Order For Custom Writing, Similar Answers & Assignment Help Services

Fill the order form details in 3 easy steps - paper's instructions guide.

Posted: June 9th, 2022

Privacy and ethics

Privacy and ethics

Introduction
The introduction of the internet in the recent past has seen the development of better social connection between people or different backgrounds as well as the increased rate of knowledge sharing between diverse points. However, many negative issues have also been witnessed in the internet including the sharing of conspiracies, child abuse, and sharing information of harmful materials such as weapons and drugs (Buchmann, 2014). In addition, the privacy of the user has been an issue over the past as some internet sites, unregistered mobile phones, and questionable social media platforms have the access to the confidential information of the user. As a result, the ethical line that exists between the data that can be monitored by the internet service providers and the network security has been developed as an ethical way of ensuring the clients’ data is not manipulated (Buchmann, 2014). In this essay, we shall cover four parts including the issue of internet privacy, what issues still exist, any actions done to curb such issues, and my personal recommendations for a better alternative.
Internet privacy/ethical issues
In our current world, the most disturbing issue in the internet is the privacy of the users’ data as well as the content that he or she sends or receives through it. It is majorly known that many things can be done today by simply using a device that can access internet by the user and perform various actions. For example, many people have started working from the comfort of their homes by simply using the internet to connect to their clients as well as performing the work needed in their offices. Secondly, many people today use the internet to order various things as well as doing their shopping there far from the stores. In addition, many people today communicate through the use of emails and other social applications on the daily basis (Zimmer & Kinder-Kurlanda, 2017).
However, their privacy is still a concern as some of their data is accessible to various parties. To begin with, many advertisers manipulate the data that the user accesses or sends over a long period of time so as to deliver their personalized advertisements. This is one big issue that many clients have been addressing in the giant social network, the Facebook. In this social medium, many people interact with various things and other people and, after a while, they usually see advertisements directed to them based on what they searched or shared. The same happens with Google searches and data sharing (Buchmann, 2014). Secondly, the FBI has been questioned as to why they have the access to the emails send by various persons. In these actions, the FBI tends to acquire the email headers, the site a person visits, and/or the people he/she has contacts with. If a person is suspected to be a drug dealer and/or a terrorist, the FBI is known to have the jurisdiction of acquiring all the servers that the person accesses, the people with whom he or she interacts with, and the message titles but not the content (Zimmer, & Kinder-Kurlanda, 2017). Thirdly, the issue of government monitoring the data that its citizens access and send has been an issue as well. Just as the FBI, the government may decide to regulate what the users can access as well as the content they can share. In various social media including Facebook, Twitter, Instagram, and LinkedIn among others, the content that a person can share may leads to his account being terminated or standing a chance of being arrested (Buchmann, 2014). For example, if a person shares some information that is disturbing or abuses the government’s officials, he/she may be arrested. Finally, retailers are known to manipulate the data and information the users send or access in their servers for marketing opinions. For example, shopping in Alibaba or Amazon may seem fun until a person starts getting recommendations of what he or she may find interesting to buy (Zimmer, & Kinder-Kurlanda, 2017). These actions simply mean that the users data was accessed and evaluated based on what the user had interests in.

Why the issue exists
Despite having information of the above users’ data access and breaching by different persons including retailers, advertisers, police, and the government, the privacy concern of the users is still a mess. There are various reasons why these actions have not yet been settled. To begin with, most terrorists are known to be targeting various countries as well as sharing shocking news or content over the internet as well as physically (Buchmann, 2014). As a result, the government and the police have always been in the run to find the hidings of these terrorists as well as drug traffickers so as to keep the nation safe. As a result, the internet service providers and social media personalities do not have an option rather than complying with the requirements. In addition, the advertisers and retailers have the access to the users’ data for the sole purpose of boosting sales rather than abusing the information (Buchmann, 2014). Thus, the issue of data use by these advertisers and retailers may never have an end in any time soon.
What is being done to address the issues?
Despite the access to the data by various persons, there have been ways and methods laid down so as to protect the data send and received by the users over the internet. For example, a line has been established that prevents various persons from breaching the confidentiality of the data. For example, the government and the police may access a person’s email but they are not allowed to view its contents but rather just the heading only. In addition, the marketers arerequired never to share their users’data with any third party as it may breach the data protection requirements. In addition, various methods have been introduced that limit such an access including the Tor web browser that hides the IP addresses of the users in web surfing and the use of virtual private networks for improved security of one’s send or accessed data. Finally, other protection measures have introduced such as internet protection from malware and hackers through the use of antivirus software such as Kaspersky Antivirus.
What you think should be done to address the issue
In my personal opinion, the users should consider using the Norton Safe Web (NSW) in the daily internet access so as to realize the malicious internet sites and malware that may access their data. Through such an action, the privacy issues may be restricted including restriction to malware, network vulnerabilities, and phishing activities. In addition, users must use registered and trusted email hosts including Yahoo and Google among others when they are sending their emails. Other unknown providers may simply be scammers looking for people to manipulate for personal reasons.

Reference
Buchmann, J. (2014). Internet Privacy: Options for adequate realisation. Berlin, Germany: Springer Science & Business Media.
Zimmer, M., & Kinder-Kurlanda, K. (2017).Internet research ethics for the social age: New challenges, cases, and context.Peter Lang International Academic Publishers.

Order | Check Discount

Tags: best custom paper writing service, best online paper writing service, best paper writing service, best research paper writing services, cheap research paper writing service

Assignment Help For You!

Special Offer! Get 15-30% Off on Each Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the most qualified writers are selected to be a part of our research and editorial team, with each possessing specialized knowledge in specific subjects and a background in academic writing.

Affordable Prices

Our prices strike the perfect balance between affordability and quality. We offer student-friendly rates that are competitive within the industry, without compromising on our high writing service standards.

100% Plagiarism-Free

No AI/chatgpt use. We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you decide to place an order with Nursing.StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much guidelines - instruction details as possible.

Assignment of Writer

We assess your order and pair it with a skilled writer who possesses the specific qualifications for that subject. They then start the research/writing from scratch.

Order in Progress and Delivery

You and the assigned expert writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also review testimonials from other clients, from where you can select your preferred professional writer to assist with your homework assignments.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00