Issues of privacy in the Ever Broadening IT World

Issues of privacy in the Ever Broadening IT World

Issues-of-privacy-in-the-Ever-Broadening-IT-World

Developments in Information Technology

The 21st century has seen so much development in information technology but it also has – both a negative and positive impact on our lives. People value their privacy and protection, and in no way they want their personal information to be exploited in any way. But the recent signs of progress have contributed to the vulnerability of an individual’s privacy and raised the number of cyber-crimes being committed throughout the cyber world. The introduction of Big data in the felid of IT allows for the storage and execution of exabytes of data.

Experts reveal that the technical capabilities of collecting huge chunks of data regarding telephonic conversations, internet searches and E-payments are already undergoing. Many such activities are being carried out to serve governmental agencies. Not to mention that highly popular products and platforms (such as Facebook & Apple) have been accused of breaching the privacy of the users. The combination of expanding the intensity of new innovation and the declining clearness and concurrence on security offer ascent to issues concerning law, policy, and morals. We are going to further dive deep into the effects of IT over privacy concerns.

 

development-in-IT Developments in IT

Involvement in IT

As connectivity increases access to information, it also increases the possibility for agents to act against the connected users based on the new sources of information. When these sources breach into personal information, risks of harm, inequality, discrimination, and loss of autonomy easily emerge as a threat for the user. For example, your enemies may have less difficulty finding out where you are, users may be tempted to give up privacy details for perceived benefits in online environments, and employers may use the information to refrain from hiring certain groups of people. Furthermore, instead of users, the system might define which information is to be displayed, thus confronting users only with news that matches their profiles.

Involvements in IT Involvements in IT

Internet

The recent advance in cloud computing has raised some privacy concerns. In the past, user information could still be received from the web, but it was not easily possible to reach into user’s programs and data. But now, anything stored in the “cloud storage” can easily be used and exploited by the host. The data and permissions required by loads of apps on our phones are of special concern here. It’s not guaranteed that where will the accessed information go, and which authorities are going to get their hands on it. Cookies are widely used throughout the web for storing chunks of data on your device. However, some cookies can be used to keep track of your searches, browsing history, etc. It’s not guaranteed where will the stored information go.

 

Internet Internet

 

Social media

The social media, where users spend so much time generating contest themselves poses its own sets of challenges. It sounds as easier as that “Hey, if you want to be safe, just don’t upload on the social media”. Right?

When someone joins a social media, the first priority is to find their friends. The new trend in apps requires your personal detail to be fetched in order to aid the search process. Sharing those details and information seems harmless, but social media has the information now – whether or not the owner wants it to be shared/used or not. Most of the users refrain from reading “Terms and Agreements” while they ignore the potential threat to their personal data; not knowing that the platform claims all the rights over the data.

Social Media Social Media

 

Mobile devices

Smartphones are being manufactured and used widely throughout the world. In comparison with the normal cellphones in the past, smartphones today pose a menace to the privacy of its users. Today, phones are loaded with a range of data-generating components which includes GPS, sensors, mic, camera and so on. One example can be location data. Most of the phones are equipped with GPS – even if it’s disabled, location can be determined through wireless networks. If location data falls into the hands of unwanted people, it can lead to physical threats such as stalking, burglary, and even target killing. Similarly, apps taking control over the camera can be used to take pictures of the surroundings. Mics can be used to keep watch over your daily life or sensitive conversion – all situations can be true just by giving access to apps while it’s beyond the imagination of users.

Mobile Devices Mobile Devices

 

Subscribe to our newsletter

This entry was posted in blog and tagged . Bookmark the permalink.