Why do need to worry about dataveillance on a personal level

Assignment Help Computer Engineering
Reference no: EM131943879

Problem

According to HASTAC org*:

"Social networking platforms, mobile phone technology, and ubiquitous data-gathering software have become enmeshed with daily life for most people in developed, western nations. Part of this stems from the fact that communication technologies have afforded users with considerable benefits and luxuries. Indeed, social applications exist to monitor health and weight, to aid with study and research, and to help users share information about restaurants, nightspots, and other social venues. However, these benefits manifest only through the collection of data into constant and ever-expanding archives of behaviors and lifestyles. These archives facilitate how social platforms and software work autonomously to offer users suggestions regarding health choices, friendships, and professional contacts, or what JörgenSkågsby (2012) calls "serendipitous" suggestions. Whether through the click of a mouse, a keystroke, or a press of a touchscreen, our activities can be (and often are) tracked by hundreds of companies, organizations, governments, and individuals. Log into Facebook and you receive customized advertisements from your web searches. Google offers personalized search results based upon complex algorithms. Without question, companies like Facebook, Google, BlueKai, DoubleClick, and ScoreCard Research know our web habits and attitudes.

Because of this, we have seemingly grown comfortable to the point of sharing our personal identities, habits, and attitudes with companies in exchange for "free" or customized services and benefits (Carey and Burkell, 2009). However, with recent news events about the National Security Agency's position on collecting data from Internet companies, along with the events surrounding NSA whistleblower Edward Snowden (and the subsequent media frenzy), the problematic nature of "dataveillance," or the surveillance of the aforementioned archives of data, becomes apparent."

Reflect on the above (and do additional Internet research if desired). Then answer the following: Why do we need to worry about dataveillance on a personal level? Family level? Work level (either as an employee or as a business)? Other than worry, is there anything more productive we can do to protect our privacy and still take advantage of all of the opportunities in today's digital age?

Reference no: EM131943879

Questions Cloud

What would that opportunity be : Create new plans relative to that vendor to create an opportunity that will result in lower costs, earlier delivery, higher quality, or other positive impacts.
Study that uses a dependent samples design : Design a study that uses a dependent samples design and a study that uses an independent samples design.
What is the meaning of being central or to be a broker : what is the relationship, which type of relationship, how many actors, which attributes - reflect on the structure and properties of your personal network
Discuss biological and social factors involved in given case : Discuss the biological, psychological, and social factors involved in your selected case. Use your selected case study to explain which interventions would be.
Why do need to worry about dataveillance on a personal level : Why do we need to worry about dataveillance on a personal level? Family level? Work level (either as an employee or as a business)?
Jobs in psychology provide the highest-lowest salaries : What jobs in psychology provide the highest and lowest salaries? Why might starting salaries differ by state?
Write about current state of healthcare for their population : Choose a country (any country including the USA) in the world and write in 2-3 pages about their current state of healthcare for their population.
Evaluate the employment of psychoactive drugs : Evaluate the employment of psychoactive drugs in the treatment of disorders over the lifespan from both an ethical and risk-benefits perspective.
Provide a summary introduction that succinctly identifies : Identify and explain one argument (pro or con) related to the chosen issue; either summarize an existing argument or construct an original one.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a program that takes four integer numbers at input

Write a program that takes four integer numbers at input from keyboard. Then, call a function passing these four numbers as parameters. The function should display the minimum and maximum of the four numbers.

  How overlooking project cost management detrimental

When planning a project, planning the cost, budget, and work is an important element to the project. Address the following as related to cost management. How can overlooking project cost management be detrimental to completing projects within bu..

  Define the structures and properties of carbohydrates

Carbohydrates, lipids, and proteins are important biomolecules. explain the structures and properties of carbohydrates, lipids, and proteins including the different forms of these biomolecules that are present within the body.

  Recognize the the base case

What valid values could be passed as parameters to the function mystery.

  Write a recursive algorithm whose parameters are integers

Write a recursive T(n lg n) algorithm whose parameters are three integers x, n, and p, and which computes the remainder when x n is divided by p.

  List and describe the steps of the rapid prototyping process

List the benefits of rapid prototyping. Describe some of the applications of rapid prototyping. List and describe the steps of the rapid prototyping process.

  Write down a program that reads a person''s name

Write down a program that reads a person's name.

  Computer rendering of stochastic models

Prepare a slideshow on Computer rendering of stochastic models

  Network design will support dial-up

Justify whether or not your network design will support dial-up or VPN remote access using descriptions of the following aspects: the advantages and disadvantages of the remote access solution, network protocols that will be used on your network, ..

  Program that convert temperature in fahrenheit

Write a program that will convert a temperature in Fahrenheit to Celsius and Kelvin. The temperature to convert should be captured from user input. The formulas for converting the temperatures are:

  What do you mean by fulfillment operation what are some key

question 1 what is a fulfillment operation? what are some key characteristics of amazon.coms fulfillment

  How much storage would be used by the fft

How much storage would be used by the FFT' if we didn't circumvent the storage-management problem with the perfect shuffle?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd