country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Privacy Will Hit Tipping Point In 2016

tag 0 Download6 Pages 1,459 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss about the Privacy will Hit Tipping Point in 2016.
 
 

Answer:

Introduction

Information Communication and Technology (ICT) is considered as extended version of Information Technology that has used in every business organization, other workplaces and also at homes by common users. ICT is an integration of telecommunications, computers and other important enterprise software and all these things help individuals to perform their different business activities. If ICT has several benefits then there are also some security and privacy related issues of ICT that cannot be ignored and causing problems for its all potential users. The purpose of making this report is to identify ICT-related ethical issue by analyzing a news article. Here I have selected a news article regarding ethical issue of privacy in ICT. Every user that is using ICT wants privacy for his or her information that is transferred over network while communication, but due to advancement in hacking activities, privacy has being demolished by hackers.

Discussion

The selected article is “Privacy will hit tipping point in 2016”. This article is concerned with online privacy of our data. According to this article, the sustainability of online privacy will become so important in upcoming years due to demand of greater protection against hacking issues. It is analyzed that all business organizations that gather and store personal data of users are at high risk because hackers mostly attract towards databases of these business organizations. In this case, privacy is the main ICT ethical issue to resolve by security experts to maintain the trust of customers. Now in upcoming paragraphs, I will emphasize on scrutiny of article by four classical ethical theories such as utilitarianism, deontology, virtue and contract (Taylor, 2017).

Classical Ethical Theories

Utilitarianism

This ethical theory keeps focus on right and wrong results of an action or policy. Moreover, this theory defines that a best selected option should be able to enhance maximum utility. If I analyze article on behalf of this classical theory then I can say that also in this article, those options are mentioned to use that can provide maximum security and privacy to customers’ data. Besides this, article has also described positive outcomes of maintaining privacy and negative result of not using tools for long term security and privacy of data (SearchCIO, 2017).

Deontology

This classical ethical theory is based on morality of certain duties or claims and defined that these actions are right or wrong in themselves (Riemysore.ac.in, 2017). Eventually, this classical theory identifies that which thing can make an action right rather than emphasizing on consequences of actions. In article, the main requirement is maintenance of privacy of data of users. It is a right action and must be taken by business organizations those collect users’ data. This will result in increment in believe of customers on company and performance of company will be improved (Techterms.com, 2017).

Virtue

Besides above discussed two classical ethical theories, another ethical theory is virtue. This theory claims that ethics are related to representatives not actions or consequences. This theory basically emphasize on development of good habits of a particular personality (Sevenpillarsinstitute.org, 2017). It means virtue believes in creation of good character traits and avoid bad character traits. If I analyze the article on behalf of virtue theory then I can say that here individuals in companies like Google, Apple and Facebook are doing all efforts to enhance privacy of their customers for long time and also introducing new security tools. Whether people has encountered some issues of privacy due to services of these companies but still these can be ignored due to their best efforts for maintaining privacy in future (Austin, 2017).

 

Contract

This theory is also known as social contract theory. According to this theory, morality is set of rules that allow everyone to live in society together. Furthermore, this theory also believes in the concept that moral and political duties of individuals depend on contract or an agreement among them. In analysis of privacy of content I can say that there is always a contract between business organization and customer that company will maintain holistic privacy and security of their information into its databases. Only on the behalf of this contract, both entities can work together.

In this way, on the behalf of above analysis, I can say that the selected media article has similar perspectives according to classical theories. In above discussion, the rightness and wrongness of every action of article is defined properly. Lack of privacy is eventually a critical issue and must be controlled quickly according to requirements.

Resolution of Ethical Issue of Privacy

The above discussed issue of privacy and security is necessary to resolve. There are several tools and techniques are available that can be used to maintain long term privacy of customer’s data. As per given in media article, ad blocking is one of the best way to sustain privacy of customers’ data. Hackers try to attach vulnerable ads with online products and services of organizations and when those products are downloaded by users into their computers, then ads automatically opened and reside virus into database and computers. In this case ad blocker will be helpful to restrict ads to enter into computer systems (Ruslim, 2017).

Furthermore, legal action can be taken against privacy violators (Luceo.net, 2017). A new general data protection regulation has set by European Union (Spot.colorado.edu, 2017). Any company or an individual will violate the regulations, they have to pay the fine up to five percent of worldwide revenues.

Any kind of security and privacy breach is result of poor performance and bad habits of not follow security measures properly by a user. This is not right and lead to high security issues. It is responsibility of user that he or she should lock their system while not using and it can be done by using login credentials such as username and passwords. The password should be too strong to guess. It is also an effective way to get prevention from data security and privacy.

Besides this, anti-virus tools can also be used to prevent virus attacks. Anti-virus is a software that must be installed into computer system. Whenever a new entity enters into computer system then entity can be scanned by anti-virus. If there will be any virus into entity then anti-virus will give alert to user about threat and user can fix that virus. It is one of effective security tools. Like anti-virus, firewall is an in-built software into operating system that also restrict vulnerable objects to enter into system. But it should be in on mode.

In business organizations and other workplaces where ICT related applications are used, there above discussed solutions can be used. While purchasing products online, people do online transactions. In this situation, privacy can be leaked of credit card information and personal details of user.  Therefore, it is responsibility of merchant to manage customers’ transactions and find another secure ways to collect customers’ data. It is suggested by security experts that here loyalty programs can be developed by retailers and e-receipts should be generated appropriately for maintaining records.  So these are some significant solutions to resolve ethical issue of privacy.

Conclusion

In conclusion, all IT giant companies such as Google, Apple, Microsoft and others are serious about security and privacy of their customers’ data. That is why with its enormous services and products, these are also given priority to high level of protection from cyber-criminals. Not only at developers’ end but also at users’ end privacy should be maintained at high level.

 

References

Taylor, H. (2017). Privacy will hit tipping point next year: Study. CNBC. Retrieved 12 September 2017, from https://www.cnbc.com/2015/11/09/privacy-will-hit-tipping-point-in-2016.html

SearchCIO. (2017). What is ICT (information and communications technology, or technologies)? - Definition from WhatIs.com. (2017). Retrieved 12 September 2017, from https://searchcio.techtarget.com/definition/ICT-information-and-communications-technology-or-technologies

Techterms.com. (2017). ICT (Information and Communication Technologies) Definition. Retrieved 12 September 2017, from https://techterms.com/definition/ict

Sevenpillarsinstitute.org. (2017). Moral Theories. Retrieved 12 September 2017, from https://sevenpillarsinstitute.org/morality-101/moral-traditions

Austin. (2017). Chapter 6 - Four Classic Theories of Ethics, The Ethical Journalist, …. Slideshare.net. Retrieved 12 September 2017, from https://www.slideshare.net/laustinnc/chapter-6-4-classic-theories-of-ethics?next_slideshow=1

Ruslim. (2017). Ethical theories. Slideshare.net. Retrieved 12 September 2017, from https://www.slideshare.net/NicolasRuslim/ethical-theories-40471063

Opentextbc.ca. (2017). 2.9 Social Contract Theory | Ethics in Law Enforcement. Retrieved 12 September 2017, from https://opentextbc.ca/ethicsinlawenforcement/chapter/2-9-social-contract-theory/

Riemysore.ac.in. (2017). Unit - 1 : Information and Communication Technology | first. Retrieved 12 September 2017, from https://www.riemysore.ac.in/ict/unit__1__information_and_communication_technology.html

Luceo.net. (2017). Modern and Classical Ethical Theories – Luceo Magazine. Retrieved 12 September 2017, from https://luceo.net/ethics/

Spot.colorado.edu. (2017). LectureforExercise1.html. Retrieved 12 September 2017, from https://spot.colorado.edu/~tooley/Lecture3-EthicalTheories.html

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Privacy Will Hit Tipping Point In 2016. Retrieved from https://myassignmenthelp.com/free-samples/privacy-will-hit-tipping-point-in-2016.

"Privacy Will Hit Tipping Point In 2016." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/privacy-will-hit-tipping-point-in-2016.

My Assignment Help (2018) Privacy Will Hit Tipping Point In 2016 [Online]. Available from: https://myassignmenthelp.com/free-samples/privacy-will-hit-tipping-point-in-2016
[Accessed 17 January 2020].

My Assignment Help. 'Privacy Will Hit Tipping Point In 2016' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/privacy-will-hit-tipping-point-in-2016> accessed 17 January 2020.

My Assignment Help. Privacy Will Hit Tipping Point In 2016 [Internet]. My Assignment Help. 2018 [cited 17 January 2020]. Available from: https://myassignmenthelp.com/free-samples/privacy-will-hit-tipping-point-in-2016.


At MyAssignmenthelp.com, we are committed to deliver quality assignment assistance in the fastest way possible. To make our service delivery fast, we have hired subject matter experts to work on different subject specific assignments. We have hired experts who owe in-depth knowledge in their respective subjects. As per their expertise, they provide geography assignment help, Physics assignment help, Strategic assignment help, history assignment help, art architecture assignment help and assistance with other subjects as well.

Latest It Write Up Samples

MN502-Impact Of Ransom Eare In The Society

Download : 0 | Pages : 8

Answer: Introduction Ransom ware is a subset of the malicious software also known as malware invented from the cryptovirology which is designed to threaten the general public on account of stealing of data saved on either, computer or tablets. This software blocks the data of the person and the same is handed over to the person back once the money is received in the form of ransom [1]. The consequences of not giving the ransom can be so bad t...

Read More arrow

BLDG2015 Building Information Management

Download : 0 | Pages : 3

Answer: The Quality Assurance (QA) process would primarily consist of four kinds of distinct stages. These stages are mainly responsible for the controlling of errors and information redundancy within the Business Information Modelling (BIM) Process. Scope Verification Meeting– After the assigning of the project, the Project Manager should request the scope of the project and a particular copy of the scoped documents. These documents ...

Read More arrow

HI5019-Strategic Analysis Of WesFarmers Limited

Download : 0 | Pages : 13

Answer: Introduction This report aims to provide a detailed strategic analysis of the company, WesFarmers Limited. The essential analysis is completed with the help of PESTLE analysis, Porter’s Five Forces analysis and the threats and opportunities of the company is discussed.  A detailed report of a discussion about the resources of the firm is discussed. The capabilities of the organisation is discussed and the capabilities are e...

Read More arrow

MN504-Bitcoin And Ethereum Security And Privacy

Download : 0 | Pages : 8

Answer: Introduction: The Blockchain technology is a new emerging technology in the field of security solutions. The blockchain technology is based on the cryptography securities [1]. The blockchain technology was announced for supporting the crypto-currency for the security related issues but now the blockchain technology used by many sectors including some business sector also. This type of blockchain is named as private blockchain. Other t...

Read More arrow

ITECH7402-Ethical Responsibilities In This Case Study

Download : 0 | Pages : 7

Answer: Introduction An organization requires various ethical practices. This helps the employees to stay disciplined and well mannered. It also helps in smooth running of the activities under a particular system. Good ethical practices help the organization to maintain a good working environment (Morris, 2016). In the provided case study, an organization named NewAge Pty Ltd produces operating systems for another organization that manufactur...

Read More arrow
Next
watch

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,179,595

Orders

4.9/5

Overall Rating

5,056

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

798 Order Completed

97% Response Time

Benjamin Blakeman

MSc in Medical Technology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

154 Order Completed

97% Response Time

Harold Alderete

PhD in Economics

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

234 Order Completed

100% Response Time

Samantha Ji

PhD in Chemistry with Specialization in Organic

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

647 Order Completed

98% Response Time

Adlina Han

Masters in Marketing with Specialization in Branding

Singapore, Singapore

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

The instructor like the assignment and no need to redo it. She was impressed by the quality of the assignment.

flag

User Id: 364013 - 17 Jan 2020

Australia

student rating student rating student rating student rating student rating

The deadline for my assignment passed by a few hours but the finished result was correct and looked great! The customer service chat line is very quick to get you answers and responses. I will definitely use them again in the future!

flag

User Id: 363787 - 17 Jan 2020

Australia

student rating student rating student rating student rating student rating

I am always excited to see the grades because I have full confidence in the writers.

flag

User Id: 106921 - 17 Jan 2020

Australia

student rating student rating student rating student rating student rating

I love this company it’s some dislike about it but I love the experts that helps with the assignment

flag

User Id: 334177 - 17 Jan 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?