This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Summaries of the three articles on privacy and safety

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Summaries of the three articles on privacy and safety

Internet Privacy and Security: A Shared Responsibility by David Gorodyansky illustrates how the use of the internet has come with the responsibility that each individual should undertake. It has highlighted the effects of the use of the internet on individual privacy. Users of the phone are experiencing malware practices that arise from the intrusion of hackers how to use the information acquired in cybercrime activities (Gorodyansky par 3). Threats of cybercrimes are one of the concerns raised by the author in this article that affects our privacy. The report highlights how the use of the internet has become a threat to private information of individuals since the data has become prone to theft.

Initially, people relied heavily on the installation antivirus, in which they are still prone to hackers since the focus has shifted to the cloud. Similarly, the article highlights how mess caused by the use of the internet on privacy should be a collective responsibility in addressing it. Therefore, the author enlightens the public in need to take personal responsibility in protecting their privacy (Kanté 51). He urges all people to find the need to engage in the debate of their privacy since it no longer government initiative but rather individual responsibility.

Don't use plagiarised sources.Get your custom essay just from $11/page

The main idea or thesis of this article revolves around how the use of internet has influenced an increase in cybercrimes, in which individual data is at risk. It details the needs of individuals taking the responsibilities of their privacy rather than relying on the use of antivirus, which has also been violated. For example, the articles highlight how personal data is no longer a case to do with the installation of antivirus, but personal responsibility (Gorodyansky 8). There is a need for every one of coming out strongly in taking action to protect the vital personal data from being used by cybercriminals.

Why Security and Privacy Matter in a Digital World by Ron Ross, discusses the core effects of an information technology revolution on the privacy of personal data.  It is evident in every aspect of life undertaken by individuals in the use of media, phone, and internet platforms all point on how unsafe it is in the digital world (Ross par 1). Things are changing daily where there is also an increase in the case of cybercrimes, breaching into personal data that the author of this article points on how unsafe it is in this the digital world.

Largely, there is all indication revolution of information technology on the privacy matter of an individual. It is, therefore, the fact that no one will want to be left behind, according to the author. The article highlights the need for developing technological infrastructure in addressing security and safety in the digital world (Beck et al. 500). Similarly, the author also discusses the need to consolidate security and privacy guidelines in strengthening people’s foundational security against social crimes that have manifested as a result of the use of technology.

The main idea or thesis of this article is on the need to find the best way to address security and privacy in the digital world.  Though technology has galvanized much success in information technology and human life, there is a need to f putting down guidelines that will reduce the high number of cases associated with breaching of personal private data (Ross 5).  Similarly, the author supports the thesis by highlighting the need to empower customers on taking charge of their protection on the safety and security of their data.  The author believes this will help in tackling the increased cases of cybercrimes.

The False Choice between Privacy and Safety in Smart Surveillance by Ben Ziomek, the article highlights how the use of surveillance is affecting the privacy and safety of individuals. Surveillance devices are putting the safety and security of many people at risk.   It also illustrates how civil liberties have been compromised since it functions base on behavioral analysis, facial recognition, and object detection, which raises concerns about safety (Ziomek par 1). Similarly, the article suggests a different approach rather than relying on the use of computers in surveillance techniques, which lacks the common sense of relating things to the natural world. This affects privacy and safety, primarily when surveillance is used in detecting behavioral and facial recognition.

Consequently, the article highlights how the use of al video surveillance cannot be reliable in behavioral analysis, facial recognition; instead, they used to contravene the right to safety of people (Vigar 2016). It, therefore, of the equal importance of finding the best ways of addressing security issues rather than relying on use al video surveillance.  According to the author, this is the only way of addressing safety and security.

The central theme of this article is how to deal with safety and security issues by not relying on the use of al video surveillance. Use of al video surveillance in the detection of behavior analysis, facial recognition contravenes the rights and safety of the individual (Ziomek par 13). The use of al video surveillance devices is suitable for weapon detection as opposed to behavioral analysis, and facial recognition is a misplaced approach that the author feels the need to changed. There is a need to focus on other devices in criminal detection activities rather than relying on al video surveillance, which puts personal privacy at risk to the expense of public safet

Works Cited

Beck, Matthew J. et al. “Exploring Perceived Safety, Privacy, And Distrust On Air Travel Choice In The Context Of Differing Passenger Screening Procedures.” Journal Of Travel Research, vol 57, no. 4, 2017, pp. 495-512. SAGE Publications, doi:10.1177/0047287517700316. Accessed 13 Dec 2019. Retrieved from   https://sci-hub.tw/10.1177/0047287517700316

Gorodyansky, David. “Internet Privacy And Security: A Shared Responsibility.” 2019. Https://Www.Wired.Com/Insights/2013/10/Internet-Privacy-And-Security-A-Shared-Responsibility/, Accessed 13 Dec 2019.

Kanté, Mahamadou. “A Review Of Big Data Security And Privacy Issues.” Mara International Journal Of Scientific & Research Publications, vol 1, no. 1, 2017, pp. 49-54. Researchgate, https://www.researchgate.net/publication/320409081_A_Review_of_Big_Data_Security_and_Privacy_Issues/link/5af89081a6fdcc0c0328b912/download. Accessed 13 Dec 2019.

Ross, Ron. “Why Security And Privacy Matter In A Digital World.” 2017, https://www.nist.gov/blogs/taking-measure/why-security-and-privacy-matter-digital-world. Accessed 13 Dec 2019.

Vigar, Paul. “Patient Confidentiality And Safety: A Classic Conundrum.” Journal Of Paramedic Practice, vol 9, no. 5, 2017, pp. 214-218. Mark Allen Group, doi:10.12968/jpar.2017.9.5.214. Accessed 13 Dec 2019. Retrieved from https://sci-hub.tw/https://doi.org/10.12968/jpar.2017.9.5.214

Ziomek, Ben. “The False Choice Between Privacy And Safety In Smart Surveillance.” 2019, https://readwrite.com/2019/10/16/the-false-choice-between-privacy-and-safety-in-smart-surveillance/. Accessed 13 Dec 2019.

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask