Online Learning
CLICK HERE TO ORDER YOUR ASSIGNMENT

Invasion of Privacy and the Potential Abuse

Invasion of Privacy and the Potential Abuse In the world of today, invasion of privacy has reached new levels. This is because it has affected the world of IT and computing like never before. This is one of the main reasons why people view the phenomenon of IT as a potentially disadvantageous one – one that can mar the very basis of success and harmony within the related ranks. Invasion of privacy has become a huge problem because it creates rifts among the people who are directly involved with the use of sensitive data and information, as they believe that their rights have been transgressed upon and such violations usually mean that they would have to find new ways to protect themselves. The individuals who are responsible for breaking into private data, and information are by and large the ones who have some ulterior motives. Thus, they want to acquire a larger share of the data to make sure that they can achieve their end objectives. It is important that invasion of privacy is tackled in a proper manner because it affects the world of IT directly and makes the entire discussion on privacy a much heated one. Much research has taken place which discusses this factor in the recent past and even in times like today. Moving ahead with the discussion at hand, the abuse is immense, and more so when one is trying to understand the regions related with growth and development of the Information Technology realms. Neither any individual nor any organization appreciates the idea of potential abuse happening within their fore. This is indicative of its approach to do things right, and that too in a manner which will be individually and organizationally sound. An example related with invasion of privacy is that of an organization which has done tremendously well to conceal its data from intruders and has thus implemented state of the art systems to counter virus attacks from left, right and center. However, when this organization is unable to come to terms with the attacks which are more sophisticated than its own methodological frameworks, then this would mean that the organization is losing out on its security front. There would be immense wastage in terms of its funds that have been allocated for the sake of building security so that data could be hid and unwanted people do not gain access to sensitive data1. This wastage is in terms of money. Thus this example is a clear cut indication of how companies have been able to undergo serious issues at hands of hackers and malicious attackers from time to time. Therefore how individual data is gathered, analyzed and commercially used is something of a point to ponder in this day and age2. There are reasons available to suggest that such data can have long lasting consequences and ramifications for the people in different organizations of the world. As a real world example, the Enron scandal highlighted where things went wrong and how technology played its negative part. Even though it was a whistle-blowing exercise, the end results depended a great deal on the use of technology. Enron scandal highlighted quite a lot about how invasion of private data meant serious trouble for the organizations worldwide. This brings to mind that the potential for future abuse does exist and that too without any quantifiable limits. This is because privacy can lead to disastrous results which would mean immense disharmony within the related ranks, and dissemination of private data towards such ranks which will mean more negativity to creep in within the Information Technology and computing realms. The future looks all the more bleak because it embodies the basis of protecting data that is important yet has long lasting effects on the people’s relationship with their processes as well as the people around them. Therefore it would not be wrong to suggest that much success can be achieved from the fact if a proper philosophy of protecting data and getting it off the invasion ranks is concerned3. This obviously could be done through proper regulation and monitoring of data security. This is so because the idea of having data invaded by forces which come up from different sides is never acknowledged in the real sense. In the end, it would be sound to state that the potential for future abuse of this data is highly dependent on how people decipher and protect data that has been assembled, gathered, analyzed and commercially made available. Bibliography Allmer, Thomas. A critical contribution to theoretical foundations of privacy studies. Journal of Information, Communication and Ethics in Society, 9(2), 2011 Dumas, Lloyd. When Costs Approach Infinity: Microeconomic Theory, Security, and Dangerous Technologies. Contributions to Conflict Management, Peace Economics and Development, 16, 2011 Piggin, Richard. Lessons learned in automation security? Assembly Automation, 31(2), 2011 Watters, Paul A. A methodology for analyzing the credential marketplace. Journal of Money Laundering Control, 14(1), 2011 Zimerman, Martin. The dangers of malware in a library computing environment. The Electronic Library, 29(1), 2011

Invasion of Privacy and the Potential Abuse