Thursday, December 12, 2019

Legislating Privacy Technology Social Policy -Myassignmenthelp.Com

Question: Discuss About The Legislating Privacy Technology Social Policy? Answer: Introduction Every technology has both negative and positive impacts. However, there should be weighing between the positive and negative effects to conclude the question of technology relevance. According to me, driverless cars help the disabled individuals to enjoy the benefits of having a vehicle regardless of their ability to drive. Selling of driverless cars improves the economy of the state and that of the citizen. It is ethical to have driverless cars because the benefits are more than the risks. According to Langdon, Patrick, Ioannis, Mike, Lee, Alex John Clarkson, (2018) there is a likelihood of developing driverless, all weathers, and reliable and general purpose cars in future. However, there is a risk of technological failure while using a driverless car hence causing severe accidents. It is not easy to trust somebody youve met online for the first time. It takes time to even communicate freely with somebody you've met online. There has been media exploitation by wrong people who indulge you in communication for self-gain. For instance, hackers may introduce malware by sending an email (Howard Jones, pp.23). Emailing is a communication mechanism that has brought fear while dealing with somebody you've never met. Individuals create false identities for different reasons. One of the reasons is that they do not want to be identified by people who might take advantage of them. The other reason is that they may have an intention of committing an offense and not get recognized. There are very many challenges that are related to psychology concerning children. There are very many benefits the children can gain from technology. Technology can educate, entertain and help them in their social life. However, there are no controls in regards to the usage of technology (Haugland Wright, 2017). The children do not balance between technology, social life, and academics. In this case, there is a need to ban the use of technology by the student to help them concentrate in school. However, the children should be allowed to interact with technology for a maximum of 2 hours a day. Allowing them will help them learn more about technology. Information is essential to any organization and should get protected from falling under wrong harms ways. There are a lot of human factors that lead to breaches of data such are a loss of a key, weak passwords, unnoticed malware attack amongst others. The organizations should come up with strict policies that are geared toward protecting information breach (Aplin Gurry, pp.88). There should be substantial penalties enforced against individuals who cause information breach. Lastly, the organization should train the people interacting with the system to on the ways of protecting organizational information. I agree with Professor Robert Winston that people should get restricted their privacy for the public interest. Often, people look at a celebrity as their role models. In this case, if somebody posts without regulation and for some reasons posts a vague message, somebody who emulates him might have a wrong opinion on a specific ideology (Regan, pp.17). It is also important to note that people can use what a celebrity has posted to justify wrongdoing. In this case, there should be a restriction on privacy. Reference Regan, P. M. (2015). Legislating Privacy: Technology, social values, and public policy. Chapel Hill: University of North Carolina Press, management.17 Langdon, Patrick, Ioannis Politis, Mike Bradley, Lee Skrypchuk, Alex Mouzakitis, and John Clarkson. 2018. "Obtaining Design Requirements from the Public Understanding of Driverless Technology." 21, 134-135 Howard, P. N., Jones, S. (2004). Society online: The Internet in context. Thousand Oaks: SAGE Publications, pp.23-45 Haugland, S. W., Wright, J. L. (2017).Young children and technology: A world of discovery. Boston: Allyn and Bacon. Aplin, T. F., Gurry, F. (2012).Gurry on breach of confidence: The protection of confidential information. Oxford: Oxford University Press, pp.88.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.