Privacy And Anonymity And Information Network Technologies


We might assume that nothing new could be said about the issue of
privacy behond the basic notion that it is something secluded from the
inclusion of others, a virtue and right that every citizen of a
democratic society might possess. However, if that were actually the
case then we would not see our culture involved in debates about the
issues regarding privacy and anonymity as they relate to new information
technologies.
The primary reason for such concerns is that information has become a
commodity in what we have come to know as the 'information age'. With
the advent of new technologies; particularly that of the Internet this
information can be sold and exchanged quite easily. ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

privacy
to beocme seriously jeopardized by new information technologies.

Richard A. Spinello, has defined two distinct phases to the systematic
erosion of information privacy. The first he calls the 'data base
phase'. The emergence of sophisticatd data base technology in the early
eighties made it possible to store and retrieve large amounts of
information efficiently and economically. During this time,
considerable amounts of personal data were transfered to computerized
records, which have been stored on record. Another implicator in the
invasion of privacy has been what is described as a 'network phase', in
which many individuals and organizations are relying heavily on digital
networks such as the Internet to help conduct their personal business.
The Internet specifically has facilitated the integration of different
databases and allowed data to become completely mobile, and easily
retreived by anyone. The use of such networks has expanded ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

background etc.), and the right to limit the
accessibility of information known about oneself". In the context of
information technologies and specificallly the Internet; accessiblity
and use of such technologies can violate and inhibit our personal
privacy. Our private information may be violated because our personal
data may be acquired by individual without permission; when this occurs
according to Spinello, such a person may use it to excercise control
over a person's activities. For example; companies with detailed
knowledge of an individual's purchasing habits may subject them to
manipulative promotions, while a prospective employer may gather
sensitive information ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Privacy And Anonymity And Information Network Technologies. (2006, January 14). Retrieved March 30, 2020, from http://www.essayworld.com/essays/Privacy-And-Anonymity-Information-Network-Technologies/39597
"Privacy And Anonymity And Information Network Technologies." Essayworld.com. Essayworld.com, 14 Jan. 2006. Web. 30 Mar. 2020. <http://www.essayworld.com/essays/Privacy-And-Anonymity-Information-Network-Technologies/39597>
"Privacy And Anonymity And Information Network Technologies." Essayworld.com. January 14, 2006. Accessed March 30, 2020. http://www.essayworld.com/essays/Privacy-And-Anonymity-Information-Network-Technologies/39597.
"Privacy And Anonymity And Information Network Technologies." Essayworld.com. January 14, 2006. Accessed March 30, 2020. http://www.essayworld.com/essays/Privacy-And-Anonymity-Information-Network-Technologies/39597.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 1/14/2006 07:19:26 AM
Category: Technology
Type: Free Paper
Words: 1692
Pages: 7

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
Money And Information
Money And Information
Privacy And The Internet
Cisc And Risc Processor Technol...
Electronic Netwoks Of Practice
A Review Of Huxley's Brave New ...
Impact of Tourism
COMPUTER CRIME Hackers And Secu...
The Internet And Its Effects An...
Questions Of Ethics In Computer...
Copyright | Cancel | Contact Us

Copyright © 2020 Essayworld. All rights reserved