Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

I need unique answer .. 1- “People do not have any privacy these days,” how woul

ID: 3822990 • Letter: I

Question

I need unique answer ..

1- “People do not have any privacy these days,” how would you justify this statement in your own words? Your answer should contain strong reasoning and must have at least 250 words.

2- Sometimes when we visit super markets, we may share our personal details to get (for example) “Loyalty cards” and other benefits. Do you think sharing such details is a good approach? Give arguments for both cases: “sharing details” and “not sharing details.” Your answer must be complete with solid arguments.

Explanation / Answer

Now days, everyone has their own values for their privacy. The privacy is the one of the important aspect in the technology. Today technology is growing very rapidly.

Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share common themes. When something is private to a person, it usually means that something is inherently special or sensitive to them. The domain of privacy partially overlaps security (confidentiality), which can include the concepts of appropriate use, as well as protection of information. Privacy may also take the form of bodily integrity.

The impact of information technology on privacy:

Internet:

A major theme in the discussion of Internet privacy revolves around the use of cookies (Palmer 2005). Cookies are small pieces of data that web sites store on the user's computer, in order to enable personalization of the site. However, some cookies can be used to track the user across multiple web sites (tracking cookies), enabling for example advertisements for a product the user has recently viewed on a totally different site. Again, it is not always clear what the generated information is used for. Laws requiring user consent for the use of cookies are not always successful, as the user may simply click away any requests for consent, merely finding them annoying. Similarly, features of social network sites embedded in other sites (e.g., “like”-button) may allow the social network .

Social media:

The interactive web, known as Web 2.0, where users generate much of the content themselves, poses additional challenges. The question is not merely about the moral reasons for limiting access to information, it is also about the moral reasons for limiting the invitations to users to submit all kinds of personal information. Social network sites invite the user to generate more data, to increase the value of the site (“your profile is …% complete”). Users are tempted to exchange their personal data for the benefits of using services, and provide both this data and their attention as payment for the services. In addition, users may not even be aware of what information they are tempted to provide, as in the abovementioned case of the “like”-button on other sites. Merely limiting the access to personal information does not do justice to the issues here, and the more fundamental question lies in steering the users' behavior of sharing.

Mobiles:

As users increasingly own networked devices like cellphones, mobile devices collect and send more and more data. These devices typically contain a range of data-generating sensors, including GPS (location), movement sensors, and cameras, and may transmit the resulting data via the Internet or other networks. One particular example concerns location data. Many mobile devices have a GPS sensor that registers the user's location, but even without a GPS sensor, approximate locations can be derived, for example by monitoring the available wireless networks. As location data links the online world to the user's physical environment, with the potential of physical harm (stalking, burglary during holidays, etc.), such data are often considered particularly sensitive.