Internet and Privacy Effects


Waqas Ali
Internet usage should be monitored because it effects individuals’ privacy on three levels, their emotional state, their social life, and their personal life. In this contemporary era, consumers of technology have resigned in giving up their privacy in order not to be inconvenienced while using their technological gadgets when searching for something or being connected with the world. They have grudgingly accepted to the breach in their everyday life privacy by using the internet in a dangerous manner. Online privacy is easily jeopardized due to information that is provided online by the consumers in order to maintain an online profile. They tend to dismiss the effect it on their life. In this
essay, factors that affect an individual’s online privacy have been discussed along with its repercussions. The breach in privacy have been discussed in reference to the usage of social network and how privacy plays a major role in it. Effects of internet privacy invasion have also been discussed in reference to the emotions of an individuals. The contemporary society is void of privacy, and what individuals require in this age and time is privacy from the never stalking eye of vulture-like corporations and hackers.
Internet usage is a very dangerous feat. Not many individuals realize that once something is uploaded on the internet, there is no possible way of eliminating that such information. It always leaves a trace behind. The first factor that leads to privacy invasion is a weak password. According to Eugene H. Spafford, “Weak passwords are passwords that are easy to guess, or likely to be found in a dictionary attack. Thus, the choice of weak passwords may lead to a compromised system.” That is why, whenever an internet user picks their own name as a password, the system always warns to choose words that are
hard to guess. Weak passwords make it easy to hack, while open network sources lead to exposing of “trivial information for the users, yet valuable information for the attackers.” (Sidiropoulos et al.) This takes place when the user has their Wi-Fi device with active internet access. Another factor that leads to privacy invasion is with Cookies. According to Janice Sipior, “Web-tracking and information-gathering technologies, including cookies, flash cookies, and Web beacons, offer marketers the opportunity to collect a wealth of consumer information.” Moreover, this collection of information is done through
breaching consumer’s privacy. Invaders place cookie files on the hard drive of the consumers, and that allows the Web sites and advertising networks to monitor people’s online movements with telescopic precision.