Discuss about the IT Profession and Ethics for Future of Privacy.
The word privacy means being in a place or in a situation that allows to do things preventing other people to see or to disturb. Privacy includes the right to be alone and free from all the interference and problems (Pelekis & Theodoridis, 2014). The information privacy includes right to have control over the personal data or information that are generally collected or are used.
Privacy includes right to be free from secret surveillance and then determine when, how and whom to reveal the personal information or information of organization. In general, the privacy is divided into four categories known as physical privacy that implies other’s restriction to access the data or situation through human senses; second is the information privacy that implies restriction on revealing the facts, which are unknown to others. The third privacy includes decisional privacy that implies restriction on interfering the decisions taken by an entity. The last privacy act is the dispositional privacy implying restriction about the attempts to know the state of a particular person. Overall, privacy is a practice to keep things or situation secret from others.
Using of digital technologies including mobile phones, internet basically provide new opportunities in development sector about how to plan and ho to co-ordinate the activities, mobilize, expose secret truths, as well as engage new audiences (Ferrell, 2017). But using of new technologies involves many risks in them as well.
There is a right to privacy for all the users involved in digital media. Digital media involves concern for the users as personal information that are not permitted, gathered from the on-line activities of users and from releases of information that are not permitted to any third party user.
Digital privacy includes the fact that uses digital mediums for conducting affairs to find out is the data is personal or is professional and leaves behind digital footprints. The users who uses internet does not understands the information that are dealing and the does not have the usage habits of internet are stored or logged in (Zhang et al., 2015). The internet protocol address of the computer of a user can be traced easily to specific user all the websites viewing habits of the user can be tracked and monitored. The information that includes data as well as time of the research, what websites the users have accessed and the time he has taken to view the website are stored on the search engine of the server. The servers usually varies the length of time for which the information is stored before deleting them. Digital privacy includes to keep all such information related to search of the user safely from other unauthorized user.
The digital privacy in increasing at an alarming rate in Australia as reported by the Australian Privacy advocate warn. The concern about data privacy comes in Australia with the General Department of Attorney for accessing the personal telecommunication metadata of the people of Australia in civil proceeding (Bertino, 2015). The internet service provider of Australia started blocking of accessing the sites that generally hosts the illegal torrents and the streaming service and blocking the regime proved fallible. This is a threat to the online pirates.
The privacy in Australia reviews privacy issues that are generally associated with new regime is now needed so that the systematic storage of those massive amount that helps to identify the information that leaves the exposed privacy of the individual (Spelman et al., 2015). The living of people without the phone or computer is not possible. The privacy act in Australia allows the citizens for accessing and correcting their own metadata is the person is interested to do so.
There are many threats that are associated with the privacy threat in digitization world. The threats are discussed below:
Internet of Things are considered as an enemy of privacy for many reason. Hacking the details of thousands of customers who are connected to the internet devices is mostly a new approach for accessing the personal details of a user. In cyber-attack, devices that are connected to internet includes DVRs, cameras and appliances are all device of Internet of Things and are prone to data privacy. These goods are prone to data breach security and have becomes weapons for the attackers to get the details of the users.
The security of Internet of Things has become smart, and the devices are connected to the internet that is immune to data breach (Perera et al., 2015). The security of data is a main concern of any IoT devices that are used by the humans for their operations. All the Internet of Things are connected to the internet and are prone to data breach.
Most of the cyber criminals targets the company for accessing the Social Security Numbers, date-of-births, and other personal details of the users that are connected to the Internet of Things. Home networks are also connected to many Internet of Things devices and the risks for the home Internet of Things are only limited to an individual. So, for security issues, the Internet of Things are considered to be an enemy of data privacy.
Privacy is considered to be an important and trending topic in current world of digitization (Xu et al., 2014). It is expected that in next five years, the amount of data will rise to about four times the data that is used though the sensors of wearables, in streets, in air and in everywhere than is in the present days. The data that are stored in mobiles, web and social will also expand in coming the coming years. With the increasing rate of data, it is expected that data privacy will become a great challenge to handle by 2050.
The matters that are related with the security and privacy of all personal data will become worse in the year 2025 than they are in the present time. People will have little power on their personal details by 2050, but there will be more awareness available with the data security in the coming years.
By 2050, the data that are considered to be personal today will not be so in the coming years (Terzi, Terzi & Sagiroglu, 2015). The issues, information, and behaviors of the data change in the coming years. The information in the coming years will become more pervasive, more liquid than of today, as well as portable in 2050. In the coming years, the digital public sphere and the digital private sphere are expected to overlap.
Some of the solutions for privacy are listed below regarding the Internet of Things.
1) Creating strong passwords for the software and hardware of Internet of Things
The devices of Internet of Things includes simple passwords that are easy to remember. But, simple passwords are prone to data breach that may invade the products of Internet of Things.
To mitigate this strong passwords are to be created in all the devices of Internet of Things for the purpose of security as well as privacy.
2) Installing the security patches and update the system when available
It is very important to install the patches that are available and the systems for the Internet of Things are to be updated from time to time for making the system more secure (Yu et al., 2017).
3) Purchasing the products from a Trusted Resource
All the devices of IoT should be purchases from a trusted resource for securing the home being hacked from malicious people.
References
Bertino, E. (2015), June. Big data-security and privacy. In Big Data (BigData Congress), 2015 IEEE International Congress on (pp. 757-761). IEEE.
Cuzzocrea, A. (2014), November. Privacy and security of big data: current challenges and future research perspectives. In Proceedings of the First International Workshop on Privacy and Secuirty of Big Data (pp. 45-47). ACM.
Fernandez, A. & Alexander, K.M. (2016). Data Privacy and Confidentiality. iURBAN: Intelligent Urban Energy Tool, p.35.
Ferrell, O.C. (2017). Broadening marketing’s contribution to data privacy. Journal of the Academy of Marketing Science, 45(2), pp.160-163.
Kellogg, S. (2016). Every breath you take: Data privacy and your wearable fitness device. J. Mo. B., 72, p.76.
Pelekis, N. & Theodoridis, Y. (2014). Privacy-Aware Mobility Data Exploration. In Mobility Data Management and Exploration (pp. 169-185). Springer, New York, NY.
Perera, C., Ranjan, R., Wang, L., Khan, S.U. & Zomaya, A.Y. (2015). Big data privacy in the internet of things era. IT Professional, 17(3), pp.32-39.
Spelman, T., Wood, D., Whittaker, R. & Kubiak, M. (2015). Functional Data Privacy Algorithms for User Based Insurance.
Terzi, D.S., Terzi, R. & Sagiroglu, S. (2015), December. A survey on security and privacy issues in big data. In Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference for (pp. 202-207). IEEE.
Xu, L., Jiang, C., Wang, J., Yuan, J. & Ren, Y. (2014). Information security in big data: privacy and data mining. IEEE Access, 2, pp.1149-1176.
Yu, Y., Au, M.H., Ateniese, G., Huang, X., Susilo, W., Dai, Y. & Min, G. (2017). Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security, 12(4), pp.767-778.
Zhang, X., Dou, W., Pei, J., Nepal, S., Yang, C., Liu, C. & Chen, J. (2015). Proximity-aware local-recoding anonymization with mapreduce for scalable big data privacy preservation in cloud. IEEE transactions on computers, 64(8), pp.2293-2307.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download