Académique Documents
Professionnel Documents
Culture Documents
Student’s Name:
Institution:
Instructor:
Internet and Privacy 2
Internet and technological advancements has made it possible for people to interact, share
information and send and receive messages. However, internet has resulted in to the intrusion and
the deprivation of the privacy of the individuals, humans and people who have become inevitable
to the usage of the internet. Internet, despite all the usefulness associated with it has resulted in to
the destruction of the privacy of individuals. Development of companies such as Facebook, Twitter
and Instagram has contributed to the highest rate of the violation and destruction of the privacy of
its users. Dependence on technology in most day to day logistics has made it vulnerable to lose
privacy as well as personal information. Internet usage revolves from the calls we make, the
messages we text via the mobile phones, the automated cards we use, pictures and information we
share in social networking and other notable things (Yin, Xi, Sun & Wang, 2018). Research has
shown that in the modern world people are vulnerable to losing sensitive information such as credit
Rationale behind the losing of privacy is varied, as it has been evident and argued out by
different scholars. Nowadays, it has become possible for online companies such as marketing firms
like Amazon to track personal as well as sensitive information when one visits their website.
Despite the existence of the terms and policies giving guidelines to the users, in most cases we as
individuals tend to be lazy in reading them thus ending up clicking the agree button without the
knowledge of the consequences (Hu, Ning, Qiu, Song, Wang & Yao, 2017). With this, we end up
agreeing and signing something we are not even sure of, which in turn results in to the violation
of our privacy.
Internet and Privacy 3
Additionally, some people have argued that privacy in the current world has just become
an illusion. Existence and the development of social networking sites as well as social media
platforms has made it easy for individuals to share personal and sensitive information. As a result,
people tend to share information with people in the name of friends, not knowing that some people
are malicious and that they are after retrieving and gathering information or even trying to hack
their accounts. Such posts make it easy for hackers and malicious individuals have access to
Surveillance as a result of the internet is another threat to the privacy of the individual’s
information. Due to the advancement of technology and the threats in attacks and issues of
terrorism, the surveillance techniques and strategies have been developed as a way of tracking and
collecting information from varied sources. Surveillance is aimed at identifying the tracks and the
plans of the attackers. In turn, despite its effectiveness and reliability, this technique ends up
collecting private, personal and sensitive information about individuals as well as firms
(Husamuddin & Qayyum, 2017, March). Actually, there should be establishment and the
In conclusion, the internet has greatly destroyed the privacy of individuals as well as firms.
As well, people ought to be aware of their responsibilities in protecting their personal information
when social networking or even in platforms such as Facebook and Twitter. Individuals ought to
view polices related to terms and conditions when visiting different websites. Nonetheless, firms
and companies should put security measures to avoid losing data to malicious people as well as
companies and firms for protecting sensitive information of the consumers. Surveillance ought to
Internet and Privacy 4
be moderated in the amount of data collected. Moreover, internet was developed to ease life but
not to violate the privacy, therefore policies, rules, ethics and regulations should be strictly adhered
References
Yin, C., Xi, J., Sun, R., & Wang, J. (2018). Location privacy protection based on differential
privacy strategy for big data in industrial internet of things. IEEE Transactions on Industrial
Hu, P., Ning, H., Qiu, T., Song, H., Wang, Y., & Yao, X. (2017). Security and privacy preservation
scheme of face identification and resolution framework using fog computing in internet of
Husamuddin, M., & Qayyum, M. (2017, March). Internet of Things: A study on security and
privacy threats. In 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) (pp. 93-
97). IEEE.