Your Life is Somewhere in a Database
Many TV shows depict law enforcement personnel accessing readily accessible databases that contain all types of records about individuals –records about everything from address to telephone records to finances, insurance, and criminal history. The information you share with your bank, doctor, insurance agent, the TSA, ancestry kit companies, and on social media can make your life an open book. Here are some questions to address as you reflect on this:
1. Are you comfortable with giving away some of your privacy for increased security? Why or why not? How far would you let the government go in examining people's private lives?
2. How much access should we have to certain aspects of others' private lives? For example, should States share criminal databases? But should a database of people paroled or released for crimes be made public? Why or why not?
Author's Name
Institutional Affiliation
Course Code and Name
Professor's Name
Date
Your Life is Somewhere in a Database 1. Are you comfortable with giving away some of your privacy for increased security? Why or why not? How far would you let the government go in examining people's private lives? I am not and will not be comfortable giving away sensitive personal or private information for increased security. Indeed, a clear definition, explanation, or boundary of how data privacy can be used to foster security is non-existent. In 2017, the Equifax data breach compromised the identity information of about 146 million Americans (Kerry, 2018). The 2019 documentary The Great Hack shows how Cambridge Analytica gathered Americans' personal information and used it in the presidential campaigns to influence people's voting behaviors. I think individuals should not reveal their personal information to any institution. The government should not examine people's private lives unless they are suspected of major crimes. The most devastating thing is that individuals do not know how the information they share with banks, social media, insurance agents, or health institutions is used. Moreover, they do not know for how long the information is stored, who it is shared with, and how it is destroyed, if that ever happens at all. ...
π Other Visitors are Viewing These Other Other (Not Listed) Samples:
- Computer Science Project: Java Programming1 page/β275 words | Other | IT & Computer Science | Other (Not Listed) |
- Risk Management, Cryptography, Wireless Network and SQL Attacks, and Intrusion Detection3 pages/β825 words | 3 Sources | Other | IT & Computer Science | Other (Not Listed) |
- My Intership at the New York Convention Center2 pages/β550 words | No Sources | Other | IT & Computer Science | Other (Not Listed) |
- Relational Databases Facilitate Quicker Data Retrieval5 pages/β1375 words | No Sources | Other | IT & Computer Science | Other (Not Listed) |
- Designing LAN and Creating the Basic Switch Configurations2 pages/β550 words | No Sources | Other | IT & Computer Science | Other (Not Listed) |
- Complete Process and Steps in Integrating an Office to a Network3 pages/β825 words | No Sources | Other | IT & Computer Science | Other (Not Listed) |
- Measuring Quality Standards and Progress on Meeting Requirements1 page/β275 words | No Sources | Other | IT & Computer Science | Other (Not Listed) |