BCO3442 - Privacy: A Critical Analysis of its Existence Today
VerifiedAdded on 2023/06/11
|6
|2541
|198
Essay
AI Summary
This argumentative essay explores the complex issue of privacy in contemporary society, examining both sides of the argument regarding its existence. It acknowledges the challenges to privacy posed by social media, data breaches, and online tracking, highlighting the vulnerabilities individuals face in safeguarding their personal information. The essay also discusses the measures in place to protect privacy, such as password protection, two-step verification, and anti-virus software. It analyzes how these measures contribute to a sense of security and enable individuals and companies to conduct activities effectively. The essay concludes by affirming that while privacy is undoubtedly under threat, it still exists in society due to these protective mechanisms and individual efforts to maintain control over personal data. Desklib provides a platform for students to access such solved assignments and past papers.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Privacy does not exist IN TODAY’S
sOCIETY
sOCIETY
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Privacy
“Privacy does not really exist in the today’s society”
It has been analyzed that in the current situation, privacy has a major role and it is seen
that in conducting day to day activities privacy is important. The personal information of a
person is also safeguarded so that activities can be completed in a right manner. In this essay the
discussion will be based on "Privacy does not really exist in the today's society". This is a type of
argumentative paper in which discussion will be made in favor as well as against the argument
which is stated.
Yes, it can be said that in today's society existence of privacy is not there because of
leakage and breaching of personal data of a person which makes them feel unprotected. For an
example, it can be analyzed that due to information leakage and data breaching from Facebook
or other social media websites people face problems (Wang et al., 2014). Every day millions of
people use these websites and if their data is not secure then it can create a major issue. It is
necessary to keep the personal information protected but in the present situation, it has been
analyzed that people are facing problems regarding their privacy which is considered as a major
problem in the present environment (Burkell et al., 2014).
Problems for parents as well as teenagers are created as the information is simply
available on the social media sites. People are getting matured in their early age by gaining
knowledge from the social media sites. Features like tracking, monitoring and reporting are
allowed by the social media and other technologies. Tracking of important data of any person
can also be done with the help of social media which then impact negatively on that person.
Majority of people faced this issue of data breaching for social media. Fake accounts of people
are made which can defame the individual in the society. This impact is negative on that person
and feeling of frustration can take place at the time of doing the activities on the routine basis.
It has been seen that next statement is related to the online platforms that are present in
the environment. This is a supportive argument in which it has been seen that privacy of the
individual is hindered just because of the availability of the social media sites. It has been seen
that in the recent scenario to maintain privacy is considered as one of the difficult tasks. Now
day's people are taking the support of the social media sites in the context of the political
framework. It can be evaluated that privacy is not there in the society and the information which
is posted is used by the other people. It is seen that people are opening fake account of the other
person and it is giving negative impact on their life and due to this their image in the society is
also spoiled (Eastin et al., 2016). The mindsets of the people are changed just because of the
social media sites. By giving advertisements the people start thinking in the other manner and
also it is seen that the effect is also one the routine activities. The overall security of the
individual is affected when giving advertisements on the social media. It can also be said that in
society people are afraid to give their information as there is less security of their information.
1
“Privacy does not really exist in the today’s society”
It has been analyzed that in the current situation, privacy has a major role and it is seen
that in conducting day to day activities privacy is important. The personal information of a
person is also safeguarded so that activities can be completed in a right manner. In this essay the
discussion will be based on "Privacy does not really exist in the today's society". This is a type of
argumentative paper in which discussion will be made in favor as well as against the argument
which is stated.
Yes, it can be said that in today's society existence of privacy is not there because of
leakage and breaching of personal data of a person which makes them feel unprotected. For an
example, it can be analyzed that due to information leakage and data breaching from Facebook
or other social media websites people face problems (Wang et al., 2014). Every day millions of
people use these websites and if their data is not secure then it can create a major issue. It is
necessary to keep the personal information protected but in the present situation, it has been
analyzed that people are facing problems regarding their privacy which is considered as a major
problem in the present environment (Burkell et al., 2014).
Problems for parents as well as teenagers are created as the information is simply
available on the social media sites. People are getting matured in their early age by gaining
knowledge from the social media sites. Features like tracking, monitoring and reporting are
allowed by the social media and other technologies. Tracking of important data of any person
can also be done with the help of social media which then impact negatively on that person.
Majority of people faced this issue of data breaching for social media. Fake accounts of people
are made which can defame the individual in the society. This impact is negative on that person
and feeling of frustration can take place at the time of doing the activities on the routine basis.
It has been seen that next statement is related to the online platforms that are present in
the environment. This is a supportive argument in which it has been seen that privacy of the
individual is hindered just because of the availability of the social media sites. It has been seen
that in the recent scenario to maintain privacy is considered as one of the difficult tasks. Now
day's people are taking the support of the social media sites in the context of the political
framework. It can be evaluated that privacy is not there in the society and the information which
is posted is used by the other people. It is seen that people are opening fake account of the other
person and it is giving negative impact on their life and due to this their image in the society is
also spoiled (Eastin et al., 2016). The mindsets of the people are changed just because of the
social media sites. By giving advertisements the people start thinking in the other manner and
also it is seen that the effect is also one the routine activities. The overall security of the
individual is affected when giving advertisements on the social media. It can also be said that in
society people are afraid to give their information as there is less security of their information.
1

Privacy
Also, there are many hackers present in the society who are taking the information of the other
people are using it for their benefit. The hackers hack the private account of the people and it not
only gives impact on the personal life of an individual but also adverse impact is seen in the
social life. Like on social media sites when information is given by a person then it is stolen by
the third person and they conduct the activity on the behalf of the individual (Maras, 2015).
Hence, it can state that there are many methods that can impact the privacy of the people
or of the society. It is essential for the individuals to emphasize on controlling the privacy of the
people so that they can complete the activities in an ethical manner. Privacy is considered as an
important factor and it can be stated that with the help of social media sites the overall operations
of the person can be analyzed and there are many accidents which are taking place with the
common people. There are approximately 99 percent of the people who are using the social
media sites in the present scenario and only there is 1 percent who is away or uses less social
media sites like Twitter. So, the majority of the information of the people is showcased on the
social media sites (Weller et al., 2014).
There are many problems which are taking place between the children and their parents
just because of the social media websites or the social media platform. The teenagers who are
taking into consideration various activities and paying to avail the services are indulging
themselves in the fraudulent activities as it is seen that people are now days taking advantage by
changing the mindset of the people. They are changing the entire mindset by giving them offers
which are not ethical in the eyes of law (Terzi, Terzi and Sagiroglu, 2015).
So, it has been seen that by the proper guidance of the parents, teenagers are involved in
the unethical activities through social media sites. When teenagers spend their money it is seen
that the accounts details are taken by the other individuals or hackers and it sometimes affects the
people by focusing on the financial status of the person. Individuals also achieve an undue
advantage which gives adverse impact on the entire position or the financial status of a person.
With the leak of the important information, it is seen that security of the people is affected and
also negative impact is made on the entire activities.
It can also be said that privacy exists in the society by focusing on the factors like
password system and OTP services. To manage or control the privacy there are various steps that
are available for the individuals who are living in the society. Password protection method is
made available for the people that can help to secure the private information of the people. By
setting a password on the bank accounts or on social media accounts it can be easy for the people
to safeguard their information and also the individual should keep in mind to set complicated
passwords so that hackers or the other individuals cannot access it or hack the account. It is seen
that when complex passwords are set by the people then it is difficult for the hackers to hack the
bank account or the social media accounts. So, by focusing on this facility which is available for
the people who are living in the society it can be said that in society privacy exists (Mascetti,
Ricci and Ruggieri, 2014).
2
Also, there are many hackers present in the society who are taking the information of the other
people are using it for their benefit. The hackers hack the private account of the people and it not
only gives impact on the personal life of an individual but also adverse impact is seen in the
social life. Like on social media sites when information is given by a person then it is stolen by
the third person and they conduct the activity on the behalf of the individual (Maras, 2015).
Hence, it can state that there are many methods that can impact the privacy of the people
or of the society. It is essential for the individuals to emphasize on controlling the privacy of the
people so that they can complete the activities in an ethical manner. Privacy is considered as an
important factor and it can be stated that with the help of social media sites the overall operations
of the person can be analyzed and there are many accidents which are taking place with the
common people. There are approximately 99 percent of the people who are using the social
media sites in the present scenario and only there is 1 percent who is away or uses less social
media sites like Twitter. So, the majority of the information of the people is showcased on the
social media sites (Weller et al., 2014).
There are many problems which are taking place between the children and their parents
just because of the social media websites or the social media platform. The teenagers who are
taking into consideration various activities and paying to avail the services are indulging
themselves in the fraudulent activities as it is seen that people are now days taking advantage by
changing the mindset of the people. They are changing the entire mindset by giving them offers
which are not ethical in the eyes of law (Terzi, Terzi and Sagiroglu, 2015).
So, it has been seen that by the proper guidance of the parents, teenagers are involved in
the unethical activities through social media sites. When teenagers spend their money it is seen
that the accounts details are taken by the other individuals or hackers and it sometimes affects the
people by focusing on the financial status of the person. Individuals also achieve an undue
advantage which gives adverse impact on the entire position or the financial status of a person.
With the leak of the important information, it is seen that security of the people is affected and
also negative impact is made on the entire activities.
It can also be said that privacy exists in the society by focusing on the factors like
password system and OTP services. To manage or control the privacy there are various steps that
are available for the individuals who are living in the society. Password protection method is
made available for the people that can help to secure the private information of the people. By
setting a password on the bank accounts or on social media accounts it can be easy for the people
to safeguard their information and also the individual should keep in mind to set complicated
passwords so that hackers or the other individuals cannot access it or hack the account. It is seen
that when complex passwords are set by the people then it is difficult for the hackers to hack the
bank account or the social media accounts. So, by focusing on this facility which is available for
the people who are living in the society it can be said that in society privacy exists (Mascetti,
Ricci and Ruggieri, 2014).
2

Privacy
It has been seen that at the time of opening a new account on social media, the password
is one of the major components that is asked so that the security can be maintained by the people.
So, at this time it is important for the people to set complicated or complex passwords so that
their accounts can be secured and also it will help to manage and reduce the overall complexity.
When passwords are set by the people it helps to increase satisfaction as they think that their
information is now secured.
It has also been seen that there are many large companies who attract customers by
giving them maximum security and by giving security it can be easy to retain the customers for a
long time. To safeguard the overall data is an important factor that can help the company to
survive in the competitive environment. When the company offers privacy or security of the
information the only customers will choose to avail the services or the products. When
customers are retained it can be easy to attain profitability. To provide safety to the customers is
one of the important factors that help to manage the entire activities of the people and also helps
the company to grow in the competitive market environment (Finn and Wright, 2016).
Privacy can also be maintained by focusing on the factors which help to avoid the overall
transparency. It is important to turn off the Google activity tracker so that the activities of the
individual cannot be tracked and also it can be easy for them to maintain privacy. The
individuals can also focus on Block ads on the browser and can take extra time to actually read
the overall privacy policies so that important information cannot be leaked. It has been seen that
this can help to maintain the overall privacy and can also give an advantage to the customers.
The individuals should also install the new application by focusing on the information
and it will also help to maintain to install those applications which are safe for the people. It is
also important to consider the sophisticated techniques for securing the online identity and
communication with the end to end encryption (Gal, Shifman and Kampf, 2016).
The next option which is available is related with the two-step verification in which it is
seen that at the time of opening the new accounts or the existing accounts people are asked to
complete the two-step verification so that it can be easy for the people to secure their information
or the data in a proper manner. It has been seen that people are focusing on opening the accounts
by considering two-step verifications as this can help to keep the information private and safe in
the present scenario. In two-step verification,, it can be seen that people or the individuals are
asked for the verification so that it can be easy for them to complete the activities. To operate the
activities of banking the security is given to the people so that they can make banking
transactions simple and it can be simple to manage the overall account of the bank through
online banking. This is the option which is given to the individuals so that they can complete
their online transactions in an easy manner. In the present scenario, there are many individuals
who are paying or purchasing their products through online shopping. It has been seen that
through this system privacy of the individuals can be maintained and also people complete their
activities with full confidence and dedication (Bergstrom, 2015).
3
It has been seen that at the time of opening a new account on social media, the password
is one of the major components that is asked so that the security can be maintained by the people.
So, at this time it is important for the people to set complicated or complex passwords so that
their accounts can be secured and also it will help to manage and reduce the overall complexity.
When passwords are set by the people it helps to increase satisfaction as they think that their
information is now secured.
It has also been seen that there are many large companies who attract customers by
giving them maximum security and by giving security it can be easy to retain the customers for a
long time. To safeguard the overall data is an important factor that can help the company to
survive in the competitive environment. When the company offers privacy or security of the
information the only customers will choose to avail the services or the products. When
customers are retained it can be easy to attain profitability. To provide safety to the customers is
one of the important factors that help to manage the entire activities of the people and also helps
the company to grow in the competitive market environment (Finn and Wright, 2016).
Privacy can also be maintained by focusing on the factors which help to avoid the overall
transparency. It is important to turn off the Google activity tracker so that the activities of the
individual cannot be tracked and also it can be easy for them to maintain privacy. The
individuals can also focus on Block ads on the browser and can take extra time to actually read
the overall privacy policies so that important information cannot be leaked. It has been seen that
this can help to maintain the overall privacy and can also give an advantage to the customers.
The individuals should also install the new application by focusing on the information
and it will also help to maintain to install those applications which are safe for the people. It is
also important to consider the sophisticated techniques for securing the online identity and
communication with the end to end encryption (Gal, Shifman and Kampf, 2016).
The next option which is available is related with the two-step verification in which it is
seen that at the time of opening the new accounts or the existing accounts people are asked to
complete the two-step verification so that it can be easy for the people to secure their information
or the data in a proper manner. It has been seen that people are focusing on opening the accounts
by considering two-step verifications as this can help to keep the information private and safe in
the present scenario. In two-step verification,, it can be seen that people or the individuals are
asked for the verification so that it can be easy for them to complete the activities. To operate the
activities of banking the security is given to the people so that they can make banking
transactions simple and it can be simple to manage the overall account of the bank through
online banking. This is the option which is given to the individuals so that they can complete
their online transactions in an easy manner. In the present scenario, there are many individuals
who are paying or purchasing their products through online shopping. It has been seen that
through this system privacy of the individuals can be maintained and also people complete their
activities with full confidence and dedication (Bergstrom, 2015).
3
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Privacy
For managing privacy of the people, there are software's which are introduced into the
society so that it can be simple for the people to secure their private information. Like to reduce
the risk related to information leakage there is anti-virus which is introduced that help to secure
the information and also safeguard the overall information.
So, by analyzing the entire paper it has been seen that privacy is considered as an
important part that helps the people of the society to complete the task in the right manner. So, it
can be stated that yes privacy also exists in the society as there are many options which are
offered to the individuals so that they can secure their information and keep the information
private or safe from the third party. Like the technique related to OTP and also the privacy
setting offered to the customers helps the individuals to keep the information safe and secure
form the third person. When the information is secured then it can help to the company and the
individual to conduct the activities in an effective manner in the competitive environment.
References
Bergstrom, A., 2015. Online privacy concerns: A broad approach to understanding the concerns
of different groups for different uses. Computers in Human Behavior, 53, pp.419-426.
4
For managing privacy of the people, there are software's which are introduced into the
society so that it can be simple for the people to secure their private information. Like to reduce
the risk related to information leakage there is anti-virus which is introduced that help to secure
the information and also safeguard the overall information.
So, by analyzing the entire paper it has been seen that privacy is considered as an
important part that helps the people of the society to complete the task in the right manner. So, it
can be stated that yes privacy also exists in the society as there are many options which are
offered to the individuals so that they can secure their information and keep the information
private or safe from the third party. Like the technique related to OTP and also the privacy
setting offered to the customers helps the individuals to keep the information safe and secure
form the third person. When the information is secured then it can help to the company and the
individual to conduct the activities in an effective manner in the competitive environment.
References
Bergstrom, A., 2015. Online privacy concerns: A broad approach to understanding the concerns
of different groups for different uses. Computers in Human Behavior, 53, pp.419-426.
4

Privacy
Burkell, J., Fortier, A., Wong, L.L.Y.C. and Simpson, J.L., 2014. Facebook: Public space, or
private space?. Information, Communication & Society, 17(8), pp.974-985.
Eastin, M.S., Brinson, N.H., Doorey, A. and Wilcox, G., 2016. Living in a big data world:
Predicting mobile commerce activity through privacy concerns. Computers in Human
Behavior, 58, pp.214-220.
Finn, R.L. and Wright, D., 2016. Privacy, data protection and ethics for civil drone practice: A
survey of industry, regulators and civil society organisations. Computer Law & Security
Review, 32(4), pp.577-586.
Gal, N., Shifman, L. and Kampf, Z., 2016. “It Gets Better”: Internet memes and the construction
of collective identity. New Media & Society, 18(8), pp.1698-1714.
Maras, M.H., 2015. Internet of Things: security and privacy implications. International Data
Privacy Law, 5(2), p.99.
Mascetti, S., Ricci, A. and Ruggieri, S., 2014. Introduction to special issue on computational
methods for enforcing privacy and fairness in the knowledge society. Artificial Intelligence and
Law, 22(2), pp.109-111.
Terzi, D.S., Terzi, R. and Sagiroglu, S., 2015, December. A survey on security and privacy
issues in big data. In Internet Technology and Secured Transactions (ICITST), 2015 10th
International Conference for (pp. 202-207). IEEE.
Wang, Y., Leon, P.G., Acquisti, A., Cranor, L.F., Forget, A. and Sadeh, N., 2014, April. A field
trial of privacy nudges for facebook. In Proceedings of the SIGCHI conference on human factors
in computing systems (pp. 2367-2376). ACM.
Weller, K., Bruns, A., Burgess, J., Mahrt, M. and Puschmann, C., 2014. Twitter and society (Vol.
89, p. 447). P. Lang.
5
Burkell, J., Fortier, A., Wong, L.L.Y.C. and Simpson, J.L., 2014. Facebook: Public space, or
private space?. Information, Communication & Society, 17(8), pp.974-985.
Eastin, M.S., Brinson, N.H., Doorey, A. and Wilcox, G., 2016. Living in a big data world:
Predicting mobile commerce activity through privacy concerns. Computers in Human
Behavior, 58, pp.214-220.
Finn, R.L. and Wright, D., 2016. Privacy, data protection and ethics for civil drone practice: A
survey of industry, regulators and civil society organisations. Computer Law & Security
Review, 32(4), pp.577-586.
Gal, N., Shifman, L. and Kampf, Z., 2016. “It Gets Better”: Internet memes and the construction
of collective identity. New Media & Society, 18(8), pp.1698-1714.
Maras, M.H., 2015. Internet of Things: security and privacy implications. International Data
Privacy Law, 5(2), p.99.
Mascetti, S., Ricci, A. and Ruggieri, S., 2014. Introduction to special issue on computational
methods for enforcing privacy and fairness in the knowledge society. Artificial Intelligence and
Law, 22(2), pp.109-111.
Terzi, D.S., Terzi, R. and Sagiroglu, S., 2015, December. A survey on security and privacy
issues in big data. In Internet Technology and Secured Transactions (ICITST), 2015 10th
International Conference for (pp. 202-207). IEEE.
Wang, Y., Leon, P.G., Acquisti, A., Cranor, L.F., Forget, A. and Sadeh, N., 2014, April. A field
trial of privacy nudges for facebook. In Proceedings of the SIGCHI conference on human factors
in computing systems (pp. 2367-2376). ACM.
Weller, K., Bruns, A., Burgess, J., Mahrt, M. and Puschmann, C., 2014. Twitter and society (Vol.
89, p. 447). P. Lang.
5
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.