StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Privacy in Computer Science - Essay Example

Cite this document
Summary
The author of the current paper "Privacy in Computer Science" states that security is a very critical component of data integrity. Information is very important and as of now, it rates as the most valuable commodity, so to speak (DeCew, 2012)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful

Extract of sample "Privacy in Computer Science"

Running Head: PRIVACY POLICY Student Name: Student Number: Course Code: Instructor: 5th May, 2013. Privacy, in conventional terms, is the keeping of some important thing in seclusion and from unwanted contact. In essence, it is the keeping of important property in a place where it may not be located by particular people. In computer science, privacy refers to the availing of data only to those deemed as authorised through security features afforded through various means like passwords, applications and so on. In doing so, one can control the content they feel foreign parties shouldn’t be allowed to have access to. Consequently, they are able to avoid the consequences of not securing their data. Security is a very critical component of data integrity. Information is very important and as of now, it rates as the most valuable commodity, so to speak (DeCew, 2012). In various applications and technologies, one’s location is used in gaining knowledge about them and in particular, their culture or lifestyle. For instance, when the government and private parties like advertising companies get information on one’s location, they use it to their advantage in generating data and consequently, income. This is so because with information on people’s locations, various trends could be developed so that this data is used in stochastic predictions. For some time, the issue on whether such information should be availed to second parties with or without express permission has generated much heat. Personal information may bring harm to the owner when in the wrong hands. In this respect, most companies that offer services which may require the use of personal data offer their clients ways of managing such information in such a manner that no third party may access it. There are laws that stipulate the conditions under which a government may need to access certain data on an individual. For the most part, even the government needs authority from courts to access information on an individual from a third party like a company. The safeguards placed to protect information vary from one entity to another. Surveillance cameras, passwords, applications, GPS, data encryption in websites and so on are a few ways of enhancing privacy (Mueller, 2013). Keeping one’s location private is consistent with trying to remain anonymous in one’s operations as concerns their physical position. This mostly applies when one is trying to move around in real life, or when one accesses the internet when using some of its resources like social networking sites and so on. Social networking sites like Facebook, Twitter, Google – Google+, YouTube, Blogger, Yahoo and many other social sites have provisions for one to indicate where they are at specific times, especially when they are up to something. For instance, when one updates their status indicating that they are engaged in some activity, say meeting friends, they could as well tag a location where the event is taking place. This may not be very safe as someone known to them could be up to mischief without their knowledge e.g. friends with ill intentions may be tempted to steal from you. Apart from applications, mobile devices may also track one’s locations. Currently, smart phones may come with internally fitted GPSs. Sometime ago, it was usual to find vehicles or animals fitted with GPSs to track their positions for surveillance and to ensure they are not stolen. Citizens who are out on parole may also be fitted with GPSs and monitored electronically so that they do not breach a certain area they are allowed to operate within during their remaining sentences. RFID devices are made such that they utilize radio waves in remitting data on a particular identity, usually allocated a number. A tag which contains this identity number is attached to an object and when accessed using a reader, it gives out data on the object. This technology is fast gaining acceptance across industries. For instance, the various industries that would like to use smart-card technology utilize this particular technology. It has even replaced the GPS on animal-trackers. Further uses include tracking athletes’ progress in long distance events and finally taking stock of goods in supply stores where they come in handy for tracking inventory. It helps in tracking shoplifters who do not pass through cashier points where the RFID may be deactivated after making payments (Committee on RFID, 2004) Mike Elgan argues that many mobile phone manufacturing companies are taking advantage of their innocent customers. He alleges that they utilize personal and location data in trying to further their interests. Such interests as trying to map out traffic using data from mobile phone applications like GPS, and giving out personal data to advertising companies have been identified severally as factors that may be akin to taking advantage of customers while making profits using this information. It is his contention that should these companies be forced to use customers’ data and location in this way, and then permission should be sought through the correct channels. He feels that a consumer should be given an option to choose whether they may allow any third party to use their information or not (Elgan, 2011). I fully agree with him. First off, the kind of data that may be shared with parties that are irrelevant to a consumer should be regulated. For instance, advertisers should not source for data from mobile phone manufacturers and application developers, but rather find it through other means like the right government records. If they need to develop data on lifestyles, I’d rather they used web 2.0 technologies to get firsthand information from consumers themselves. It would be proper to not make it easy for any entity to access data that may be important to one as unscrupulous companies may use such an opportunity in a bad way. Institutions that may be allowed to source for such data can only be limited to those like hospitals, which may use it in important studies. Examples abound of when different entities have accessed personal information from prominent personalities’ mobile phones: The hacking scandal which exposed several media houses in the UK suffices just fine as an example here. It goes a long way to show how data may be used irresponsible when obtained without the express permission of its owners. In the scandal, several newspaper companies were involved in the hacking of personal voicemails of certain prominent individuals. This is not an example of mobile phone company passing information to third parties, but is an example of how personal data may be misused. The Boston Marathon bombers were arrested within a short period, courtesy their social network photos and other stuff they might have posted about themselves on social media. This case is a significant example of why data on an individual should only be accessed by specific authorities, but not just any entity out there. In being allowed that advantage of being able to access such personal information, the state should equally go through a thorough procedure that will ensure the data is only used up to and including only the times when it is very necessary. In as much as there is still no clear-cut legislation governing the distribution of personal data by mobile telephone companies and service providers, there are preparations in the US and the wider EU region to enact laws that will compel these companies to regulate how much information they may give to third parties. In the US alone, the strong case compelling these companies to regulate data emanated from Apple and Google’s treatment of their consumers’ information on location and such. While it appears that they are capable of locating customers’ positions via several means, their knack to hand over the data to third parties may have been responsible for the summoning of their executives to explain themselves to a Senate Judiciary Subcommittee on Privacy, Technology, and the Law (Pepitone, 2011). The case holds a lot of water since apart from using such data to improve their network and services like they are wont to, particular applications were found to render important data to their developers, thereby infringing on what the consumers thought was their right to privacy. The importance of privacy cannot be gainsaid. It would be prudent to regulate what companies use in form of data, the nature of policing notwithstanding. Of course it is okay to hand over data to authorities when need arises, especially on matters that may affect the security status of a country. However as mentioned before, the right authorities may also gain such access only through the allowed channels like court orders. There are five main types of surveillance: individual, government, commercial, workplace and surveillance in public places. All these types of surveillance may in one way or another may infringe on one’s right to privacy. However, the most obvious case where location privacy is breached by a company may be found in the case where commercial profiling by Experian North America ended in them claiming to have data on nearly 98% of households America. The extent to which InSource, a constituent of Experian North America went to gain information on nearly 235million Americans cannot be sufficiently explained. Threats posed by cookies on websites include obtaining one’s information through servers. The information generated from such may be so much without one’s knowledge. The Terrorism Information Awareness and the Global Surveillance Network are examples of how the government may source for information from the public. However, the former has generated such controversy as to make the US Senate drag its feet in allocating funds for its exploits. Such examples may serve to show how much information can be gotten from the public. However, there is justification for it, so long as it doesn’t end up in the wrong hands, or does not lead to control of the public. The point at which we encounter controversies comes about as a result of specific government selling such data to foreign institutions. For example, when a US genetic research company was able to purchase data on the DNA of certain set of people from Iceland. Aggregation of data explains the concept where a sizeable amount of data is gathered then compiled in a compressed or a summary form. In data aggregation, a generally large amount of data is formatted in such a manner that the summary makes more sense to those interested in it. While such data is important in purchases through use of credit cards and mobile telephony, the data generated may be used to locate points at which one made purchases or where one was when making a phone call. This is critical, even to police, in developing a sequence of locations visited by an individual. Data aggregation results in several privacy issues. Data gathered by social sites and aggregated to form the general perception about an individual may lead to ethical issues. For instance, when profiling individuals belonging to minority groups, this may expose them to ridicule and consequently prejudice. Therefore, their individual rights to exist in peace are threatened. This ends up leading to breach of privacy. Several other aspects of one’s life may be exposed to the public and lead to them losing privacy. Privacy policies embraced by social networks and other entities may have little impact since their promise to uphold an anonymous use of aggregated data is not guaranteed. In fact, social sites like Google have had to face law suits even with carious adjustments to their privacy policies. In conclusion, privacy may be defined as a situation where personal information or position in terms of location may only be controlled by those who are directly involved. Several issues arise when those entrusted with such information cannot maintain the integrity of the information. Cases have arisen where data on people are used to generate money or even rob them of their property. In extreme cases, people have fallen victims to serial killers who trace them using information posted on social sites or through aggregated data. While it may be okay for the government to use such data for security purposes, mobile phone companies and application developers may need to review their secret leaking of data to advertising firms, which in turn use the data to generate sales from developed trends. The issue of mobile telephone manufacturers and application developers using unsuspecting consumers’ data to better their services has generated much heat as to warrant the attention of the US Senate. Apple and Google have faced the Senate Judiciary Subcommittee on Privacy, Technology, and the Law and explain their activities with their clients’ data. Data aggregation may work negatively for people in minority groups as they may be profiled thus exposed to stigma associated with their lot. For instance, gay people have severally fallen victims to such incidents. References Committee on RFID. 2004. Radio Frequency Identification Technologies: A Workshop Summary. The National Academy Press. DeCew, J. (2012). Privacy. The Stanford Encyclopedia of Philosophy (Fall 2012 Edition) (Edward N. Zalta (ed.)). Retrieved at http://plato.stanford.edu/archives/fall2012/entries/privacy/ Elgan, M. 2011, Who Owns Your Location? ComputerWorld. Retrieved at http://www.computerworld.com/s/article/9216304/Who_owns_your_location_?taxonomyId=15&pageNumber=2 James, W., Herbert, L. & Lynette, M. (eds). 2007. “Intellectual Approaches and Conceptual Underpinnings” in Engaging Privacy and Information Technology in a Digital Age. National Research Council. McFarland, MSJ. 2012. Ethical Implications of Data Aggregation. Santa Clara University. Mueller, K. 2013. Professional Ethics for Computer Science. Computer Science Department, Stony Brook University. Pepitone, J. 2011. Apple and Google get Grilled on Privacy. CNNMoney. Retrieved at http://money.cnn.com/2011/05/10/technology/apps_privacy_hearing/index.htm Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Privacy in Computer Science Essay Example | Topics and Well Written Essays - 2000 words, n.d.)
Privacy in Computer Science Essay Example | Topics and Well Written Essays - 2000 words. https://studentshare.org/technology/2061854-privacy-location
(Privacy in Computer Science Essay Example | Topics and Well Written Essays - 2000 Words)
Privacy in Computer Science Essay Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/technology/2061854-privacy-location.
“Privacy in Computer Science Essay Example | Topics and Well Written Essays - 2000 Words”. https://studentshare.org/technology/2061854-privacy-location.
  • Cited: 0 times

CHECK THESE SAMPLES OF Privacy in Computer Science

The Future of Policing in America

The information contained in Electronic Crime Scene Investigation-A Guide for First Responders (available free of charge and downloadable from the Department of Justice) helps line cops solve crimes that are computer-related.... Step by step it explains the basic workings of the computer and provides the names of the various parts that make it work.... The book explains and identifies the various parts of the computer that should be identified by law enforcement as possible evidence of various electronic criminal acts....
4 Pages (1000 words) Assignment

Security Strengths and Weaknesses of the Internet

In the essay “Security Strengths and Weaknesses of the Internet” the author sought to provide the purposes behind implementing internet security measures.... They are to reduce the occurrence of risks and threats related to transfer of information over the internet.... hellip; The author suggests that Internet security has become one of the main concerns for every individual connected to the internet for any purpose....
6 Pages (1500 words) Essay

Computer crime

These are among the various and popular problems of lack of confidentiality and privacy in the computer users.... Digital evidence and computer crime: forensic science, computers and the Internet (2nd ed.... In this context, the computer might have been used to commit a crime or else be the target in the crime committed.... These crimes are committed using communication networks, which mostly are threats circulated in the computer crime computer crime A computer crime is any criminal act that is committed through the use of a computer of a network system....
1 Pages (250 words) Research Paper

Computer Crime Is Unlawful Activities

Digital Evidence and Computer Crime: Forensic science, Computers and the Internet.... The illegal access is geared towards damage creation, deletion or alteration of computer data.... computer crime has been on rise recently… Additionally, the rise of computer crime is attributed to inexistence of laws related to computer crime (Fisch & White, 1999). computer crime is not always associated with physical damage of property....
1 Pages (250 words) Essay

Law of digital evidence

Plain view exceptionLaw enforcers should always seize evidence in plain view a feature that remains impossible in computer searches given the soft copy nature of such files.... ?Digital Evidence and Computer Crime: Forensic science, Computers, and the Internet.... Burlington: Elsevier science, 2011.... computer searches vary from Law of digital evidence General warrant Searching a suspect's private belonging is illegal under the Fourth Amendment....
1 Pages (250 words) Essay

The Case of Stengart Analysis

Digital evidence and computer crime: forensic science, computers and the internet.... The right to privacy.... In Stengart's case, the Supreme Court and the appellate court disagreed, basing on some legal reasoning.... First, the appellate court stood with the argument that the policy followed by the trail court gave permission to an objective reader to come to a conclusion that not… The supreme court on the other hand determined that Loving Care's scope of documented policy was not at all clear, an ambiguity that was caused by the failure of the policy to precisely address private emails, the insufficient Stengart Stengart In Stengart's case, the Supreme Court and the appellate court disagreed, basing on some legal reasoning....
1 Pages (250 words) Assignment

Storge device of computer

ork citedIntroduction to computer science.... computer is a programmable electronic device that uses given a set of instructions in well-defined way and execute prerecorded instructions (a program).... Without a storage device, in the computer, the computer may not be able to save information or any settings hence would be portrayed a dumb terminal.... Likewise, a storage STORAGE DEVICE OF computer computer is a programmable electronic device that uses given a set of instructions in well-defined way and execute prerecorded instructions (a program)....
2 Pages (500 words) Essay

Computer Hacking as a New Social Crime

… The paper “computer Hacking as a New Social Crime That Has Caused More Concern in Both Governmental Agency and Private Sectors”  is a delightful variant of an essay on information technology.... The term hacking has become common after the advent of the computer error.... The paper “computer Hacking as a New Social Crime That Has Caused More Concern in Both Governmental Agency and Private Sectors”  is a delightful variant of an essay on information technology....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us