Internet Privacy For High School Students Term Paper

Internet Privacy for High School Students The unrestrained stream of information is conceived necessary for democracies and market-based economies. The capability of the Internet to make available the vast quantity of information to practically everyone, irrespective of their locations thus entails large benefits. The Internet provides access to the greatest libraries of the world to the students even in the smallest towns and permit the medical specialists to analyze the patients situated about thousands of miles away. The attribute of interactivity of the Internet fosters communication and personal and political expression. The Internet also assists to make the economies progress as it enhances the ease, speed and cost effectiveness with regard to the collection, compilation and delivery around the world to the multiple extent. The electronic commerce will decline the business costs as companies are able to take the benefits of enhanced access to customers, products and suppliers worldwide along with more and better customer marketing information. (Buchholz, Rosenthal, 2002)

Consumers will also be benefited from the declined prices and wider product selection that generate the flow from ease of understanding to more and better consumer information and more vendors. With such advantages however, also crop up problematic confrontation of electronic networks for commerce that generate information trails permitting the transaction information of the customers to be easily monitored, collected and compiled entailing others with the personal details of the lives of the people. The Supermarkets and other retail vendors apply the scanners to monitor the purchases. The bank and credit card companies store the information about our payment records, the location of our shopping, the things we purchase. The insurance companies, doctors and hospitals have large amounts of personal information on their clients and patients.

The contemporary technology has not only enhanced the quantity of information circulating about individuals, but also the easiness of retrieving practically anything one wants to know about someone. Such information stems from various sources. At any moment one entails the information for credit card applications, medical records, insurance applications, driver's applications and renewals, online purchases, or visits to Websites, information is collected and stored. Generating personal information is essential in our society; however, everybody provides it with the anticipation that it will remain secret. Such information however, is treated as a hot commodity and is offered for sale, and those offering for sell are not essentially liable to safeguard the privacy of individuals. While it is growingly problematic to belief any site to maintain personal information safe from the interlopers the biggest risk to privacy of data is not crackers, stalkers or data brokers. It is the legal online businesses like advertising networks, retailers and others that generate detailed profiles of the people their activities on the Internet. (Buchholz, Rosenthal, 2002)

Governments, schools, businesses and other agencies might have gathered the personal information. The information gathered by governments is often publicly offered in the form of Public Registers. The Electoral Roll and the Telephone Directory are Public Registers. The Electoral Roll and the Telephone Directory are illustrations of Public Registers. The school, university or employer may bring out the name or other related information. Much of the personal information that is widely available has been gathered and compiled into the databases by means of Web-based companies that offer such information for sell from many sources. Since there is little or no law anywhere in the world administering such kind of activity there do not exist much that can be performed about it, but at least it can be understood. (Protecting your Privacy on the Internet) The ease and cost effectiveness with which the personal information is collected, compiled, and transferred can, if not maintained carefully calls upon decline of personal privacy.

New surveillance and information gathering technologies are available presently everywhere and they are fixing up all sorts of warning bells for those who are concerned about the corrosion of privacy. (Linda, 2001) The cookies are applied for those of us that reach the internet through a public ISP, each request we make to a Website cannot be connected to a previous request, while each request do not entail a permanent specific identifier. The cookies permit website operators to offer a permanent identifier to a computer that can be applied to associate the requests made to the Website from that computer. Cookies offer the information to the website that you have been there earlier and also can be applied to record the portions of the website that is visited. While cookies themselves may not identify you, in the way a name or address perform, a cookie could prospectively be...


Further there exists several attributes of HTTP that may permit your surfing behavior to be monitored. Other information that may be sent whenever a web page is requested is that includes the e-mail address and the last web page that is looked upon. The transmission of such information is based on the compatibility of the browser to such options or if the browser has been configured with the e-mail address. (Protecting your Privacy on the Internet)
The consequence is warning of awful predictions. The books have currently been brought out with such titles as Database Nation: The Death of Privacy in the 21st Century by Simson Garfinkel, The Unwanted Gaze: The Destruction of Privacy in America by Jeffrey Rosen and the End of Privacy: How Total Surveillance Is Becoming a Reality by Reg Whitaker. The Survey reports have indicated that the public is seriously worried: a 1999 Wall Street Journal -- NBC survey, to illustrate indicate that privacy is the matter of great concern for the Americans during the 21st Century and much beyond the overpopulation, racial tensions and global warming. The politicians cannot say sufficiently on privacy and are hurrying to pass legislations to safeguard it. Growingly business and technology are seen as the culprits. Over the next 50 years, the journalist Simson Garfinkel narrates in Database Nation that we visualize the new kinds of risks to privacy that do not trace their roots in totalitarianism, but in capitalism, the free market, advanced technology, and the unrestrained exchange of electronic information. (Lester, 2001)

The privacy is a great mater of consumer concerns and there is no doubt about it. A survey conducted in October, 2000 by the National Consumers League presented that the consumers are more anxious about personal privacy than about the health care, education, crime, and taxes. A survey conducted in January, 2001 by Wirthlin Worldwide revealed that a plethora of adverse emotions related to extension of personal information during business transactions. The three most common words the consumers apply to narrate their intensions were cautious, hesitant and suspicious. Such words replicate specific privacy threats. As per the American Demographics survey that took the sample of 1024 people, the consumers first risk is that businesses or individuals will victimize their children -- 66% of the sample population reveals that they are seriously concerned about this. Another existing threat among consumers is that private information will somehow be applied against them. And over half of those surveyed reveal that they are extremely or very concerned. Another prevalent fear among consumers is that private information will somehow be applied against them.

More than 50% of those surveyed apprehend that if they reveal the personal information they will be raid or cheated or even their identity will be stolen for use in fake modes. However, most of these threats are termed as 'anti-victimization fears' by Alan Westin due to the fact that they concentrate on physical or financial damages. While marketers can assist the consumers assure of precautions taken to address such possibilities such fears are dealt with primarily by legal action in Congress and the courts. A large number of bills awaiting on the Hill deal with a plethora of privacy issues, incorporating distribution of authorities to the FTC for privacy protection, enhancing penalties against computer crimes and stringent amendments to the Electronic Communications Privacy Act of 1986. Rachael Shanahan, chief privacy officer for Unica an analytical CRM provider perceived the privacy issue to be very multifaceted. Being capable of isolated and understanding those underlying fears is significant so that marketers can address that is real concern to their target. Taking into account the population figures and structures, privacy is not considered to be a big issue. Rich and educated people are seen to be much reactive to safeguard their privacy. (Lester, 2001)

Hence, the information privacy -- a control over the process by which the personal information is collected, revealed and applied -- is considered critical to the development and use of electronic commerce. The U.S. strategy to safeguard privacy balances the privacy rights of individuals with the assistance associated with the free flow of information. To attain such balance, the U.S. conventionally, has depended upon a blend of sector-specific acts, rules and private sectors ethics and market forces. Such strategy to privacy continues to make the most sense in the electronic commerce context, since electronic commerce will flourish only if the privacy rights of individuals are…

Sources Used in Documents:


Baskin, Joy Surratt; Surratt, Jim. "Student Privacy Rights and Wrongs on the Web" School Administrator. Vol: 35; No: 2; pp: 102, 114-116

Beth Givens, (February 2000) "Privacy Expectations in a High Tech World" Computer and High Technology Law Journal. Retrieved from Accessed on 14 April, 2005

'Board Policy with Guidelines Date Subject: Student Technology Acceptable Use Policy" (17 July, 2001) North Sanpete School District Policy. Number V-30. Retrieved from Accessed on 14 April, 2005

Brooks-Young, Susan. (November-December, 2000) "Internet usage update" Today's Catholic Teacher. Vol: 17: No: 2; pp: 53-56
"Kids Privacy on the Net" Retrieved from Accessed on 14 April, 2005
"Protecting your Privacy on the Internet." Retrieved from / Accessed on 14 April, 2005
'Section 1: A Primer for Privacy. National Center for Education Statistics" Retrieved from Accessed on 14 April, 2005
Suryaraman, Maya. (27 October 2003) "School software helps parents keep tabs on teens" Retrieved from Accessed on 14 April, 2005
"The internet's all-pervasive sexualized media environment affects childhood learning" (2 March, 2005) Child Health News. Retrieved from Accessed on 14 April, 2005

Cite this Document:

"Internet Privacy For High School Students" (2005, April 17) Retrieved May 21, 2024, from

"Internet Privacy For High School Students" 17 April 2005. Web.21 May. 2024. <>

"Internet Privacy For High School Students", 17 April 2005, Accessed.21 May. 2024,

Related Documents

Internet: Privacy for High School Students An Analysis of Privacy Issues and High School Students in the United States Today In the Age of Information, the issue of invasion of privacy continues to dominate the headlines. More and more people, it seems, are becoming victims of identity theft, one of the major forms of privacy invasion, and personal information on just about everyone in the world is available at the click of

Causative Analysis There are several causes to why the students did not pass the state standardized test in mathematics and in language arts. It is strongly believe that the students were not adequately prepared for the test because they had not been completing the required assignments and attending the online classes offered by their teachers. Their lack of School Improvement 7 participation in the class, has lead them to a failing

School Policy Involving Students' 4th Amendment Rights Some of the nation's public schools are beginning to resemble medieval fortresses with armed guards stationed at entrances equipped with metal detectors. Although these steps have helped to prevent the introduction of weapons onto school grounds, more problematic are other types of contraband that inevitably find their way into the nation's schools, including tobacco, alcohol and drugs of all types, as well as

At the bottom line, the issue at hand is with the sanctity and safety of the students and the responsibility of the university to preserve and develop that. Moreover, many of these students are dallying into multi-dimensional virtual worlds that are beginning to closely resemble the physical world and that are having their own ethical issues arise (Wankel & Malleck, 2010). Universities need to educate themselves as to what those

Student Searches, Free Speech & Expression, and Privacy in the Wired Age Student searches and in-school discipline for off-campus conduct Free Speech and Expression on and off campus Privacy in the wired age on and off campus. (Facebook, twitter, myspace, blogs, cellphones) What are a students' constitutional rights when it comes to searches and seizures, on and off campus discipline, free speech, expression, and privacy in the wired age when on and off campus?

He offers what he believes is perhaps a more comprehensive method: collaborating (42). Clabaugh suggests assigning more than one student to a research assignment, and thereby creating a shared result of success, or, in the case of plagiarism, a shared responsibility and shared consequence (42). This is one suggestion, but it also deprives the student of individual success and credit. Also, Clabaugh's contention that electronic means of identifying plagiarism