NIT2201 - Analytical Essay: Online Privacy, Digital Rights & Ethics

Verified

Added on  2023/01/19

|7
|1934
|95
Essay
AI Summary
This essay provides an in-depth discussion of online privacy, emphasizing its importance in safeguarding individuals' digital materials. It explores the concept of privacy, including the voluntary sacrificing of privacy for perceived benefits, and defines digital privacy within the context of information, individual, and communication privacy. The essay addresses issues related to digital materials, such as data confidentiality, integrity, and privacy, and suggests measures for ensuring digital privacy, including updating privacy settings, blocking cookies, and implementing robust security measures for cloud storage. It also considers whether a uniform level of privacy is necessary for all individuals, highlighting the need for government regulations and individual responsibility in managing online privacy. The discussion references the Privacy Act and its commitment to balanced privacy legislation for the private sector in Australia. The essay concludes by reiterating the essential role of online privacy in securing individuals' digital information and promotes a balance between individual control and regulatory oversight.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: ONLINE PRIVACY
ONLINE PRIVACY
Name of student
Name of university
Author’s note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
ONLINE PRIVACY
Introduction
This essay aims to discuss the various aspects of the online privacy and the
importance of the online privacy. The brief discussion of the privacy and the digital privacy is
provided in this essay and the digital privacy in Australia has been briefly stated in this essay.
The issues that are raised around the digital materials has been provided in this report and the
options that must be considered for ensuring the digital privacy has been discussed. The
measures that could be used for the ensuring the users have been protected on the platform
like the Facebook and the iCloud has been discussed clearly. The decision of whether each
person requires the similar level of the privacy has been discussed in this essay. Lastly this
essay concludes with the appropriate conclusion for the essay.
Discussion
Privacy could be described as the ability of any individual or any group to seclude
themselves or any information regarding themselves and therefore express themselves as
selectively. The boundaries and the content of what has been considered private might differ
among the individuals and the cultures but they could share the mutual themes. The privacy
could be voluntarily sacrificed and it is done normally in the exchange for the perceived
benefits and the frequently with the particular losses and the dangers, even though this is the
increasingly strategic view of the human relationships (Smit, Van Noort & Voorveld, 2014).
The significant research proves that the people are increasingly more willing to voluntarily
sacrifice the privacy if data gatherer has been seen as the transparent as to what the
information has been gathered and the methods by which the utilisation has been done. The
digital privacy could be considered as the collective definition, which covers the sub related
categories that are the information privacy, individual privacy and the communication
privacy (Bartsch & Dienlin, 2016). It is frequently utilised in the contexts that significantly
Document Page
2
ONLINE PRIVACY
promotes the advocacy on the behalf of the individual and the consumer rights of the privacy
in the digital spheres and it is commonly utilised in the opposition to the business practices of
the several e-marketers for the collection and then utilise these information and the data
(Baek, Kim & Bae, 2014).
The issues that are raised for the digital materials could be collectively described as
the issues of the confidentiality of the data, integrity of the data, privacy of the data and the
keeping the context of the data (Trepte et al., 2015). The materials that are provided through
the digital medium often raises the issues of the integrity of the materials and the authenticity
of the materials (Bergström, 2015). Some of the countries and the individuals are still
reluctant in executing the online business as there might be the issues of the authenticity of
the material that has been gained.
The options that are to be considered for ensuring the digital privacy could be simple
and basic. It is important to understand the basics of the performing the digital marketing and
the digital interaction (Baruh, Secinti & Cemalcilar, 2017). It is required to be increasingly
stay updated regarding the modern policies and the security measures that have been
implemented for securing the digital platform. It is required to update the privacy settings on
the website and the services, specifically on the social media websites like the Facebook and
the search sites like the google and the Yahoo website and this could be the ideal place for the
protection of the data of the individuals (Saeri et al., 2014). As majority of the sites default to
the information being shared in the public, the changing of the settings could help
significantly in the securing the confidentiality of the information. The cookies that are sent
to the computer as soon as any individual access any website are required to be blocked. The
blocking of cookies that are sent by any third party could help significantly in the maintaining
the anonymity on the online platform (Kilburn, Kilburn & Cates, 2014). The blocking of the
cookies makes it so the websites would have the significantly harder time in the tracking the
Document Page
3
ONLINE PRIVACY
last time any individual visited the website. On the iCloud data storage, it is required to
implement the proper and strict security measures for ensuring that the data of the users are
secured and protected from any unauthorised individual who could steal the data (Minkus,
Liu & Ross, 2015). The implementation of proper authentication protocols and the strict
credentials could help in the ensuring the security of the cloud is at the maximum. The
implementation of the firewall in the service provider of the cloud could help in
implementing the extra layer of security on the cloud storage.
It is not necessary that all the people require the similar level of the privacy. Some
people require the majority of the privacy measures as these individual posses the
confidential data that could exert the immense damage if any of the information has been
stolen or they could face the threats of the blackmail or even ransomware if the data has been
leaked. It is required by the government to implement the news laws and the regulations on
the companies working process as the information that is presently shared on the internet
platform is extensive and it could affect the common people severely if in any condition that
data has been lost by the companies (Jia et al., 2015). The companies must be suggested to
maintain the proper accessing protocols and the security mechanisms for the ensuring that
any unauthorised individual could not access the database of the organisations for stealing the
data. The constant monitoring of the security protocols of the organisation by the organisation
could help in the monitoring whether the companies are managing the protocols properly or
not. It is suggested to manage their own privacy by the individuals and the decision of what
amount that they wish to share on the internet is completely of their own and this privacy at
no cost must be violated. It could help in the management of the responsibility among the
individual and the threat of the data loss of the security threats could decrease significantly.
The users or the individuals who are visiting the internet platform would have the common
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
ONLINE PRIVACY
knowledge about the requirements of the privacy and the benefits of managing the privacy of
their own.
The provisions in Privacy act related to the private sector organisation that includes
the NPPs and the privacy code provisions has been enacted in the year 2000 and this was
directed as the commitment of the government for enacting the balanced privacy legislation
for private sector for ensuring that complete advantage might be taken of all the opportunities
that are presented by the electronic commerce for the Australian business in the overseas and
the Australian constitution.
Conclusion
Therefore, it can be concluded that the online privacy is the essential in the securing
of the materials of the individuals on the internet platform. The privacy could be voluntarily
sacrificed and it is done normally in the exchange for the perceived benefits and the
frequently with the particular losses and the dangers, even though this is the increasingly
strategic view of the human relationships. The issues that are raised for the digital materials
could be collectively described as the issues of the confidentiality of the data, integrity of the
data, privacy of the data and the keeping the context of the data. It is not necessary that all the
people require the similar level of the privacy. Some people require the majority of the
privacy measures as these individual posses the confidential data that could exert the
immense damage if any of the information has been stolen or they could face the threats of
the blackmail or even ransomware if the data has been leaked.
Document Page
5
ONLINE PRIVACY
References
Baek, Y. M., Kim, E. M., & Bae, Y. (2014). My privacy is okay, but theirs is endangered:
Why comparative optimism matters in online privacy concerns. Computers in Human
Behavior, 31, 48-56.
Bartsch, M., & Dienlin, T. (2016). Control your Facebook: An analysis of online privacy
literacy. Computers in Human Behavior, 56, 147-154.
Baruh, L., Secinti, E., & Cemalcilar, Z. (2017). Online privacy concerns and privacy
management: A meta-analytical review. Journal of Communication, 67(1), 26-53.
Bergström, A. (2015). Online privacy concerns: A broad approach to understanding the
concerns of different groups for different uses. Computers in Human Behavior, 53,
419-426.
Jia, H., Wisniewski, P. J., Xu, H., Rosson, M. B., & Carroll, J. M. (2015, February). Risk-
taking as a learning process for shaping teen's online information privacy behaviors.
In Proceedings of the 18th ACM Conference on Computer Supported Cooperative
Work & Social Computing (pp. 583-599). ACM.
Kilburn, A., Kilburn, B., & Cates, T. (2014). Drivers of student retention: System
availability, privacy, value and loyalty in online higher education. Academy of
Educational Leadership Journal, 18(4).
Minkus, T., Liu, K., & Ross, K. W. (2015, May). Children seen but not heard: When parents
compromise children's online privacy. In Proceedings of the 24th International
Conference on World Wide Web (pp. 776-786). International World Wide Web
Conferences Steering Committee.
Document Page
6
ONLINE PRIVACY
Saeri, A. K., Ogilvie, C., La Macchia, S. T., Smith, J. R., & Louis, W. R. (2014). Predicting
Facebook users’ online privacy protection: Risk, trust, norm focus theory, and the
theory of planned behavior. The Journal of social psychology, 154(4), 352-369.
Smit, E. G., Van Noort, G., & Voorveld, H. A. (2014). Understanding online behavioural
advertising: User knowledge, privacy concerns and online coping behaviour in
Europe. Computers in Human Behavior, 32, 15-22.
Trepte, S., Teutsch, D., Masur, P. K., Eicher, C., Fischer, M., Hennhöfer, A., & Lind, F.
(2015). Do people know about privacy and data protection strategies? Towards the
“Online Privacy Literacy Scale”(OPLIS). In Reforming European data protection
law (pp. 333-365). Springer, Dordrecht.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]