Why do need to worry about dataveillance on a personal level

Assignment Help Computer Engineering
Reference no: EM131943879

Problem

According to HASTAC org*:

"Social networking platforms, mobile phone technology, and ubiquitous data-gathering software have become enmeshed with daily life for most people in developed, western nations. Part of this stems from the fact that communication technologies have afforded users with considerable benefits and luxuries. Indeed, social applications exist to monitor health and weight, to aid with study and research, and to help users share information about restaurants, nightspots, and other social venues. However, these benefits manifest only through the collection of data into constant and ever-expanding archives of behaviors and lifestyles. These archives facilitate how social platforms and software work autonomously to offer users suggestions regarding health choices, friendships, and professional contacts, or what JörgenSkågsby (2012) calls "serendipitous" suggestions. Whether through the click of a mouse, a keystroke, or a press of a touchscreen, our activities can be (and often are) tracked by hundreds of companies, organizations, governments, and individuals. Log into Facebook and you receive customized advertisements from your web searches. Google offers personalized search results based upon complex algorithms. Without question, companies like Facebook, Google, BlueKai, DoubleClick, and ScoreCard Research know our web habits and attitudes.

Because of this, we have seemingly grown comfortable to the point of sharing our personal identities, habits, and attitudes with companies in exchange for "free" or customized services and benefits (Carey and Burkell, 2009). However, with recent news events about the National Security Agency's position on collecting data from Internet companies, along with the events surrounding NSA whistleblower Edward Snowden (and the subsequent media frenzy), the problematic nature of "dataveillance," or the surveillance of the aforementioned archives of data, becomes apparent."

Reflect on the above (and do additional Internet research if desired). Then answer the following: Why do we need to worry about dataveillance on a personal level? Family level? Work level (either as an employee or as a business)? Other than worry, is there anything more productive we can do to protect our privacy and still take advantage of all of the opportunities in today's digital age?

Reference no: EM131943879

Questions Cloud

What would that opportunity be : Create new plans relative to that vendor to create an opportunity that will result in lower costs, earlier delivery, higher quality, or other positive impacts.
Study that uses a dependent samples design : Design a study that uses a dependent samples design and a study that uses an independent samples design.
What is the meaning of being central or to be a broker : what is the relationship, which type of relationship, how many actors, which attributes - reflect on the structure and properties of your personal network
Discuss biological and social factors involved in given case : Discuss the biological, psychological, and social factors involved in your selected case. Use your selected case study to explain which interventions would be.
Why do need to worry about dataveillance on a personal level : Why do we need to worry about dataveillance on a personal level? Family level? Work level (either as an employee or as a business)?
Jobs in psychology provide the highest-lowest salaries : What jobs in psychology provide the highest and lowest salaries? Why might starting salaries differ by state?
Write about current state of healthcare for their population : Choose a country (any country including the USA) in the world and write in 2-3 pages about their current state of healthcare for their population.
Evaluate the employment of psychoactive drugs : Evaluate the employment of psychoactive drugs in the treatment of disorders over the lifespan from both an ethical and risk-benefits perspective.
Provide a summary introduction that succinctly identifies : Identify and explain one argument (pro or con) related to the chosen issue; either summarize an existing argument or construct an original one.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd