country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Privacy Will Hit Tipping Point In 2016

tag 0 Download6 Pages / 1,459 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss about the Privacy will Hit Tipping Point in 2016.
 
 

Answer:

Introduction

Information Communication and Technology (ICT) is considered as extended version of Information Technology that has used in every business organization, other workplaces and also at homes by common users. ICT is an integration of telecommunications, computers and other important enterprise software and all these things help individuals to perform their different business activities. If ICT has several benefits then there are also some security and privacy related issues of ICT that cannot be ignored and causing problems for its all potential users. The purpose of making this report is to identify ICT-related ethical issue by analyzing a news article. Here I have selected a news article regarding ethical issue of privacy in ICT. Every user that is using ICT wants privacy for his or her information that is transferred over network while communication, but due to advancement in hacking activities, privacy has being demolished by hackers.

Discussion

The selected article is “Privacy will hit tipping point in 2016”. This article is concerned with online privacy of our data. According to this article, the sustainability of online privacy will become so important in upcoming years due to demand of greater protection against hacking issues. It is analyzed that all business organizations that gather and store personal data of users are at high risk because hackers mostly attract towards databases of these business organizations. In this case, privacy is the main ICT ethical issue to resolve by security experts to maintain the trust of customers. Now in upcoming paragraphs, I will emphasize on scrutiny of article by four classical ethical theories such as utilitarianism, deontology, virtue and contract (Taylor, 2017).

Classical Ethical Theories

Utilitarianism

This ethical theory keeps focus on right and wrong results of an action or policy. Moreover, this theory defines that a best selected option should be able to enhance maximum utility. If I analyze article on behalf of this classical theory then I can say that also in this article, those options are mentioned to use that can provide maximum security and privacy to customers’ data. Besides this, article has also described positive outcomes of maintaining privacy and negative result of not using tools for long term security and privacy of data (SearchCIO, 2017).

Deontology

This classical ethical theory is based on morality of certain duties or claims and defined that these actions are right or wrong in themselves (Riemysore.ac.in, 2017). Eventually, this classical theory identifies that which thing can make an action right rather than emphasizing on consequences of actions. In article, the main requirement is maintenance of privacy of data of users. It is a right action and must be taken by business organizations those collect users’ data. This will result in increment in believe of customers on company and performance of company will be improved (Techterms.com, 2017).

Virtue

Besides above discussed two classical ethical theories, another ethical theory is virtue. This theory claims that ethics are related to representatives not actions or consequences. This theory basically emphasize on development of good habits of a particular personality (Sevenpillarsinstitute.org, 2017). It means virtue believes in creation of good character traits and avoid bad character traits. If I analyze the article on behalf of virtue theory then I can say that here individuals in companies like Google, Apple and Facebook are doing all efforts to enhance privacy of their customers for long time and also introducing new security tools. Whether people has encountered some issues of privacy due to services of these companies but still these can be ignored due to their best efforts for maintaining privacy in future (Austin, 2017).

 

Contract

This theory is also known as social contract theory. According to this theory, morality is set of rules that allow everyone to live in society together. Furthermore, this theory also believes in the concept that moral and political duties of individuals depend on contract or an agreement among them. In analysis of privacy of content I can say that there is always a contract between business organization and customer that company will maintain holistic privacy and security of their information into its databases. Only on the behalf of this contract, both entities can work together.

In this way, on the behalf of above analysis, I can say that the selected media article has similar perspectives according to classical theories. In above discussion, the rightness and wrongness of every action of article is defined properly. Lack of privacy is eventually a critical issue and must be controlled quickly according to requirements.

Resolution of Ethical Issue of Privacy

The above discussed issue of privacy and security is necessary to resolve. There are several tools and techniques are available that can be used to maintain long term privacy of customer’s data. As per given in media article, ad blocking is one of the best way to sustain privacy of customers’ data. Hackers try to attach vulnerable ads with online products and services of organizations and when those products are downloaded by users into their computers, then ads automatically opened and reside virus into database and computers. In this case ad blocker will be helpful to restrict ads to enter into computer systems (Ruslim, 2017).

Furthermore, legal action can be taken against privacy violators (Luceo.net, 2017). A new general data protection regulation has set by European Union (Spot.colorado.edu, 2017). Any company or an individual will violate the regulations, they have to pay the fine up to five percent of worldwide revenues.

Any kind of security and privacy breach is result of poor performance and bad habits of not follow security measures properly by a user. This is not right and lead to high security issues. It is responsibility of user that he or she should lock their system while not using and it can be done by using login credentials such as username and passwords. The password should be too strong to guess. It is also an effective way to get prevention from data security and privacy.

Besides this, anti-virus tools can also be used to prevent virus attacks. Anti-virus is a software that must be installed into computer system. Whenever a new entity enters into computer system then entity can be scanned by anti-virus. If there will be any virus into entity then anti-virus will give alert to user about threat and user can fix that virus. It is one of effective security tools. Like anti-virus, firewall is an in-built software into operating system that also restrict vulnerable objects to enter into system. But it should be in on mode.

In business organizations and other workplaces where ICT related applications are used, there above discussed solutions can be used. While purchasing products online, people do online transactions. In this situation, privacy can be leaked of credit card information and personal details of user.  Therefore, it is responsibility of merchant to manage customers’ transactions and find another secure ways to collect customers’ data. It is suggested by security experts that here loyalty programs can be developed by retailers and e-receipts should be generated appropriately for maintaining records.  So these are some significant solutions to resolve ethical issue of privacy.

Conclusion

In conclusion, all IT giant companies such as Google, Apple, Microsoft and others are serious about security and privacy of their customers’ data. That is why with its enormous services and products, these are also given priority to high level of protection from cyber-criminals. Not only at developers’ end but also at users’ end privacy should be maintained at high level.

 

References

Taylor, H. (2017). Privacy will hit tipping point next year: Study. CNBC. Retrieved 12 September 2017, from https://www.cnbc.com/2015/11/09/privacy-will-hit-tipping-point-in-2016.html

SearchCIO. (2017). What is ICT (information and communications technology, or technologies)? - Definition from WhatIs.com. (2017). Retrieved 12 September 2017, from https://searchcio.techtarget.com/definition/ICT-information-and-communications-technology-or-technologies

Techterms.com. (2017). ICT (Information and Communication Technologies) Definition. Retrieved 12 September 2017, from https://techterms.com/definition/ict

Sevenpillarsinstitute.org. (2017). Moral Theories. Retrieved 12 September 2017, from https://sevenpillarsinstitute.org/morality-101/moral-traditions

Austin. (2017). Chapter 6 - Four Classic Theories of Ethics, The Ethical Journalist, …. Slideshare.net. Retrieved 12 September 2017, from https://www.slideshare.net/laustinnc/chapter-6-4-classic-theories-of-ethics?next_slideshow=1

Ruslim. (2017). Ethical theories. Slideshare.net. Retrieved 12 September 2017, from https://www.slideshare.net/NicolasRuslim/ethical-theories-40471063

Opentextbc.ca. (2017). 2.9 Social Contract Theory | Ethics in Law Enforcement. Retrieved 12 September 2017, from https://opentextbc.ca/ethicsinlawenforcement/chapter/2-9-social-contract-theory/

Riemysore.ac.in. (2017). Unit - 1 : Information and Communication Technology | first. Retrieved 12 September 2017, from https://www.riemysore.ac.in/ict/unit__1__information_and_communication_technology.html

Luceo.net. (2017). Modern and Classical Ethical Theories – Luceo Magazine. Retrieved 12 September 2017, from https://luceo.net/ethics/

Spot.colorado.edu. (2017). LectureforExercise1.html. Retrieved 12 September 2017, from https://spot.colorado.edu/~tooley/Lecture3-EthicalTheories.html

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Privacy Will Hit Tipping Point In 2016. Retrieved from https://myassignmenthelp.com/free-samples/privacy-will-hit-tipping-point-in-2016.

"Privacy Will Hit Tipping Point In 2016." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/privacy-will-hit-tipping-point-in-2016.

My Assignment Help (2018) Privacy Will Hit Tipping Point In 2016 [Online]. Available from: https://myassignmenthelp.com/free-samples/privacy-will-hit-tipping-point-in-2016
[Accessed 04 June 2020].

My Assignment Help. 'Privacy Will Hit Tipping Point In 2016' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/privacy-will-hit-tipping-point-in-2016> accessed 04 June 2020.

My Assignment Help. Privacy Will Hit Tipping Point In 2016 [Internet]. My Assignment Help. 2018 [cited 04 June 2020]. Available from: https://myassignmenthelp.com/free-samples/privacy-will-hit-tipping-point-in-2016.


At MyAssignmenthelp.com, we are committed to deliver quality assignment assistance in the fastest way possible. To make our service delivery fast, we have hired subject matter experts to work on different subject specific assignments. We have hired experts who owe in-depth knowledge in their respective subjects. As per their expertise, they provide geography assignment help, Physics assignment help, Strategic assignment help, history assignment help, art architecture assignment help and assistance with other subjects as well.

Latest It Write Up Samples

CIS5302 Professional Skills For Business Analysis

Download : 0 | Pages : 4
  • Course Code: CIS5302
  • University: University Of Southern Queensland
  • Country: Australia

Answer: 1. Stakeholder Analysis: Name Roles Attitudes Authority Power Influence Patient External audience Request for consultation High Keep satisfied High Doctor External audience Patient request for consultation High Keep satisfied High Specialist External audience Patient request for consultation High Keep satis...

Read More arrow

CO4830 IT Project Management 2

Download : 0 | Pages : 6
  • Course Code: CO4830
  • University: University Of Central Lancashire
  • Country: United Kingdom

Answer: Introduction The aim of this report is to present the cloud-based software as a solution for the expansion being led by the Lizzie Belt Company. The target market for the organization was the online customers and the proposed solution was to develop a web portal in manner to allow the customers and the employees of the organization to utilize better and enhanced experiences. It will enhance the interaction of the employees of the diff...

Read More arrow

ITC544 IT Fundamentals 3

Download : 0 | Pages : 2
  • Course Code: ITC544
  • University: Charles Sturt University
  • Country: Australia

Answers: 1. (a): Firstly, let covert hexadecimal Number (6A) to equivalent decimal number. =(6A) 16                                                         &nb...

Read More arrow

SO784 Configuration And Deployment Of Cloud Infrastructure

Download : 0 | Pages : 8

Answers: 1. a) Migration to the cloud platform would be a beneficial factor for the services of the bank. The services of the cloud would provide efficiency and would reduce several costs. The technology of cloud computing would be able to scale the capacity of processing for reacting to the demand of the customers. The benefits that would be provided by the cloud platform for the banking sector are: They would be able to cut the costs that ...

Read More arrow

1220HSL Information Systems For Services Industries

Download : 0 | Pages : 7
  • Course Code: 1220HSL
  • University: Griffith University
  • Country: Australia

Answer: Introduction The modern age of technology has brought various innovations including the eruption of a new technological innovation, known as the digital trends. In this case, a business is represented via websites and people no longer need to maintain physical retail spaces for selling goods online. As a result, the economy of the countries have also been increased mainly due to the fact that they are also supporting the innovations of ...

Read More arrow
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,329,672

Orders

4.9/5

Overall Rating

5,076

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 4/5

3076 Order Completed

99% Response Time

Emily Wei

Doctor of Philosophy (Ph.D) in Civil Engineering

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

285 Order Completed

99% Response Time

Eugene Baranowski

MBA in Supply Chain

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

248 Order Completed

100% Response Time

Lloyd Bernabe

MSc in Accounting

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

1309 Order Completed

100% Response Time

Gemmie Chen

MSc in Nursing

Singapore, Singapore

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

First time using My Assignment Help Services - First meeting with customer service was very thorough and spent time explaining. Once hired and explained what I needed, I received exactly what I had asked for. The assignment was sent to me before th...

flag

User Id: 436537 - 04 Jun 2020

Australia

student rating student rating student rating student rating student rating

Good Job - provided exactly what I asked for. Addressed all questions in the assignment. APA formatted with references within the past 5 years. Assignment finished before the time I asked for it.

flag

User Id: 436537 - 04 Jun 2020

Australia

student rating student rating student rating student rating student rating

Finally a wonderful work ! Satisfied by rework after escalation as expected revived the solution! Would definitely recommend my friends! Thanks

flag

User Id: 332636 - 04 Jun 2020

Australia

student rating student rating student rating student rating student rating

VERY GOOD INFORMATION, I HAD TO DO A VIDEO ON THIS ASSIGNMENT. IT WAS A FEW MISSED SPELL WORDS BUT I READ OVER AND OVER UNTIL I GOT IT RIGHT. tHANKS!

flag

User Id: 240291 - 04 Jun 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?