Sign In
Not register? Register Now!
You are here: HomeArticleIT & Computer Science
Pages:
4 pages/≈1100 words
Sources:
No Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Article
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 21.6
Topic:

How People Abuse Of Privacy (Social Media, It Organizations) (Article Sample)

Instructions:

An article on how people abuse privacy in the IT sector.

source..
Content:
Abuse of Privacy (Social Media, IT Organizations) Having access to internet nowadays seems to be a very important thing to everyone around the globe. Payments, Communication, news, registrations of various things are all online as well as social Medias that connect people together, different people from all over the world. Several applications have been created that connect people, Facebook, Instagram, LinkedIn and many more enable people to chat, share photos even connect with people who are on the same career path. Twitter has also been used to raise social issues whereby the whole community comes together with a solution or as a way of advocating for change. Digital technology which we see today is meant to create better services for end users and be efficient to deliver as well as create good relationships among people which is a significant impact. Technology has transformed the way organizations operate, communicate and compete. With all these advantages that come with technology, people have found ways to misuse the internet and cause harm to people forgetting the common good that it is meant to achieve;- Connectivity, Access to information and services, External communication in organizations, Information and business analytics. It has become a tool for people to facilitate harassment, Forgery, Hacking of computers to steal important information as well as illegal transfer of money through banks, Misinformation, threatening as well as leaking protected information or sending of fraudulent emails. Tragic ends have also been reported whereby you find that some videos or photos have been leaked without the owner’s permission hence some committing suicide because of the cyberbullying that comes with it. These are some of the challenges that have been experienced around the world and there are certain measures that can be put forth so that there isn’t the fear of using technology and one’s information is safe and can never be used for harassment. Everyone has the right to privacy and this individual right needs to be respected so that one’s dignity is protected. The common good can be achieved if a community comes together in solidarity where there is equality and participation of all especially the marginalized and vulnerable in the community. The community can come together to create awareness and advocate for better usage of the internet and propose ways that can be used to curb some of the challenges. To begin with, victims of cyberbullying can be taken for counselling so that cases of suicide are prevented. This will enable more victims to come out and seek the necessary help that is required from professionals or a community coming together to show solidarity with the victim so that they don’t feel abandoned but feel that they have people who care about them and are ready to help, a way of showing community responsibility. People can be taught that limiting the information they put on social media is very important. People end up revealing so much private information to people they barely know and this can be used against them. Stalkers, Sex predators and kidnappers can take advantage of this information only for one to realize that they gave too much information. People can be taught on the importance of privacy settings too where they can be showed how to limit some information so that not everyone is able to see it hence building a secure environment in social media. Secondly, organization can engage their employers in developing social media policies that can govern them. In addition to that, the use of social media has had a greater impact on young people especially students. This has led to them being addicted to the use of social media and it has become their greatest weapon of cyberbullying. Young people are the ones who have been reported to be committing suicide after being bullied by their fellow students. With that realization, students can be taught on how to use the social media in an ethical manner that promotes social justice. It can be mandatory for them and they can cover modules on values and ethics that can be used to impact people or a community in a positive manner. Advocating for laws that can govern online users is of importance. The government can come up with laws that protects its citizens as well as harsh punishment for those found violating those laws. This can help the most vulnerable as this can be a way of serving justice to them since laws are there. Some countries have taken legislative measures e.g. Germany is an example and it is leading the way. In June 2017, it passed the new Network Enforcement Act which would require social networks with 2 million or more users to remove content that is “clearly illegal” within 24 hours of it being notified of its existence, with fines of up to €50m (£44m) possible. The EU also recently warned tech firms that they must remove hate speech and extremist content faster, or face regulation, requiring greater use of automatic detection sy...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Search And Seizure Of Evidence From Computer And Other Technology Devices
    Description: AB Investigative Services (ABIS) has been contacted by a prominent state law enforcement agency concerning the need to discuss, ...
    4 pages/≈1100 words| 6 Sources | APA | IT & Computer Science | Article |
  • UAS, Gigapixel Technology, and High-Resolution Imagery
    Description: Empirically, the article provides an illustration of how super-high resolution (SHR) image data can be visualized by using gigapixel displays....
    5 pages/≈1375 words| 1 Source | APA | IT & Computer Science | Article |
  • Mysql data structure. IT & Computer Science Article
    Description: This paper defines creating a new SQL database and then creating the table in the database. We will study how to create a table in a database using MySQL command. The database will be based on the relational model....
    2 pages/≈550 words| 2 Sources | APA | IT & Computer Science | Article |
Need a Custom Essay Written?
First time 15% Discount!