100% (1)
page:
8 pages/≈2200 words
Sources:
-1
Style:
MLA
Subject:
Literature & Language
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 28.8
Topic:

Has the Internet Destroyed Privacy? Literature & Language Essay

Essay Instructions:

Keep in mind that your stance on that topic must meet the following requirements:

• It is an argument (not a statement of fact).

• It is arguable from multiple positions by “thinking” people (must be controversial).

• It is researchable (must be publicly discussed enough to result in useful evidence).

You must have at least five reliable sources (most likely from our Internet-based database services but also from notable online sources and traditional library sources, like books, including articles in our textbook if applicable).



Once again, your argument should take the form of one (or some combination) of the argumentative strategies covered in our textbook, but it will include academic research. Use the chapters, listed below, to guide your writing:

• Fact (Chapter 8)

• Definition (Chapter 9)

• Evaluation (Chapter 10)

• Cause/Effect (Chapter 11)

• Problem/Solution (Chapter 12)

WARNING: There can be a temptation when doing research to simply copy the ideas of others. Keep in mind that your ideas should be the center of your argument, and you should use research to establish the issue, provide alternative positions, and support your own ideas. All research should be quoted and cited correctly according to MLA guidelines.



Here is a breakdown of the assignment:



Topic - Open with instructor approval—if you are having trouble settling on a topic, take a look at the topics in Part 5 of the textbook.



Purpose - Choose ONE of the argumentative strategies and make a researched argument about your topic



Audience - Someone who disagrees with you but is open to change and is interested in the topic



Research - You must have at least five sources cited within your paper and referenced on a correct and complete MLA-style Works Cited page. Be sure to cite all use of information and quote and cite all use of words.



Format - MLA format for style and all quotations, citations, and the Works Cited



Style - Formal and academic (no contractions, first or second person point of view, no slang, etc.)



Length – at least 2000 words



Essay Sample Content Preview:
Student's Name
Professor's Name
Course
Date
Has The Internet Destroyed Privacy?
The internet has profoundly influenced the 21st century economy than any other innovation or technology. For example, approximately 70% of the world's population has access to the internet daily. It is unthinkable for businesses and consumers not to be online. Across the globe, nearly 96% of businesses indicate that they have a connection to the internet, while 80% state that they have their websites (Acar et al. 51). The tremendous growth of the internet has caused economies to grow as a whole, including manufacturing and retail companies. The "Czech Internet Development Association" data explain the importance of the internet economy. According to the association, the internet economy has generated an income of more than 350 billion, has enabled companies to rise, and created jobs because many people can work from home using the internet.
Furthermore, industries have been able to raise approximately 3% of GDP by connecting with the internet, therefore generating 115 billion more than agriculture, insurance, and financial services. Also, consumers have been able to use the internet to purchase items online, therefore, saving the cost associated with traveling to the company's premises (Froomkin). Besides, the internet has enabled people to meet virtually, conduct their studies online, and engage in other activities. However, although the internet has countless advantages, it is associated with various demerits, such as violating people's privacy.
How Does the Internet Violate People's Privacy?
Kelleher & William explain that numerous sources cause cyber threats and usually focus on acquiring personal data for exploitation or benefit. Currently, intrusions have become more complex, and as a result, internal safeguards and excellent regulatory is highly required in response. Internet privacy refers to the more substantial subset of data privacy world that includes collecting, using, and secure storing of personal information ("Internet Privacy Laws Revealed - How Your Personal Information Is Protected Online"). Internet privacy is highly concerned with how personal information is exposed to websites through cybersecurity threats, data collection, sharing, and tracking. According to a PRI "Pew Research Institute," nearly 74% of Americans state that safeguarding personal data is essential. PRI also states that approximately 86% of Americans have decided to maintain their privacy by deleting cookies, protecting their addresses, and encrypting their e-mails. Internet privacy violation is everywhere across the world. For example, people release their private data into the cyberspace when they visit websites, enter their debit or credit card information, or register accounts. People also release their data in the process of filling online forms, giving out their e-mails, posting their pictures or videos on social media, and storing their documents or images in cloud storage. The personal data can be shared in ways that endanger.
Froomkin explains that over the few decades, the possibilities for internet breaches has increased significantly. Currently, a law that regulates online privacy has not yet been found, and instead, state and federal laws patchworks are applied. The primary federal laws that influence online privacy include 1914 "Federal Trade Commission Act (FTC)," the 1986 "Electronic Communications Privacy Act (ECPA)" the 1986 "Computer Fraud & Abuse Act (CFAA)," and the 1998 "Children's Online Privacy Protection Act (COPPA)." Moreover, other laws include the 2003 "Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM)," the 1999 "Financial Services Modernization Act (GLBA)," and the 2003 "Fair and Accurate Credit Transactions Act (Facta).
The FTC Act of 1914 monitors deceptive or unfair marketing practices, therefore protecting people's personal information. FTC is the primary federal law that regulates people's privacy and ensures that companies adhere to the law. Also, the act ensures that companies protect personal data and adhere to the outlined privacy policies. Besides, the ECPA Act of 1986 was implemented to enhance the protection of electronic, oral, and wire communications from unauthorized disclosure, use, access, and interception. Furthermore, the CFAA Act of 1986 outlines the illegal computer activities that include unauthorized computer access to acquire private data, obtain or defraud valuable things, and obtain sensitive computer passwords.
The COPPA Act of 1998 requires that online service providers and websites should acquire parental consent that can be verified before acquiring, using, and disclosing individual data from children below the age of 13 years. Also, the act requires websites to generate a virtual privacy policy and to obtain only the required personal data. What is more, the CAN-SPAM Act of 2003 was implemented to prevent people from sending uninvited commercial e-mails and prevent false and misleading header information ("Internet Privacy Laws Revealed - How Your Personal Information Is Protected Online"). The act also necessitates senders to disclose information that comprises of a validated opt-out mechanism. The act also generates criminal and civil penalties for individuals who violate privacy.
Acar et al. posit that the GLBA Act of 1999 monitors the use, collection, and release of personal data held or collected by financial organizations and requires the organizations to provide customer notices and documented security programs. Further, the FACTA Act of 2003 requires that financial creditors and organizations should provide and maintain documented prevention programs for identity theft ("Internet Privacy Laws Revealed - How Your Personal Information Is Protected Online"). Many countries have implemented laws that prevent internet privacy, such as laws that protect consumer statutes and violation of personal data. Also, the states have information security databases to mitigate the threats of cybersecurity.
Currently, people often share their data through social media platforms, by publicizing information on places they are and the activities they are engaged in. As such, people reveal much more about their lives to many people. People often leave behind their sensitive information by updating their flickers and Facebook accounts regularly (Kelleher & William). Besides, businesses and governments have rapidly deployed technologies that destroy people's privacy. The technologies are divided into two sections, such as those that enhance the collection of raw data and those that enable people to process and use the obtained information differently.
Wiederhold explains that advancements in the processing of information have made the data collection processes possible. For example, in most companies, cheap computations have made it easier for executives, secretaries, and clerks to process data. Also, it has made it possible to monitor the browsing habits of clients (Klesla & Mally). Furthermore, the cheap computation and storage of data have facilitated the mining of new data and the creation of data. In most cases, data is obtained from consumers, drivers, patients, employees, and citizens using serves such as mall security, insurance companies, tax authorities, law enforcement, intelligence authorities, parents, e-commerce sites, and children. Private parties access government databases frequently, while governments purchase the data collected privately. The government undertakes various forms of data collection through capturing information on lawfully authorized forms such as tax r...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!