Internet Privacy The Internet Has Term Paper

PAGES
4
WORDS
1357
Cite

In this sense, internet privacy represents a challenge indeed. Internet privacy is a relatively new term and the definitions are therefore rather scarce or general. For instance, it can be defined as "the ability of individuals to determine for themselves when, how, and to what extent information about them is communicated to others." (Givens, 1999) in this sense, privacy is a matter of personal choice and is therefore subject to prior agreement from the individual. However, considering the fact that the internet is a global network in which high technology plays the most important role and without which none of the benefits of communication would be possible, it is rather hard to control the degree to which one's privacy is violated.

One of the most important players in the debate over internet privacy is the federal government. The terrorist threat represented a powerful alarm signal for the defense system, with everything it encompasses, and redefined the strategy of surveillance as a means of obtaining information. In this sense, every person can be placed under analysis and its privacy can be, in different circumstances, violated. The debate thus focus on the definition of these circumstances and the degree to which the government can exercise its authority in terms of acquiring confidential information, storing them, and eventually using them in different situations.

There are those that consider a legislative limitation as being a proper means for dealing with the eventuality of abuses in this case. For instance, when undergoing online transactions, specific private information is being gathered by the respective website, information that can be used in other purposes than intended. In order to prevent such abuses, the Congress focuses on passing laws that would limit their use. (Jones and McCarthy, 2001) This would be a solution for protecting the personal nature of information from potential private abuses.

There is still another point to consider: the possible abuses of private information by the Government itself. In this sense, there have been arguments according to which the government is constantly controlling the activities of most individuals on the internet, including private emails...

...

This is done in the name of the general principle of the Patriot Act. (Slater, 2007) However it comes in contradiction with the fundamental right to a private life enshrined in the Constitution. Therefore, there is either the choice of respecting the privacy of every internet user and taking the chance to fail to detect possible dangerous plots threatening the national security, or admitting the breach of this fundamental right of the citizen in the hope that any possible threat to the integrity of the society can be averted and prevented.
Taking all these aspects into consideration, it is rather difficult to advocate whole heartedly one or another point-of-view. On the one hand there is the matter of respecting the integrity and privacy of one's personal information, but, on the other hand, the threats that face today's society indirectly demand for a closer surveillance of the activities taking place in the society. From a personal point-of-view, I consider the government's involvement to be absolutely necessary for insuring the security of our nation and for preventing the events similar to those from 2001 to happen again. Still, a strong legislative initiative that would somewhat insure the limitation of abuses is essential for the creation of a proper legal framework in which the Government to act.

Works Cited

Givens, Beth. The Emperor's New Clothes: Privacy on the Internet in 1999. Privacy Rights Clearinghouse. 1999. 15 June 2007 http://www.privacyrights.org/ar/emperor.htm

Jones, Jennifer, and McCarthy, Jack. Government ponders Internet privacy issues. Infoworld. 2007. 15 June 2007 http://www.infoworld.com/articles/hn/xml/00/02/21/000221hnprivacy.html

Macura, Katarzyna J. "Communicating on the Internet." Radiological Society of North America. 2007. 15 June 2007 http://www.rsna.org/Technology/internet3-1.cfm

Public Records on the Internet: The Privacy Dilemma. Privacy Rights Clearinghouse. 2006.

15 June 2007 http://www.privacyrights.org/ar/onlinepubrecs.htm

Slater, Derek. FBI's abuse of Patriot Act even worse than we thought. Electronic Frontier Foundation. 2007. 15 June 2007 http://www.eff.org/deeplinks/archives/005314.php

Sources Used in Documents:

Works Cited

Givens, Beth. The Emperor's New Clothes: Privacy on the Internet in 1999. Privacy Rights Clearinghouse. 1999. 15 June 2007 http://www.privacyrights.org/ar/emperor.htm

Jones, Jennifer, and McCarthy, Jack. Government ponders Internet privacy issues. Infoworld. 2007. 15 June 2007 http://www.infoworld.com/articles/hn/xml/00/02/21/000221hnprivacy.html

Macura, Katarzyna J. "Communicating on the Internet." Radiological Society of North America. 2007. 15 June 2007 http://www.rsna.org/Technology/internet3-1.cfm

Public Records on the Internet: The Privacy Dilemma. Privacy Rights Clearinghouse. 2006.
15 June 2007 http://www.privacyrights.org/ar/onlinepubrecs.htm
Slater, Derek. FBI's abuse of Patriot Act even worse than we thought. Electronic Frontier Foundation. 2007. 15 June 2007 http://www.eff.org/deeplinks/archives/005314.php


Cite this Document:

"Internet Privacy The Internet Has" (2007, June 15) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/internet-privacy-the-internet-has-37193

"Internet Privacy The Internet Has" 15 June 2007. Web.19 April. 2024. <
https://www.paperdue.com/essay/internet-privacy-the-internet-has-37193>

"Internet Privacy The Internet Has", 15 June 2007, Accessed.19 April. 2024,
https://www.paperdue.com/essay/internet-privacy-the-internet-has-37193

Related Documents

At the bottom line, the issue at hand is with the sanctity and safety of the students and the responsibility of the university to preserve and develop that. Moreover, many of these students are dallying into multi-dimensional virtual worlds that are beginning to closely resemble the physical world and that are having their own ethical issues arise (Wankel & Malleck, 2010). Universities need to educate themselves as to what those

Internet Security, risks internet security presents field information technology implementing solutions address challenges. The paper 15 pages length ( including title reference page). 1. Title Page: Include, paper title, title, instructor's, date. Internet security In today's advanced technological world, online users are faced with a myriad of problems and risks. Any online user is vulnerable to Trojans, viruses, worms, spyware, and malware. The user is exposed to sniffers, spoofing software, and phishing.

Internet Censorship The internet came to prominence as a tool and pursuit of the masses starting in the early 1990's. The capabilities, depth and breadth of what the internet has to offer have increased exponentially over the ensuing two decades. Such expansion has greatly eased the spread of information (Palfrey, 2010). The ease in which people communicate and disseminate information has created a cause for concern among many different parties that

Internet Service Provider (ISP) Web Content Law and Ethics The objective of this work is to answer whether Internet service providers have a responsibility to regulate the content that is available on the World Wide Web? This work will additionally answer as to whether the presence and ease of availability of pornography to the general public a tribute to free speech and a reflection of social maturity or an example of

They suggest that the laws necessary to protect informational privacy from unauthorized collection and use simply must catch up to the realities presented by modern digital technology exactly the way the laws now prohibiting unwarranted wiretapping of telephones once lagged behind the obvious implications of failing to incorporate the needs posed by modern technology into appropriate legislation (Levin, 2012). Competing Interests and Positions On balance, there are legitimate justifications for imposing

Trust alleviates the apprehensions of insecurity that crop up when the retailer is not known, or the way the company will deliver the goods or services purchased. Building trust in e-commerce necessitates a clear indication of rigorous standards of security, data safeguard, transparency of data use, etc. (The effect of IT-based security on feedback mechanisms and trust building in online auction settings) Morgan and Hunt during 1994 indicate that trust