воскресенье, 12 мая 2019 г.

The Value of Digital Privacy in an Information Technology Age Research Paper - 2

The Value of Digital Privacy in an Information engine room Age - Research Paper Example This stores numerous reports including names, addresses, birth dates, court records, and cell phone numbers pool (The Value of Digital Privacy in an Information Technology Age, 2013, par.1). b. Google.com is one more technology which is sort of helpful in enabling an someone to explore into the cloistered data of those they need to or unavoidableness to know about. This culture can also be shared with other organizations or individuals if the person consents. Google is a platform where a person has access to information relating to anything and everything. c. A nonher technology is FaceBook, which is an online social network that contains dissimilar kinds of applications or apps that the users can use to their advantage. The apps contain a number of details regarding emails, present location, age, sex, friends and so on. 2. question the advantages and disadvantages of public access to thi s information, both for the researchers and those who are being investigated. Every invention has its own merits and demerits. The advantage of this flake of information is the easy and fast accessibility of information through various websites. It becomes easier to make the payment of bills online, shop online or making various enquiries, making reservations etc. People need not stand in queue to make the payment of bills or go to shops to purchase goods. Instead, it can be done seance in front of a computer, therefore, saving money and time as well as acquire things done more easily. Digital information can be sent quickly from one individual to another. The demerits are that an e-governance system has to watch over the limitless number of people accessing the internet day to day. ironware and links are also required in order to gain access to government websites. unrestricted sectors will have to avail highly developed technologies and security systems to manage the huge am ount of information as well as threats. Huge amount of investments is required for this purpose. On the other hand the study of cyber crimes also greatly affects an individuals ain identity. A number of cases related to cyber crimes still keep on unresolved. 3. Determine what measures citizens can take to protect private information or information they do not want to be disclosed. . In order to take out personal details from Google or Yahoo, individuals may communicate Acxiom, which is seen to be the largest private information provider. Individuals may send an e mail or contact Acxiom through a phone call to commence their work done. A number of websites are associated with US search and, therefore, they make available a persons background details to anyone who needs to get in touch or contact the other. People can demand the removal of their personal records through Peoplefinders.com. Whitepages.com is similar to the phonebook which contains an online directory that can be a ccessed by everyone who has their computers connected to the internet. Individuals can demand the removal of it as well. It is not easily possible to remove individ ual details in a well timed method, so one can seek the help of professionals. A business named Reputation Defender assists individuals in removing personal details that they do not prefer to be displayed to the public eye, through the payment of a accredited fee. 4. Discuss a federal law that grants the federal government the legal right to make private informati

Комментариев нет:

Отправить комментарий