Chat with us, powered by LiveChat Conduct a critical analysis and, in at least 150 words, respond to at least two of your classmates postings, as well as any follow-up instructor q - Writeedu

Conduct a critical analysis and, in at least 150 words, respond to at least two of your classmates postings, as well as any follow-up instructor q

  1. Conduct a critical analysis and, in at least 150 words, respond to at least two of your classmates’ postings, as well as any follow-up instructor questions directed to you, by the end of the workshop.
  2. Each response to your classmates should be at least 150 words in length and include a citation to one credible information source. The response citation should follow APA formatting.

Please find the attachment. 

Post 1: Sridevi

From the textbook reading, what concerns are apparent in the use of technology and the internet and one’s expectation of privacy? Of the concerns described, which is most relevant to you? Consider why this is important to you. How does this affect your personal life?

This aims to estimate the asses and the impact of the technology which can be in the private kind of lines with the people. So, this can be as approached towards the perspective kind of development in the specific kind of emphasis where we can get the concept in the privacy as what we had expected. This will be one of the issues in taking the expectation of privacy for the development as what we will be considering from information as a profession by the solutions to the ethical issues as what we have been discussed. So, the economic activities are very apparent in the personal life to the information as a profession.

What are the most significant laws and regulations in place to protect people and organizations? After thinking about the current legal environment, what do you believe still needs to be addressed regarding the personal privacy of a user’s information?

There will be many kinds of laws and also go through the privacy protection which is enough and also can take the clear kind of holistic approach in the legal and also administrative kind of development in a technical safeguard. So, this will be taking the frameworks as an individual data by the adoption in a general kind of data in the protection of what we had experienced from the private sector abilities in their development as accordance of international standards in a broad kind of provision as what we expect from the information which will be limited to the purpose of the personal data (Coyle, Laws, 2015).

As you think about current and emerging technologies (artificial intelligence, for example), what privacy issues will require some kind of remediation?

There will be a resource in emerging this kind of technologies for development in taking the system through information as privacy which will be a part of nontechnical in an audience for the loss as what we will be expected from questions that will be posted in the association. So, we need to take these private issues into a kind of remediation as a development in the high level and also in the public sectors for an opportunity on taking them to the AI which will be representing them about the privacy of the information that is been linked. So, we have to get a linear kind of intelligence in taking the programs which are considered and also see the argued existence which will be developed (McCann, Shipan, 2022).

References

Coyle, C. M., & Laws, K. R. (2015). The use of ketamine as an antidepressant: a systematic review and meta‐analysis. Human Psychopharmacology: Clinical and Experimental30(3), 152-163.

McCann, P. J. C., & Shipan, C. R. (2022). How many major US laws delegate to federal agencies?(Almost) all of them. Political Science Research and Methods10(2), 438-444.

Post 2: Cathrine Johnason

Information systems collect and store data; misuse of this data raises privacy concerns. The growing digital footprint contains more information about our lives, such as our purchases, health information, communication, location, and browsing history. The information collected is easily accessible by organizations and the government, violating our privacy. Cookies appearing on web pages have the potential for PII leakage. The different types of data breaches include POS intrusions, physical theft and loss, web app attacks, crimeware, cyber-espionage, and miscellaneous errors that can cause privacy concerns. The most relatable concern to me is crimeware or malware attacks. Crimeware enters the system as a virus or spyware and steals personal identities, confidential information, system slowdowns, and financial losses. A malware attack can allow the attacker to access my passwords, IP address, and banking information which can cause identity theft and financial loss.

The privacy laws are created to safeguard the integrity, usage of personal information, security, and harm. "Congress has approved, and the federal government has implemented, many laws addressing personal privacy" (Ralph & Reynolds, 2017). Fair Credit Reporting Act (FCRA), Right to Financial Privacy Act, Electronic Communication Privacy Act, Cable Act, and Gramm-Leach-Billey Act are a few. The Freedom of Information Act is the widely used privacy act in the United States to allow the public to request records from the government. The major challenge for our legal system is to keep up with the amount of data generated from n number of devices. The data privacy laws need to be created across the globe with a common baseline to reassure people.

Emerging technologies are greatly influencing our culture, lifestyle, and work environments. "The significant lag between the development and adoption of new technologies poses a large risk that developers will fail to anticipate privacy implications and user expectations around these technologies" (National Academics of Sciences, 2016). The privacy challenges with AI are to protect algorithms from intrusions and achieve transparency requirements. Similarly, for IoT, the challenge is control and transparency of the network. 

References

Stair, Ralph, and George Reynolds. Principles of Information Systems. Available from: Slingshot eReader, (13th Edition). Cengage Learning US, 2017. https://slingshot.vitalsource.com/reader/books/9781337516945/pageid/629

National Academies of Sciences, Engineering, and Medicine. 2016. Privacy Research and Best Practices: Summary of a Workshop for the Intelligence Community. Washington, DC: The National Academies Press. https://nap.nationalacademies.org/read/21879/chapter/4.

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

Do you need help with this question?

Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.

WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.

With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.

Chat with us today! We are always waiting to answer all your questions.

Click here to Place your Order Now