3 pages/≈825 words
IT & Computer Science
Technophobia Research Assignment: Invasion of Privacy (Essay Sample)
The essay was on technological fears among individuals in different organizational set ups. I am submitting it as a sample to showcase my skills in Harvard formatting style.source..
TECHNOPHOBIA: INVASION OF PRIVACY
Technophobia: Invasion of Privacy
Information and Communication Technology (ICT) has evolved rapidly over the past century. This has transformed the people’s lives as well as the society in a more profound way (both positively and negatively). Technology advancement has led to numerous benefits globally. However, it has brought with it several ethical challenges. An example of these challenges is the threat to privacy. In this paper, I discuss the threat that technology poses to people’s privacy. This threat is more profound especially on surveillance, social networks such as Facebook, as well as computerized conversations recording.
Technology as a Threat to Privacy
Just as the Luddites had their fears on technology advancement, today those concerns, and more, still prevail. It is also justified to have fears of technology, where the most profound one is “threat to privacy.” According to Nissenbaum (2009), “information technology” has been figured as the significant threat to individual’s “privacy”. From the three top threats to privacy, surveillance is considered as the major one.
Surveillance, both by the government and “self-surveillance” poses a substantial threat to individual’s privacy. According to Kang et al. (2012), the threat does not only come from the government or company’s surveillance, but also from “nascent data practice,” which is referred to as “self-surveillance” (p. 812). Recording one’s information such as observations and one’s environments, which exposes the individual to the world, is one way that privacy is invaded (Kang et al. 2012). Government and business or company surveillance invade employees and visitors’ privacy at the workplace. The information that would rather be better-kept secret is exposed to the managers and top executives. This is unfair since there are no surveillance cameras to “watch” those senior officials and administrators. Additionally, in most times, “monitoring and tracking” especially “dataveillance” does not serve the particular purpose “but an inadvertent consequence of some other goal for which a given system was originally designed,” (Nissenbaum 2009, p. 24). This calls for more worries concerning modern technologies and their contribution to individual security and privacy. Similarly, distribution of information on global “social media” platforms like Facebook or Instagram is a threat to personal privacy.
Facebook, as a social platform, has been perceived as a threat to privacy. According to Goldie (2010), Facebook’s agenda to enhance “transparency” and efficient communication has contributed to “self-surveillance” which leads to complete disclosure of individual’s personal information to the public. Consequently, since information is stored in big databases, manipulation is possible and this invades privacy (Goldie 2010). In some instances, the information that one chooses to remain is exposed to the public. This means that Facebook is a potentially significant threat to privacy. Additionally, concerns about privacy have been facilitated by the current data collection, extensive data analysis, and collection technologies.
New technologies and innovations have been subject to criticism due to their invasion of privacy. According to Regan (1995), modern technologies advance some policy issues concerning privacy mainly at personal level. Such concerns are crucial and widely experienced today. For example, recordin...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
- Computer Science Business Strategy Blog 1 AssignmentDescription: Telecom solutions play an essential role in business in providing communication within the industry. The intended market requires telecom services for internet, business phone, and mobile phones for the desired employees. ...1 page/≈550 words| 2 Sources | Other | IT & Computer Science | Essay |