The evolution of technology is increasing, similar to how individual info is saved,
notwithstanding if it's individual health data, financial reports, as well as additional individual
info reserved on the cloud-based podium. Digital safety worries are faced by dissimilar
individuals and establishments worldwide due to the internet. The internet exposes people to the
issues of confidential info. The matters backing the culmination of confidentiality comprise
cloud computing data breaches and cyber-attack (Rittenhouse & Ransome, 2017). Technological
transformations that have been witnessed in the mainstream media in recent years have led to the
integration of social media into the operations of reputable media companies to reach out to
increased audiences. The smartphone revolution and access to the internet are some of the issues
highlighted regarding the personal privacy obligations of Americans.
Researchers’ opinions regarding the end of Individual confidentiality
Due to internet growth, personal privacy is dropping at a high percentage caused by
information breaches. As a result, individual information linking security risks have greatly
increased. Given as an example, "the studies have indicated that 68% of data breaches occur
when the devices are lost or stolen” (Lewis, 2014). Consequently, “avoiding the risk is a better
option as it will help in ensuring that the company's information is protected and the organization
does not face any vulnerability in fraudulent attacks." As a result, establishments ought to
implement blockchain technical expertise to guarantee that administrations' gadgets are
extremely safe. Where conceivable, workers must not be permitted to leave the office with work
gadgets. The establishment must establish guidelines that outline workers not to use office
gadgets outside of work. These policies ought to forbid the usage of office gadgets for individual
Moreover, position blockchain tech to each office gadget to safeguard the company’s client
information. Additionally, the institute ought to carry out a cost-benefit examination about this
situation to recognize the probable method through which office gadgets can work outside. If
office gadgets are outside the workplace, paybacks overshadow the costs; thus, the business had
better implement blockchain to safeguard the gadgets. If the budgets overshadow paybacks, the
business must not permit office equipment to work outside. For that reason, to employ the
workplace gadgets outside, the establishment must initially perceive the dangers of losing
information and cyber-attacks.
Social media is an illustration of a confidentiality concern. For instance, "Facebook offers
a range of privacy options to its members. A member can make all his communications visible to
everyone, block specific connections or keep all his communications private. Members can
choose whether or not to be searchable, decide which parts of their profile are public, decide
what not to put in their news feed, and determine who can see their posts (Krutz,2010). There is
a message feature for members who wish to use Facebook to communicate privately, closely
resembling email". Twitter is a micro blook plus a social system that permits people to fit in a
spot to answer queries concerning what they are doing by handing out short messages identified
as tweets to friends or followers, which comprises approximately a hundred and forty characters. [Last Name] 3
The tweet's temporary arrangement is a significant distinction of the service that ensures fast
sharing of information and informal collaboration, which relieves both IM and email fatigue.
Nevertheless, Twitter is a method of communication that does not restrict information sharing.
One can share information with persons that you would never exchange IM messages or emails,
which leads to the opening up of one's contacts to the community and can enhance a person's
continuous growth. To begin with, the procedure of classifying, computing, and highlighting
threats crafts Twitter as real and vital for use by managers and employees who may not even
have thought of how risk management is essential in an organization. Second, a methodology to
threat managing hijacks the whole notion past the normal limits of whatever is insured. It
dramatically enlarges the firm's threat description to comprise everything that endangers the
administration's endurance. This method similarly splits the perception of threat into the dangers
that may aid a firm to develop and the ones that might only result in losses. Once a corporate
choose an all-inclusive tactic to threat managing, it is habitually regarded as favourable by
stockholders (Sotto, Treacy & McLellan (2010) with Facebook. This social networking site's risk
and vulnerabilities present a significant problem to the employer because third parties share your
uploaded information. Not to mention, malware is attached to ads and the associated 'Facebook
friends' of the account, presenting even more vulnerabilities. "Privacy and security are major
concerns for many users of social media. When users share information such as data and photos
with friends, they can make their friends vulnerable to security and privacy breaches with dire
Who is Invading our Privacy?[Last Name] 4
Government, Big Corporations, other people, and we have contributed to the issue of invasion
due to information society's growth. The information society is a society that significantly values
information sharing, usage, creation, distribution, manipulation, and integration (Salvaggio,
2013). The information society's main drivers are communication and information technologies,
which have influenced social organization changes in different societal sectors, such as
education, economy, health, government. Regular computer users are considered individuals that
partake in this form of society. Information societies have become part of human life activities.
With the increased use of information societies, there are increased social problems associated
with it, including invasion of privacy: this is a significant issue in the information society.
Everyone who uses a computer, whether in business or personal, faces a risk of invasion of
privacy from different individuals, including hackers. For example, hackers who have hacked
personal data and published it without their approval have targeted organisational data. Another
example is when one intrudes into personal affairs through computers and discloses their private
information. Also, Information inequity: – access to information is fundamental freedom;
however, information inequality is a global issue that comes in different forms. Information
control and misuse of information: this is a significant issue in information societies. For
example, Larger Corporation, such as Facebook, Twitter, Google Inc., has detailed personal
information, and sometimes they tend to misuse confidential information by selling data to a
marketing agency. Therefore, the misappropriation of information in society and the current
world is a significant concern; however, laws are enacted to offer full protection to individuals
from misuse (Salvaggio, 2013).
Internet Things have the power to Erode Our Privacy.[Last Name] 5
Nowadays, we have connected all personal information to our phones, which presents a
dangerous future trend. Technology progression has upgraded even the means of communication
as humans. Mobile phones are among the technical gadgets that have altered people’s ways of
existence. Visualize running through the day with no phone; I am sure it would feel imperfect.
The present epidemic, which has troubled the globe, has exemplified the significance of cell
phones. Cell phones have fashioned lives easily and conveniently. We may use cell phones for
practically everything. The phones are not only used to make calls, but then our lives spin around
them (Weber,2010). We dispatch recorded voices, emails, and messages. We also link to social
media sites, record films, and click pictures through cell phones. We now withdraw and send
money, shop, and carry out all kinds of trades using phones. Therefore, if technology is
developed to wipe out gadgets, we will be in big trouble. Privacy is the right given to an
individual to have all powers over his personal information. Thus, privacy rights are being
threatened. For example, take a look at healthcare personal data and information. The growth of
technology and benefits associated with it; have led the health sector to record patient
information electronically (Francis,2019). Thus, by promoting electronic health records, the
doctors and medical practitioners record the patients' information using laptops. Thus, electronic
health records have improved patients' (He, Chan & uizani, M. (2015) services provision among
the providers and easy retrieval of health info.
Because of the safety concerns and confidentiality, the organization and individuals should
implement measures that help in protecting and preventing privacy issues. For instance, for the
organization's internal privacy and data security policies: the organization should ensure that it
has a particular way of collecting and safeguarding its customers' and employees' data.
Therefore, policies help in designating personnel who have access to confidential information.
Social media policies also help guide employees on how to use their social media on an issue
relating to work. Furthermore, an organization should have robust protection from the service
providers. Thus, the organization should ensure confidentiality clauses and nondisclosure
agreements are made with the service provider. Data security is a problem in information
technology strategic management, which is not solved. IT strategic management implies that the
organization will adopt the use of technology in keeping data that is collected. Data security is a
significant problem in information technology due to cybersecurity concerns of the system.
There will be cases of data misuse resulting from an unauthorized person accessing the data that
connects organizations to its consumer. [Last Name] 7
Francis, M. The Importance of Application Security: A Few of the Benefits and Risks (2019).
Retrieved from https://www.veracode.com/blog/intro-appsec/importance-
Salvaggio, J. L. Social problems of information societies: The US and Japanese
experiences. Telecommunications Policy, (2013). 7(3), 228-242.
Weber, R. H. Internet of Things–New security and privacy challenges. Computer law &
security review, (2010).26(1), 23-30.
Krutz, R. L., & Vines, R. D. Cloud security: A comprehensive guide to secure cloud
computing. Wiley Publishing (2010).
Sotto, L. J., Treacy, B. C., & McLellan, M. L. Privacy and Data Security Risks in Cloud
Computing. World Communications Regulation Report, (2010) 5(2), 38.
He, D., Chan, S., & Guizani, M. Mobile application security: malware threats and
defences. IEEE Wireless Communications, (2015).22(1),
Lewis, T. critical infrastructure protection in homeland security: defending a
networked nation. John Wiley & Sons. (2014).
Maruti Techlabs. Challenges in Mobile App Security (2019). Retrieved from
Rittinghouse, J. W., & Ransome, J. F. Cloud computing: implementation, management,
and security. CRC press (2017).