Technology Privacy Data: Research Based Investigation
To start with, my aim for this paper concerns writing a research based argumentative essay about technology. The term technology has a diverse meaning that can be summarized as the use and application of scientific knowledge for practical purposes in the quest to make work easier. This body of knowledge is always devoted to creating tools, extract materials, and process actions. Undeniably, people are made a crucial part of the technological system through the use of products and process to extend their abilities as well as simplifying daily lives. According to the Stanford Encyclopedia of Philosophy, information technology has reduced the control over personal data which extends the threat to privacy. As a result, there is a range of adverse consequences as a result of access to personal data. Moreover, human beings consider their privacy through the protection of personal life profile.
However, advancements in information technology have resulted in a big threat to the privacy of data. Thus, technology has reduced the extent to which the control over the amount of their data and paving the way for several negative effects. For instance, some of the effects are realized through the GPS which keeps and monitors someone's movements by use of the Webcam. Almost all the information collected by devices such as mobile phones through the GPS track can be used by the government and law enforcement to gather evidence in case of any person misfortune.
Even though technology helps people do things in a fast and precise way, the consequences of its dark side are unbearable. Sometimes we might be exposing ourselves to the strangers unknowingly. The meaning and value of privacy remain an important matter to be considered. This will be achieved through combining of the new technology and giving rise on privacy agreements problems concerning law and policies towards the control of all data. Therefore, this research proposal focuses on technology and its effects on privacy by highlighting various consequences and the best mechanisms to protect personal data.
Aims and Objectives
The main aim of this research proposal is to find out how technology affects people's privacy and privacy on its data resolutions. Also, the proposal will focus on the role of emerging technologies, for instance, technological advancements and how they relate to data resolutions and their effects on general privacy. In so doing, the proposal will follow its guidelines and the following detailed objectives to achieve credible resolutions.
- To determine types of privacy data and their values.
- To identify and account for the value of one’s privacy.
- To outline the main positive reasons for protecting personal data.
- To identify the different ways of how one should use to overcome his information leakage.
- To define and illustrate how information technology will solve privacy issues.
- To find out the several impacts of information technology on the privacy of the individuals.
- To identify the effects of information technology on privacy and how they solve privacy concerns.
Aims and objectives of this research proposal are important mechanisms to be used to address the research problem. Additionally, the aims of this proposal will provide the knowledge and understanding of answering the research questions. Undeniably, aims to present clear links between the proposal and the motivation questions (Research-Methodology, n.d.). On the other hand, the objectives of this research proposal present defined research actions that structure the project. Clear objectives are likely to help address the research questions in the quest to fill the gap or find solutions to the problem statement.
The advancement in technology has adverse impacts on different individuals across the globe. Irrefutably, poor use of technology affects the social skills that are nurtured by the community. For instance, it has created a global network bringing people together which, in turn, replaces real life communication and ends in social isolation. Furthermore, the thinking abilities of the young generation are put into jeopardy because plagiarism and cheating have replaced analysis and critical thinking. Apart from physical effects and mental health, technology has a significant impact on privacy and security, especially when it comes to personal data. Descriptively, the misuse of technology exposes an individual to a number of risks. For example, online sex crimes take place on the internet, and such risky behaviors are likely exposed to teens. Cybercrimes are on the high rise because of the current use of the internet by a huge population, and since the borders of privacy are blurred, it is easier to find someone’s personal information and whereabouts. As a result, easy access to personal data and be used negatively by cheaters for hacking and viruses.
Moreover, there exist different issues related to information technology advancements and personal privacy and data resolutions. Such issues lead to one's privacy being accessed by others, and some data might be tempered with. The problems of technology privacy have become a major threat to personal information since it has created difficulties in keeping one's information secure and safe through mobile phones, internet at large as well as social media platforms. Also, privacy has failed to be maintained in technology. It is because most of the gadgets and devices used contain cameras which when one's knowledge for using them is not good, they might end up taking pictures without being keen with observing the sensors. Particularly, for the user to avoid leaking out his or her personal information one is supposed to be keen while handling the machines.
Technology has more advanced devices that requires steady, keen and technical know-how while operating them. Hence they do contain arrange of data generating sensors, such the GPS which is essential in location sensing. This might transmit personal information and data via a set of interconnected networks in the user's absence hence leading to information data leakage which could cause private and of personal security purposes. For those reasons, technology has a dark side, especially to the privacy and security of personal information. Therefore, this research proposal will seek to assess the effects of technology on the privacy of personal data and present recommendations on the same.
Information technology plays an important role in the people in the entire world, for example, data generation, processing and keeping it safe. This is done mostly by electronic machines connected to different social networks, such as mobile phones, computers, as well as the closed circuit televisions (CCTV). The devices have signals and sensors that facilitates secure data information processing.
According to Andersson, Dasi, Mudambi, & Pedersen, advancements in information technology has led to some positive changes in terms of one’s privacy being not easily accessed by second parties for security purposes. The mechanisms put up to achieve and control private issues are that the technology has to come up with new techniques of having systems developed that prevents ones privacy from being accessed. Even though internet platform serves many users, it still has its negativities. It has led to improvements in services among users such as mailing services and social networking. However, it has come with a challenge about user privacy concerns which emerges as users interact via online services, and such services may lead to other malpractices that are against user expectations, and this will result to the violation of user’s online privacy.
The designing of privacy-preserving systems such as brain-computer interface, cryptography, and holomorphic encryption allows data processors to process encrypted data. Thus, allowing both privacy protection and the useful aggregate of information. In particular, the cryptographic technique can process and search for personal data. Furthermore, the information technology advancements provide and reconstruct links to individuals to use sophisticated statistical methods Andersson et al. and a combination of many databases that contain personal information. Such a technique will help in making data unfeasible to be accessed easily.
Possibly, the design upon which research can be formulated is of three types and categories, qualitative, quantitative and mixed methods for research. This particular study has used qualitatively to collect relevant data. Purposively, the design is selected to facilitate the researcher with ease of time to accurately lookup and perfectly solve the concerns that have been raised under the heading of the research problem.
Besides, the qualitative research design analysis will allow the research of the project to collect and gather data appropriately in relation to elements that have been selected for the study. The collected data will provide the view broadly into the knowledge of information technology, data resolutions effects to privacy and what should be done to keep his or her privacy and personal data not affected by the technology and also the technology itself should invent systems that provide and protects privacy.
Types of Investigation
In this case, the descriptive data investigation type is used. This is because the research being undertaken requires some descriptions and seeks classification; it will be describing the technology and how does it affect ones privacy with respect to data resolutions. The research will be aiming at the important one's information and personal data being unfeasible to other parties and how technology has itself influenced this.
Data Collection Method
Data in this research will be collected by use of the secondary method of data collection. This method has to be used because the area of study under discussion requires deep and wide research for one to understand well the effects of technology on privacy and data resolutions. The data will be collected from journals, academic literature, internet sources, past research papers as well as research articles. The data collected will comprise of all information and technical know-how, in relation to information technology advancements and how does it affect one's privacy and what should be done to protect information leakages and how does the introduction of new systems that control privacy operates, to what extent is it effective.
The data collected will be analyzed after reviews are done by use of the content analysis since its suitable for analyzing qualitative data, for instance in our research about technology effects on privacy we employed qualitative research design. This approach of adopting content analysis will help in identifying the importance of technology, how it develops now and then, to what extent does it affect one's privacy and data resolutions. Moreover, the analysis will also narrowly obtain the main and the right way of minimizing the chances of one's personal and private data from being leaked and corrupted. Finally, what will be the positive things and advantages realized after one's privacy easily well protected and secured.
Technology has become like an extension to life for every “modern person,” and the fact that a mobile phone is kept at an arm’s reach is proof of this. There is also a certain addiction to social media such that a “like” in Facebook is capable of sending up adrenaline of emotions than a one on one compliment would achieve. Little can be done to evade technology, and a pintsize glitch on the internet is intolerable. In the course of using the technology, the devices used to know individuals more than close friends and even relatives. Any personal information requested by the devices maybe during registration of a new phone is kept on some database and can be retrieved when in need. Thus, the question about privacy arises, but there is a thin line drawn between upholding national security and maintaining an individual’s privacy. The discussion that follows police its thoughts around privacy and the measures that can be put in place so that there is privacy when using technology.
Solutions to Technology Privacy
China has also been involved when discussions about data privacy because of the surveillance techniques used in some provinces justifying the use as a means of controlling the population. The debate about privacy is not so much hot in the country because of its culture of communism as opposed to individualism in countries like the United States. Recently there has been an outcry by the Chinese of at least maintaining their personal data and some financial affiliates like Alibaba had to offer a public apology to its consumers for involving them in unconsented credit program. Providing internet privacy is not an easy task and lawyers have been in and out of courts because of the same. The Chinese can also come together to take a class action against the government. The legal play may work in the long run, but currently, there can be a little win for the citizens. The public can also take actions against privacy invasion like for companies like Google and Facebook. This creates a band for individuals who do not have the finances to take on big companies.
In modern times, every activity seems to be connected to technology, from communication to withdrawing money and buying groceries at the store. In the same sense, there has been an emergence of the issue of implanting microchips for more convenience so that the Radio Frequency Identification Technology found in the phones can be located on the hand. Just like there are computer hackers so malware can be transmitted using the microchip. Instead of the usual worry about treating an illness like malaria, there is more worry about a computer virus. The solution can be providing state-the-art technology that is encrypted to protect passwords and information from hackers. The community can also come together to expose the cons related to the use of the microchips because they can pose serious health issues for individuals.
There are also widespread cases of privacy invasion by Google and Facebook. The step that can be taken for this case is forcing the government to step in and impose privacy policies on the companies. The government has the power to create a protection clause for the consumers and execute fines for companies that do not uphold the law on privacy as well as making people aware of the issues and rights of privacy. Not much can change in China because the government is involved in attaining the information, but there can be private commissions that can force the government to yield to the citizens’ outcry.
Additionally, individuals should put a value on personal information by choosing companies that guarantee privacy. Companies should, in turn, view this as an economic advantage because they avoid legal issues that may arise when they share private information. The problem is that many online companies like Facebook and iTunes are monopolies with a firm grip on their consumers and changing them can cause some inconveniences.