult. I will use all written feedback from my tutor and use

Compare and Contrast Components and Purposes of Information Technology and Information Systems in Organizations

860 words - 4 pages Compare and Contrast Components and Purposes of Information Technology and Information Systems in Organizations. Cynthia Coleman Systems Analysis and Design CIS 3512 Professor Setterlind July 6, 2014 Information Systems have been around for a long time, whereas, the term Information Technology is relatively new. The U.S. Postal Service could be considered an information system with sub-systems including logistics, and

ADVANTAGES AND DISADVANTAGES OF USING COMPUTER NETWORK TECHNOLOGY IN LANGUAGE TEACHING

2262 words - 10 pages been a significant increase of interest in using computers and it applications not only in Information Technology classrooms but also in the field of language teaching and learning. The role of computers in language instruction has become an important issue involving language teachers all over the world. In order to have a more thorough perspective on this issue, let us discuss some of the advantages and disadvantages of using computer network

The Role of Information Technology in Business Process Reengineering in the Contemporary Business Firm:

2527 words - 11 pages ESAMI EXECUTIVE MBA RESEARCH PROPOSAL TOPIC: The Role Of Information Technology In Business Process Reengineering In The Contemporary Business Firm: A Case Study Of A Leading Bank In Kenya. Prepared by Paul B. Mureithi Reg. No. 5NB100/01 April 2003. TABLE OF CONTENTS |SECTION NUMBER |TITLE |PAGE | |1 |Research

How to a Computer in Automotive Technology?

563 words - 3 pages MEASURE COMPUTER MEMORY 4 COMPUTER VIRUS 5 COMPUTER TRAINING AT UIRI Computer training at UIRI is taken as course .Those who greatly appreciates it takes it. Training is being carried out in shifts, the morning and afternoon shift. Training takes a period of one month and after wards a candidate is awarded a certificate. Life is what you make of it, if you take it in an easy way it also does the same. Late coming is prohibited, so all

Computer Privacy

828 words - 4 pages | Computer Privacy | For Managing Information Systems | C Potts10-26-2015 | COMPUTER PRIVACY Privacy can be a key aspect of the user experience with computers, online systems, and new technologies. Knowing what to consider about users and their views of computer systems can only improve privacy mechanisms. Privacy is emerging as a critical design element for interactive systems in areas as diverse as e-commerce, health care, office

Internet Privacy

4967 words - 20 pages information vehicle. The Federal Trade Commission (2007) established a set of Fair Information Practice Principles that provides five guidelines that set standards directed towards fair and adequate privacy protection: • Notice/Awareness, • Choice/Consent, • Access/participation, • Integrity/Security, • Enforcement/Redress. The stated aim of these protective measures is to balance advances in computer technology which allow

Hippa and Research

1840 words - 8 pages and drug abuse. Participants are more willing to share sensitive information if they believe that their information is protected against unwanted exposure. The Principal Investigator shall take all reasonable steps to respect the privacy rights of any human subject ("UC Irvine," 2014, p. 2). There are three main concerns regarding invasion of privacy in research. First, there is potential public exposure of views and actions that may have

Hipaa - How the Security Rule Supports the Privacy Rule

1643 words - 7 pages individuals’ electronic personal health information that is created, received, used, or maintained by a covered entity. The Security Rule requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information. (HHS, 2003) Typically ePHI is stored in: • Computer hard drives • Magnetic tapes, disks, memory cards • Any kind of removable

Related Papers

The Study That Concerns A Broad Subject Of Information Technology

2767 words - 12 pages INTRODUCTION INFORMATION TECHNOLOGY Information technology (IT) or Information and communication technology (ICT) is a broad subject concerned with technology and other aspects of managing and processing information, especially in large organization. In particular, IT deals with the use of electronic computer and computer software to convert, store, protect process, transmit, and retrieve information. For that reason, computer

Manage Risk In Information Technology Essay

2425 words - 10 pages execution of mission critical processes and information technology systems for Perfect-10 in the event of an extraordinary event that causes these systems to fail minimum production requirements. The Perfect-10 Contingency Plan will assess the needs and requirements so that Perfect-10 may be prepared to respond to the event in order to efficiently regain operation of the systems that are made inoperable from the event. Scope Insert information on

Information Technology In Electrical Engineering Essay

705 words - 3 pages INFORMATION TECHNOLOGY IN ELECTRICAL ENGINEERING Electrical engineering is one of the newer branches of engineering, and dates back to the late 19th century. It is the branch of engineering that deals with the technology of electricity. Electrical engineers work on a wide range of components, devices and systems, from tiny microchips to huge power station generators. Electrical engineering has now subdivided into a wide range of subfields

New Dimensions In Privacy: Spatial Privacy In The Geographic Information Age

3148 words - 13 pages avenues for continued growth. Even more remarkable, than this slow but consistent restructuring of a belief system surrounding issues of personal privacy, with its social and moral implications, ethical concerns and legal conundrums, is the revolutionary impact on privacy that advances in spatial technology and the commodification of personal spatial information have affected. The proliferation of geo-spatial (or spatially-aware) technology is