1name Of Department Agencyunclassifiedfebruary 25 2021memerandum For ✓ Solved
1 NAME OF DEPARTMENT AGENCY UNCLASSIFIED FEBRUARY 25, 2021 MEMERANDUM FOR: Professor Carmen Arostegui FROM: Irving Toruno Student of Analytic Writing, POS 4784 SUBJECT: Your Issue ANALYTIC WRITING IN POLITICAL SCIENCE, GOOGLE THREAT Introduction : Over the years, technology has been positively embraced and is continuously used in various sectors . The internet allows the big techs to access personal information, government information and access passwords, new communities, and networks. The need to tame has increased because of the potential threats they pose to the world, and the United States is not an exception. The dominance of a few big techs continues to generate privacy concerns. Big techs have a history of violating their user’s privacy over the years of their existence and have also become a threat to national security (Romm, 2019).
Several actors behind the scenes of these violations benefit from the potential chaos brought about by the big techs' actions and victims. This proposal will look into the leakage of data, the dangers resulting from unregulated activities by Google as big tech and where they exist and the players benefiting from the big tech's actions and the victims. Background: Data and information leakage is a way of breaching privacy and information exposure . Data exposure occurs when the database is left for anyone to see by a big tech company happens in various ways. Data breaching involves a security incident in which there is data exposure without authorization.
The most obvious one is weak passwords. Weak passwords allow a straightforward breach of personal data by hackers. Employees in Google can also be a reason for the leakage of data. They can lose devices that contain Google’s sensitive information or even steal them. These devices can then fall into the wrong hands and lead to data leakage.
Software glitches are also a reason for data leakage because hackers usually search for these vulnerable mistakes to breach their security. An example is the software glitch that led to the exposure of personal data of Google+ users. The scenarios mentioned above can explain how private data can be leaked from Google without authorization; however, the big techs' leakages are tied to the companies' stakeholders. Analysis: Data leakage and breaches cause adverse effects to the company and individual whose information has been compromised . Several big techs, such as Facebook and Amazon, rely on Google’s search engine to dominate their sectors (Wagner, 2019).
The government’s operations and legal information could be adversely affected by Google’s interference, and data leakage could lead to chaos. Google, over the years, has enjoyed exponential growth, and the current cyber-attacks and exposure of information have brought about the need to regulate goggle as a big tech company. Currently, Google has become highly politicized, with most of the politics surrounding the description of Google as the internet’s monopoly gatekeeper. The democrats target Google for its monopoly power, while republicans target them with censoring conservative speech accusations. One of the champions of critics is the former president Donald Trump.
He frequently accused big techs of censoring him and even gave threats of taking away their protections. Context: The leakage of personal information such as health information, emails, contact information, education and social security numbers may lead and stir chaos, the pages one likes, and even where an individual works . Google can collect data based on one's activities, location, and personal information, leading to national instability exposure. (Azmoodeh, and Dehghantanha, 2020). Other big techs such as Facebook share the data and give several large tech companies access to their users' data, increasing accessibility to data stored online. If Google fails to protect its user’s data from misuse, the nation’s integrity could be affected (Whitman, 2004).
During the 2016 presidential elections, a political-data firm, Cambridge Analytica, linked to the presidential campaigns of Donald Trump, targeted voters by collecting private information (Schechner, & Secada, 2019). The data collection was from 87 million Facebook users who had not agreed on letting their data be leaked. Personalized messages were then sent to the users that were believed to affect the elections' results, which involved the esteemed democracy of the nation. Outlook: Google interference and data leakages have both benefactors and victims . Google would benefit from the interference depending on the reason and motive behind the leakage of the information.
The person influencing the leakage of data, and the third party involved could also benefit. In several ways, data leakage is a type of data-driven exploitation, with the victim being the person who is being exploited. Due to the infringement of the nation's sovereignty and the citizen's right to democracy, both the government and the people become victims. Unregulated actions by Google lead to potential threats big enough to cause chaos in the United States . Big techs such as Facebook and Amazon rely on Google’s search engine for domination in their sectors; therefore, Google’s actions affect their operations in many ways.
The government and users of Google products face potential threats that could violate several rights and regulations in place. If any of the possible consequences occur, turmoil and uncertainty will result, necessitating the regulation of large tech companies such as Google. Conclusion: The United States Government must focus on securing vital national security data from leakages and manipulations in order avert the dangers explained above. The data security mechanism must focus on detecting the threats, prevention mechanisms and safe storage of data. The detection aspect focuses on improvement or developing new ways that enables government to realize threats to data leakages before they actually occur.
The federal government must make policies that are in tandem with the digital era in order to fill the gap that has made private enterprises take advantage of. While the government still relied on industrial economy era regulations, big tech companies took advantage of the benefits of a digital economy that has led to immense data leaks both unintended and malicious. Making private enterprises to self-regulate is an aspect of a free market economy that is strongly rooted in the United States but such free market economy must have boundaries when it comes to national security matters. The big tech companies are now urging the government to regulate them, a contrast from the opposition to regulation that was there a decade ago.
To ensure the detection aspect of breach to data, the United States Congress must relook at the legal barriers existent on the federal commissions responsible for enforcement of data privacy. On data loss prevention mechanism, the federal government and its agencies must focus on strengthening private enterprises to own up and accept that prevention of data loss is everyone’s responsibility. Companies and organizations must develop encryption options that are strong and unbreakable in order to deter malicious activities. The US congress needs to also check on legal mechanisms available for companies who breach antitrust laws and regulations. The ability and scope of investigative and prosecutorial agencies needs to be strengthened to ensure organizations that breach any of their governing laws on data are fully prosecuted to serve as a lesson to similar companies.
Lastly, the future implications of data threats calls for safe storage mechanisms. Further research needs to be undertaken on aspects such as cloud storage and the rights and ownerships of such storage facilities. For example, should government use cloud storage facilities from private organizations? Or can rival companies rely on each other for cloud storage facilities? The government needs to grow the data storage industry as an industry of the future.
Organizations and companies will rely on this data storage industries to store their sensitive data. A critical aspect of growing the industry is a focus on more Research and Development directly funded to research centers to device safe data storage mechanism utilize latest technology. Being a growing industry yet, data storage presents an exciting experience that has the potential of generating huge revenues when sold overseas. References Azmoodeh, A., & Dehghantanha, A. (2020). Big data and privacy: Challenges and opportunities.
In Handbook of Big Data Privacy (pp. 1-5). Springer, Cham. Bill Curry, B. (2019).“Elections Canada puts Facebook, Google, other tech giants on notice over political ads,†The Globe and Mail. Retrieved from: .
Botha, J. G., Grobler, M. M., & Eloff, M. M. (2017). Global data breaches responsible for the disclosure of personal information.
Schechner, S., & Secada, M. (2019).“You Give Apps Sensitive Personal Information. Then They Tell Facebook.†Wall Street Journal . Retrieved from: . Romm, T. (2019). “Facebook and Google to be quizzed on white nationalism and political bias as Congress pushes dueling reasons for regulation,†Washington Post .
Retrieved from ). Wagner, K. (2019). “Digital advertising in the US is finally bigger than print and television,â€. Retrieved from: . Whitman, J.
Q. (2004).“The Two Western Cultures of Privacy: Dignity versus Liberty,†The Yale Law Journal 113. Retrieved from: . 2.2 Discussion History and Evolution of Healthcare Technologies Select one of the following information technologies below: · Bar coding · Voice recognition · Wireless networks · Portable devices · Digital imaging · Internet · Internet of Things · Email · Social media · RFID · Augmented reality · Virtual reality Provide a summary with the following: · An overview what the technology provides · A timeline of milestones in its development · How mature the technology is · How it affects the healthcare industry (access, quality, costs, marketing, etc.) · What future possibilities the technology has in the healthcare industry In your responses to other students, consider how the technology you researched might affect the one they researched. Response parameters: · Initial posts should be 350 words minimum · Initial posts should include at least two peer-reviewed article/journal/book citations (not including the course textbook) · Use APA formatting to cite all of your sources: · (Links to an external site.) · You can access the databases of peer-reviewed journals here: · (Links to an external site.) · (Links to an external site.) ·
Paper for above instructions
Title: The Evolution and Impact of Wireless Networks in Healthcare TechnologyOverview
Wireless networks represent a foundational technology in modern healthcare, facilitating the seamless exchange and access of health information. The core function of wireless networks is to provide flexible, high-speed connectivity among devices, allowing healthcare professionals to communicate efficiently, monitor patients remotely, and access patient data in real-time. The integration of wireless networks has drastically transformed healthcare delivery, promoting patient-centered care and improving health outcomes (Khan et al., 2021).
Timeline of Milestones in Development
1. 1980s: The concept of wireless communication begins to take shape with the development of early mobile phone technology.
2. 1990s: The first commercial wireless local area networks (WLANs) were introduced, providing limited but important connectivity solutions for healthcare facilities.
3. 2000: The publication of the IEEE 802.11 standard marks the advent of Wi-Fi technology, which begins to see deployment in hospitals and clinics.
4. 2010: Rapid advancements in mobile computing lead to the increasing use of smartphones and tablets among healthcare professionals. Wireless networks facilitate Electronic Health Record (EHR) access at the point of care.
5. 2015: The Internet of Things (IoT) emerges, connecting medical devices via wireless communication, allowing for remote patient monitoring and enhanced data collection.
6. 2020 and Beyond: The COVID-19 pandemic accelerates the adoption of telehealth services, heavily reliant on wireless networks for virtual consultations and remote patient management (Bashir et al., 2021).
Maturity of the Technology
Today, wireless networks in healthcare are considered a mature technology. They are widely used across various healthcare settings, from hospitals to outpatient clinics and home care. The technology has evolved to utilize advanced forms of wireless communication, including 5G, which offers faster data speeds, lower latency, and the ability to connect a larger number of devices simultaneously. These advancements are crucial as healthcare increasingly leans on technologies like telemedicine, wearable health monitors, and smart medical devices that require rapid data exchange (Verma et al., 2021).
Impact on the Healthcare Industry
Wireless networks have a multifaceted impact on the healthcare industry:
1. Access: By enabling mobile access to patient records and communication tools, wireless networks facilitate timely decision-making and enhance care coordination among healthcare providers (Zhang et al., 2020). This improved access leads to increased efficiency in care delivery.
2. Quality: The ability to monitor patients remotely and securely transmit data improves the quality of care. Initiatives like telehealth allow for timely interventions, particularly in chronic disease management and post-operative care, which enhances patient satisfaction and health outcomes (Kumar & Aggarwal, 2021).
3. Costs: Wireless networks can lead to significant cost savings for healthcare providers. By streamlining communication and reducing the need for paper-based processes, hospitals can lower administrative overheads and focus resources more effectively (Amoako et al., 2021).
4. Marketing: Healthcare organizations increasingly utilize wireless technology for patient engagement strategies, including mobile health apps that provide health information, medication reminders, and appointment scheduling. This heightens patient awareness and involvement in their own care journey (Chong et al., 2021).
Future Possibilities
The future of wireless networks in healthcare is promising, with several emerging trends that hold the potential to further revolutionize the sector:
1. AI and Machine Learning Integration: The deployment of artificial intelligence (AI) and machine learning in conjunction with wireless technology could enable predictive analytics, allowing for early identification of potential health crises based on real-time data streams (Salathe et al., 2021).
2. Expansion of IoT Applications: As the IoT landscape expands, wireless networks will facilitate the connection of more devices, enabling everything from smart medication dispensers to home monitoring systems that offer comprehensive patient care outside traditional settings (Yaqoob et al., 2017).
3. Enhanced Security Protocols: With increasing concerns about data privacy and security, advancements in encryption and secure network protocols will become crucial. Future wireless networks will need robust security measures to protect sensitive health information from breaches (Devadas et al., 2021).
4. Telemedicine Growth: As telemedicine continues to expand, especially following the COVID-19 pandemic, wireless networks will evolve to support higher-quality video and audio connections, ensuring effective remote consultations with minimal disruption (Chen et al., 2020).
Conclusion
Wireless technology has become a cornerstone of modern healthcare, significantly improving access, quality, and efficiency of care. As the landscape continues to evolve with advancements such as AI, IoT, and enhanced security protocols, the potential for wireless networks to further revolutionize healthcare remains vast. Continued investment in this technology is paramount, ensuring that the healthcare industry can not only meet the demands of today but also adapt to the innovations of tomorrow.
References
Amoako, G., Osei, B., & Odamtten, G. (2021). The impact of wireless communication technology on healthcare delivery. International Journal of Health Information Management, 34(2), 145-153.
Bashir, M., Raman, R., & Vohra, R. (2021). Telemedicine during COVID-19 Pandemic: A systematic review. Frontiers in Public Health, 9, 622002. doi:10.3389/fpubh.2021.622002
Chen, Q., Wang, H., & Xu, F. (2020). The rise of telemedicine in the COVID-19 pandemic: Policy, research, and practice. Frontiers in Public Health, 8, 563484. doi:10.3389/fpubh.2020.563484
Chong, J., Iber, R., & Potts, H. (2021). Mobile health apps for patient engagement: A systematic review of the literature. Journal of Medical Internet Research, 23(4), e21778.
Devadas, V., Setia, P., & Jangra, S. (2021). Cybersecurity in healthcare: Current challenges and future directions. Research in Healthcare Financial Management, 25(2), 146-156.
Khan, M. F., Asgar, M. A., & Ahmed, K. (2021). Wireless networks in healthcare: Current status and future trends. Journal of Network and Computer Applications, 174, 102919. doi:10.1016/j.jnca.2020.102919.
Kumar, M., & Aggarwal, A. (2021). The impact of wireless communication technology on healthcare quality. Health Informatics Journal, 27(3), 14604582211032722. doi:10.1177/14604582211032722.
Salathe, M., Althouse, B. M., & Thompson, N. (2021). The role of wireless communication technology in the quest for health security. Lancet Digital Health, 3(5), e301-e302. doi:10.1016/S2589-7500(21)00068-3.
Verma, A., Kumar, M., & Singh, S. (2021). 5G Technology in Healthcare: A Survey. Journal of Healthcare Engineering, 2021, 9910635. doi:10.1155/2021/9910635.
Yaqoob, I., Ullah, F., & Abbas, S. (2017). Internet of Things: From Hype to Reality; A Survey on the Use of Wireless Networks in Healthcare. Journal of Network and Computer Applications, 104, 228-244. doi:10.1016/j.jnca.2017.01.018.
Zhang, Y., Jiang, Z., & Wang, K. (2020). The transformative impact of wireless networks on healthcare: A critical review. Health Information Science and Systems, 8(1), 1-12. doi:10.1007/s13755-020-00309-4.