Topic > Violations of privacy via the Internet - 2165

Today in society people are expected to be able to protect their privacy, but the very definition of privacy states that this goal is in no way completely achievable, nor is it will never be. And why would people want this when it has been proven that achieving absolute privacy would mean losing one's place in society (Nehf)? But in recent years, privacy violations via the Internet have gotten out of hand. Until privacy becomes a major concern for Internet users, they will remain unsafe and easy targets for dishonest scammers, other users, data collectors, and more. There are many issues surrounding the Internet and its current privacy systems, one of the biggest being the current agreement on user responsibility. Currently, individuals are responsible for correcting their own privacy violations. This means that if an issue were to occur and a user's privacy was breached, the user would be largely responsible for the majority of the recovery process, whatever that might entail. The problem is that people rarely know that a privacy violation has actually occurred (Stefoff). Many skilled online scammers can steal a person's personal information so clandestinely that the victim is unaware of the dangerous theft. Furthermore, tracing problems back to their causes or sources is nearly impossible (Brin). Because scammers are so skilled at their unethical occupation, they are adept at leaving no trail to follow that would enable their incrimination. Another more well-known example of large-scale Internet destruction is cyberbullying. Cyberbullying occurs when a child, preteen, or adolescent is tormented, threatened, harassed, humiliated, embarrassed, or otherwise targeted by another child, preteen, or adolescent using the Internet, int... medium of paper... . ..Bullying: perspectives.” Issues: Understanding the controversy and the company. January 27, 2011. ABC-CLIO. Network. September 14, 2011.Dinev, Tamara and Paul Hart. “Internet privacy concerns and social awareness as determinants of transaction intention.” International Journal of Electrical Trade 10.2. (2005): 7-29. Jstor. Network. September 14, 2011.Kasper, Debbie VS “The Evolution (or Devolution) of Privacy.” Sociological Forum 20.1 (2005): 69-92. Jstor. Network. September 21, 2011.Nehf, James P. “Shopping for Privacy on the Internet.” Journal of Consumer Affairs 41.3 (2007). Print.Orwell, George. 1984. New York: Penguin, 2002. Print.Stefoff, Rebecca. “Security vs. Privacy". New York: Marshall Cavendish Benchmark, 2008: 23. Questiona. Network. September 18, 2011.Subrahmanyam, Kaveri and Patricia Greenfield. The future of children. January 12, 2008. Jstor. Network. 10 September 2011.