We can work on Privacy in The Digital Age

Name:

Tutor:

Course:

Date:

Privacy in The Digital Age

Introduction

Nothing is challenging nowadays than the notion of privacy with today’s technological advancements. From CCTV surveillance to cybersecurity challenges, no one is leading a private life. Celebrities are followed by stalkers while CCTV surveillance will tell the café you had breakfast. Hyper-connectivity through social media: Twitter, Facebook, WhatsApp, Snapchat, use of global positioning systemby cybercriminals security agencies lead us to the million-dollar question, are our lives known by us and those we only trust? This paper will discuss the concept of privacy, how we can protect ourselves and the resources put in place to ensure privacy.

Social media sites are irresistible because of the lure by family members or friends. Reading, browsing, nosing, stalking and comparing is an impulsive and instinctive tendency. Internet scams and spam messages have become a common thing on social platforms and emails because of computer viruses and hacking. Staying online exposes an individual to cybercriminals who intimidate, embarrass and scam people in a bid to get what they want.Cybercriminals use the internet to scam people through social security numbers, credit cards or using some information from social sites for blackmail. Through surveillance, criminals have obtained information about many people. Hacking exposes people and businesses’ confidential information. The breaches compromise the privacy of the affected individuals. Therefore, we can say that no one is safe today asan individual’s privacy can be breached by cybercriminals who have information of their whereabouts.

To protect your privacy online, it is crucial to be aware of cybercriminals existence, the methods use and learn to navigate the internet cautiously by using secure websites like cookies enabled browsers (Miyazaki, 20). Protection can be through using unique passwords for personal accounts and devices, use of password managers like LastPass to store your passwords and generate new ones if you have difficulties memorizing your passwords, and using random passwords. When using services offered by Google, Twitter, Facebook and Tumblr, use a two-step verification to prevent third parties from accessing your accounts. Always update your software because updates enhance security protocols and prevent hackers from obtaining your information due to familiarity with loopholes in the initial software versions. Put more than 8-digit pins on your devices to prevent individuals from guessing the password when the gadgets accessed by people with malicious intentions. Enable full-disk encryption when a computer is switched off. In case your devices are stolen, encryption and passwords make it harder to access personal information minimizing identity theft cases (Miyazaki, 20). Encryption also ensures financial transactions are secure. Security suites like blocking malicious people and using MacAfee virus protection, Ad-aware, AVG and Internet Security and much more to protect computers against viruses, spyware and malware (Privacy Technical Assistance Center, 3). Businesses can use key-loggers, password protected routers, virtual protected networks and hiding personal information.

Privacy is essential in daily lives in many unconsidered ways. Technology offers solutions to privacy problems with antiviruses, firewalls and many other security features. After analyzing your online activities, install antivirus on devices to protect them from Trojans, worms, spyware and viruses. When the devices are protected, use virtually protected networks to complement the antivirus to prevent snoopers and hackers from accessing personal information. Citing Alessandro, John & Loewenstein (251), always follow security protocols to lock out cybercriminals from phishing and manipulating you to fulfil their interests. When shopping on online platforms or when making online payments, ensure the sites are secure and credit cards used are protected. Privacy Technical Assistance Center (7), resources to be used can be obtained in the form of or from network security systems mechanisms, perimeter security mechanisms, configuration management policy and personally identifiable information.

In conclusion, individual privacy is important, and it is imperative that it is not breached at all. People should live comfortably lives free of snoopers and other cybercriminals to who obtain information to extort, humiliate or intimidate some people or businesses. It is necessary to acknowledge cybercriminals exist, the methodologies they use and how to avoid cyber-attacks, phishing and any form of privacy infringement.

Works Cited

Alessandro, A., John, K., & Loewenstein, G. (2013). What is privacy worth? Journal of Legal Studies, 42(2):249-274.

Miyazaki, A. (2008). Online privacy and the disclosure of cookie use: effects on consumer trust and anticipated patronage. Journal of Public Policy and Marketing, 27(1):19-33.

Privacy Technical Assistance Center. (2010). Data security: top threats to data protection.

This entry was posted on January 25, 2018 at 12:07 pm and is filed under Uncategorized. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.

Is this question part of your Assignment?

We can help

Our aim is to help you get A+ grades on your Coursework.

We handle assignments in a multiplicity of subject areas including Admission Essays, General Essays, Case Studies, Coursework, Dissertations, Editing, Research Papers, and Research proposals

Header Button Label: Get Started NowGet Started Header Button Label: View writing samplesView writing samples