Tuesday, August 13, 2019

Privacy and surveillance in the Information Age Essay

Privacy and surveillance in the Information Age - Essay Example According to Nissenbaum (1998, p.4), information technology has not only affected communication, but has actually led to a need to redefine privacy. With increasing surveillance and information recording, personal privacy is taking a new direction. According to Nock (1993) the cost of surveillance is personal privacy and the American public has to trade between privacy and security. The biggest turn in information technology came at about the mid of 20th century with the invention of the electronic computer. As soon as the computer was invented, it was used by governments and large corporations for information capture, storage and analysis. Information technology did not only help in increasing the way information is captured and stored, but also in the way the same information can be analyzed as well as manipulated (Hughes, 2004, p.78). As a result, the role of the government and private corporations can in safeguarding information has increased and has also taken a new course. Information stored in computes is easier to disseminate and can be accessed from remote access points. This leads to the risk of losing this information to hackers and this can lead to private information being disseminated by unauthorized personnel. Information and communication technology has changed the way people communicate and carry out their daily social, political and economic activities. With the arrival of computers and the internet, communication has always increased, and people are today better able to communicate. Business transactions have taken a new route as private firms can now easily capture, analyze and disseminate different formats of communication and information. A good example of this is the US based international retail giant Wal-Mart. Wal-Mart has been able to develop a system based in computers and wide area network that is able to capture information from all the retail stores and then sending this information to a central database where the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.