<< Chapter < Page Chapter >> Page >

Online privacy and security

As we increase our footprints on the web by going online more often to connect socially, share material, conduct business, and store information, we also increase our vulnerability to those with criminal intent. The Pew Research Center recently published a report that indicated the number of Internet users who express concern over the extent of personal information about them available online jumped 17 percent between 2009 and 2013. In that same survey, 12 percent of respondents indicated they had been harassed online, and 11 percent indicated that personal information, such as their Social Security number, had been stolen (Rainie, Kiesler, Kang, and Madden 2013).

Online privacy and security is a key organizational concern as well. Recent large-scale data breaches at retailers such as Target, financial powerhouses such as JP Morgan, the government health insurance site Healthcare.gov, and cell phone providers such as Verizon, exposed millions of people to the threat of identity theft when hackers got access to personal information by compromising website security.

For example, in late August 2014, hackers breached the iCloud data storage site and promptly leaked wave after wave of nude photos from the private accounts of actors such as Jennifer Lawrence and Kirsten Dunst (Lewis 2014). While large-scale data breaches that affect corporations and celebrities are more likely to make the news, individuals may put their personal information at risk simply by clicking a suspect link in an official sounding e-mail.

How can individuals protect their data? Numerous facts sheets available through the government, nonprofits, and the private sector outline common safety measures, including the following: become familiar with privacy rights; read privacy policies when making a purchase (rather than simply clicking “accept”); give out only the minimum information requested by any source; ask why information is being collected, how it is going to be used, and who will have access it; and monitor your credit history for red flags that indicate your identity has been compromised.

Net neutrality

The issue of net neutrality    , the principle that all Internet data should be treated equally by Internet service providers, is part of the national debate about Internet access and the digital divide. On one side of this debate is the belief that those who provide Internet service, like those who provide electricity and water, should be treated as common carriers, legally prohibited from discriminating based on the customer or nature of the goods. Supporters of net neutrality suggest that without such legal protections, the Internet could be divided into “fast” and “slow” lanes. A conflict perspective theorist might suggest that this discrimination would allow bigger corporations, such as Amazon, to pay Internet providers a premium for faster service, which could lead to gaining an advantage that would drive small, local competitors out of business.

The other side of the debate holds the belief that designating Internet service providers as common carriers would constitute an unreasonable regulatory burden and limit the ability of telecommunication companies to operate profitably. A functional perspective theorist might point out that, without profits, companies would not invest in making improvements to their Internet service or expanding those services to underserved areas. The final decision rests with the Federal Communications Commission and the federal government, which must decide how to fairly regulate broadband providers without dividing the Internet into haves and have-nots.

Summary

Technology is the application of science to address the problems of daily life. The fast pace of technological advancement means the advancements are continuous, but that not everyone has equal access. The gap created by this unequal access has been termed the digital divide. The knowledge gap refers to an effect of the digital divide: the lack of knowledge or information that keeps those who were not exposed to technology from gaining marketable skills

Get Jobilize Job Search Mobile App in your pocket Now!

Get it on Google Play Download on the App Store Now




Source:  OpenStax, Studying social life. OpenStax CNX. Sep 21, 2015 Download for free at http://legacy.cnx.org/content/col11889/1.1
Google Play and the Google Play logo are trademarks of Google Inc.

Notification Switch

Would you like to follow the 'Studying social life' conversation and receive update notifications?

Ask