Sign In
Not register? Register Now!
You are here: HomeEssayTechnology
Pages:
2 pages/≈550 words
Sources:
4 Sources
Level:
MLA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

Digital Detective (Essay Sample)

Instructions:

Digital Detective. How easy is it for one to get your personal information on the internet.

source..
Content:

Digital detective
Name:
Course:
Instructor’s Name:
Date:
It's unimaginable how the level of my privacy can be that low. It seems like anyone interested in my whereabouts would track me at the click of a button right from the comfort of their room. It’s quite shocking how easily my name can appear from the internet search engines and also accompanied by my social media profile pictures. Searching using a single name would bring as many as there can be but they get eliminated down to my last name and my information appears. There is a lengthy list of things that pop up on searching one‘s name that include the social website pages bearing that or similar names. Others include - marketing platforms; businesses registered with similar names, places, animals with similar and unbelievably scientific procedures and or acronyms and video clips that resemble the searched name.The parties who might be interested in this kind of information will depend on why they need to get it. A common party is untrusting partners wanting to dig as much information about the other, business clients and malicious competitors, the security personnel such as the federal bureau of investigations and other intelligence agencies, employers and employees. Business clients would like to follow up on your business and private information and affairs to ascertain your credibility but the competitors interest might be to get you out of the game. The information can be used maliciously to assassinate your honour and respect to the public in case you hold an office or for impersonation purposes. Criminals can use such links to contact you, find your location, threaten you and or interfere with your social and business platforms. To some extent, this kind of information would be okay to flow on the internet but it can be lethal if it falls in the wrong hands. Some privacy is paramount.
Such data can portray a lot of my hidden secrets. Right from the images, to the remarks on topics on the social sites and updates, the businesses ventured and places associated with or registered on my name. The portraits that appear cannot be regarded as authentic, but the can give a viable idea who I actually am. Comparing the portraits from different searches will, therefore, show the real me and exactly me. From the searches, I can determine that to some point am a cynic always reading malice from other people’s ideas still I can see that social events are part of me. As a professional detective, I can easily link up the data to create a valid description of my activities and problem movements. This data-based portrait is highly prone to inaccuracies because not at all times that I will upload information that is true or expresses my real feelings....
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Types of Data Sources Used in Data Mining
    Description: One of the most perplexing tasks in data mining involves selecting the most appropriate data sources that answer comparative questions in the course of data mining process. Arguably, lots of data are available that can answer such questions. The implication is that the experts involved in data mining must ...
    1 page/≈275 words| 4 Sources | MLA | Technology | Essay |
  • Information Technology
    Description: Lack of information technology skills costs most companies financially, socially, politically and socially...
    7 pages/≈1925 words| 4 Sources | MLA | Technology | Essay |
  • Globalization Through Technology to the Global Economy
    Description: Globalization refers to the increased movement of people, capital, goods, and ideas due to economic integration....
    2 pages/≈550 words| No Sources | MLA | Technology | Essay |
Need a Custom Essay Written?
First time 15% Discount!