ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Digital Privacy and Issues

Verified

Added on  2023/03/20

|9
|2360
|34
AI Summary
This article explores the concept of digital privacy and the various issues associated with it. It discusses the importance of protecting digital privacy and provides strategies to enhance it. The article also highlights the role of companies and individuals in ensuring data privacy. Additionally, it compares different data regulation laws and their impact on privacy.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: DIGITAL PRIVACY AND ISSUES
DIGITAL PRIVACY AND ISSUES
Name of the Student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1DIGITAL PRIVACY AND ISSUES
Digital privacy and its issues:
Digital privacy refers to privacy in a digital context. The advancement of technology has
brought digitalization in various aspect of life and it is integrated with day-to-day activities.
Hence, digital technology has become an essential part of society (Alashoor, Aryal & Kenny,
2016). There is no confusion that it has made daily activities more efficient and has brought
various opportunities as well. In the traditional sense, privacy is to keep certain information
from others, as this information is sensitive and requires not to be disclosed. Now when
talking about digital privacy, this notion of privacy does not change that much.
Digitalization has replaced traditional paper-based document management. Digital document
is easy to create and share as well. It is also accessible from anywhere. However, the digital
document has various issues that have a significant impact on digital privacy even though it
offers an efficient document organization (Anastasopoulou, Kokolakis & Andriotis, 2017).
Although digital document makes access to information lot easier, people often do not have
knowledge about proper methodology for capturing information, string them and sharing
them with others as a result it is often seen that people violates digital ethics which mention
that when information is being accessed without permission of the owner, it is a violation of
digital ethics. Hence, this is another significant issue associated with digital documents
(Bartsch & Dienlin, 2016). Therefore, it is justified to say that although digital documents
provide easier access to information, there are various issues like digital piracy and violation
of digital ethics.
As digital privacy is an important issue, it is required to develop a proper strategy that
protects digital privacy so that it enhances the effective application of digital technology
(Boerman, Kruikemeier & Zuiderveen Borgesius, 2017). While developing a strategy for
protection of digital privacy it is important to note that no matter how powerful the strategy,
Document Page
2DIGITAL PRIVACY AND ISSUES
if people are not aware of this, this strategy will not be effective. Hence, it is important to
raise awareness among people about digital privacy. People should know what is exactly
mean by digital privacy, what are the possible ways through which security is being violated,
what measures should be taken for protecting digital information as well as digital privacy
(Bennett & Raab, 2017). Awareness among people about this information is extremely
important for ensuring the effectiveness of tools and techniques considered for protecting
digital information and digital privacy while applying digital technologies for executing
various activities on online platforms.
Internet is an important part of the digital revolution and one company that has made its
presence on this platform is Google. It offers various services such as search engine, video
streaming, mail services. Google offers a single password for all of its services which means
users just need to create a common password, which provides access to all of the data
associated with these services. Therefore, it is recommended to review what issues in those
platforms are and How to manage them properly (Chen, Beaudoin & Hong, 2016). In fact,
Google offers to access to data of different platforms in a single place and for that users just
need to login to that particular account with proper login credentials. Hence, a strong
password is required along with two-phase authentication. This will make it difficult to
access the account and if anyone tries to log in to an account or change associated account
password, verification code is required which will be sent to the registered mobile number
and without that it is not possible to change the password and access that particular account
without permission of the owner of the account. Hence, two-phase authentication is
recommended in this regard.
Social media has become an important part of the daily life of most of the people as it allows
communicating with the whole world. In order to protect privacy on Facebook, it is
recommended not to share too much personal information on Facebook and create a strong
Document Page
3DIGITAL PRIVACY AND ISSUES
password for the account. This will make it difficult to access the account without
permission.
For securing the iCloud account, a strong password is required just like Google and
Facebook. Apple who offers iCloud service recommends feature like two-phase
authentication. Hence this is also recommended to ensure digital privacy while accessing this
service for storing and accessing data from anywhere anytime through smartphone, laptops,
tablets and personal computers.
While discussing digital privacy, it is also important to consider the level of privacy to
formulate an active strategy and to decide does anyone need better security and if so who are
they. While some people spends significant time on the online platform and access online
services, others are not so active on an online platform.
For example, a recent data breach at Twitter, a popular social media platform, has exposed a
million user data. People associated with Twitter has been asked to change their password
immediately to avoid illegal access to their personal information. It shows that users who are
extensive users of online service including social media services should be aware of its
associated security threats and requires adopting enhanced security measures.
While loyalty programs are becoming popular throughout the world for attracting a lot of
consumers, it has some security flaws as well. However, the problem is that most of the
people, around 80% of the people who have loyalty cards do not have an accurate idea of
what type of personal information is being collected, how it is being collected, where it is
used and how the company benefits from this (Esayas & Daly, 2018). Hence, it is required
for a consumer to have a proper idea about policy related to data collection and data privacy.
This information is required if consumers want to have benefits while sharing personal
information with organizations through the loyalty program.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4DIGITAL PRIVACY AND ISSUES
Radisson hotel group, which was affected by a data breach, confirmed that hackers accessed
username, address, email address, phone numbers of their consumers associate with their
loyalty cards, however, no information regarding credit card or password related information
was stolen. However, this shows that it's not only consumers who require awareness about
these programs and their associated security threats, but companies who are collecting and
storing this information also needs to adopt proper security measures as well for protecting
consumer data and privacy.
As new products are being launched in the market that provides digital services, strong
legislation is required. It is important to review that the text for security changed If so why
this has changed (Goddard, 2017). Services such as cloud computing, IoT enabled devices
brings Requirements for improved legislation as these services are quite new than traditional
digital products or services. The legislation will allow for identifying if companies are
considering any illegal means to raise profit. This will make this process more organized and
transparent as well, which will allow people to protect their personal information effectively.
Companies, which collects personal information about users, are responsible to provide
protection to this information (Kokolakis, 2017). However, consumers should also take
responsibility to ensure that their information is safe. Hence it is required to analyze is only
service provider responsible, Dos data owner have a responsibility too. However, there is one
important issue in this context (Marriott, Williams & Dwivedi, 2017). Not everyone has
accurate knowledge about the type of information that is being collected or how it is collected
at all. Hence, in order to create a consistent knowledge about this process, this process needs
to be simple, transparent and authentic. In addition to that, awareness needs to be developed
among people to be aware of this process so that they are able to protect their information
effectively while strengthening their digital privacy.
Document Page
5DIGITAL PRIVACY AND ISSUES
Document Page
6DIGITAL PRIVACY AND ISSUES
Protection of data and ensuring privacy has been an important issue around the world and
hence different data regulation rules are available throughout the world. While some laws are
meant for universal application, some laws are only applicable in a local and national context.
while comparing two important data regulation law The Australian Privacy Principles and the
European Union’s General Data Protection Rule or GDPR, it is important to recognize that
APP is only applicable for organizations specific to Australia, it is applicable for an
organization outside Australia. However, the European Union’s General Data Protection Rule
or GDPR is equally applicable for organizations that are both part of the European Union and
organizations which are not (Martínez-Pérez, De La Torre-Díez & López-Coronado, 2015).
Hence, the GDPR might be considered as a general data privacy law. Apart from this
fundamental difference, there are some other functional differences as well. While the GDPR
recommends ensuring the consent of data owner for data collection, the APP requires an
organization to ensure that this consent is implied and expressed properly (Tankard, 2016).
While GDPR provides organizations timeframe to create security measures to minimize the
impact of a possible data breach, APP requires to create awareness among authorities,
individual data owner through notification about the impact of the data breach along with a
recommendation to manage the impact of a data breach (Voigt & Von dem Bussche, 2017).
hence these two data regulation law has some significant differences in terms of scope,
objectives and data protection techniques.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
7DIGITAL PRIVACY AND ISSUES
References:
Alhouti, S., Johnson, C. M., & D'Souza, G. (2016). The complex web of values: the impact
on online privacy concerns and purchase behaviour. Journal of Electronic Commerce
Research, 17(1), 22.
Chen, H. T., & Chen, W. (2015). Couldn't or wouldn't? The influence of privacy concerns
and self-efficacy in privacy management on privacy protection. Cyberpsychology,
Behavior, and Social Networking, 18(1), 13-19.
Clemons, E. K., & Wilson, J. S. (2015). Family preferences concerning online privacy, data
mining, and targeted ads: Regulatory implications. Journal of Management
Information Systems, 32(2), 40-70.
Dean, M. D., Payne, D. M., & Landry, B. J. (2016). Data mining: an ethical baseline for
online privacy policies. Journal of Enterprise Information Management, 29(4), 482-
504.
Dienlin, T., & Trepte, S. (2015). Is the privacy paradox a relic of the past? An indepth
analysis of privacy attitudes and privacy behaviours. European Journal of Social
Psychology, 45(3), 285-297.
Kumar, P., Vitak, J., Chetty, M., Clegg, T. L., Yang, J., McNally, B., & Bonsignore, E.
(2018, June). Co-designing online privacy-related games and stories with children.
In Proceedings of the 17th ACM Conference on Interaction Design and Children (pp.
67-79). ACM.
Lee, W. Y., Tan, C. S., & Siah, P. C. (2017). The Role of Online Privacy Concern as a
Mediator between Internet Self-Efficacy and Online Technical Protection Privacy
Behavior. Sains Humanika, 9(3-2).
Document Page
8DIGITAL PRIVACY AND ISSUES
Lu, Y. H., Cavallaro, A., Crump, C., Friedland, G., & Winstein, K. (2017, October). Privacy
Protection in Online Multimedia. In Proceedings of the 25th ACM international
conference on Multimedia (pp. 457-459). ACM.
Shaughnessy, K., Rocheleau, J. N., Kamalou, S., & Moscovitch, D. A. (2017). The Effects of
Social Anxiety and Online Privacy Concern on Individual Differences in Internet-
Based Interaction Anxiety and Communication Preferences. Cyberpsychology,
Behavior, and Social Networking, 20(4), 212-217.
Veltri, G. A., & Ivchenko, A. (2017). The impact of different forms of cognitive scarcity on
online privacy disclosure. Computers in human behaviour 73, 238-246.
Weinberger, M., Zhitomirsky-Geffet, M., & Bouhnik, D. (2017). Factors affecting users’
online privacy literacy among students in Israel. Online Information Review, 41(5),
655-671.
Zeissig, E. M., Lidynia, C., Vervier, L., Gadeib, A., & Ziefle, M. (2017, July). Online privacy
perceptions of older adults. In International Conference on Human Aspects of IT for
the Aged Population (pp. 181-200). Springer, Cham.
1 out of 9
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]