One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 740324
Date de publication 2018-07-10 13:00:00 (vue: 2018-07-11 17:02:48)
Titre The Terms and Conditions of Internet Privacy for a GenZ Student
Texte We’ve all seen it before; the pop ups of necessary security updates, the horror stories of leaked celebrity pictures by hackers and the infamously long document of God-knows-what followed by “I agree to the following terms and conditions”. These are ever present in our rapidly progressing technological society and continue to characterise the interaction of society with technological information, especially for the younger generation. As a high school student and member of the early half of GenZ, I wasn’t raised under the protective barrier of informational isolation formed by the limited technological advances of the generations that preceded me. My grade has had the unique ability to watch technology morph before our eyes. Elementary school was a time of computer typing class, projectors and the slow encroachment of Smart Boards as the years progressed. It seems like every year of middle school I had a different policy regarding phone usage and school districts seemed to be playing catch up to a wave of pop and technological culture flooding students. As I progressed through high school, faculty encouraged phone usage in the classroom for research and used our ability to access a mass amount of information quickly as an advantage. Every year of my education I watched the transformation of technology from flip phones and overhead projectors in elementary school to smart phones and smartboards in high school.  What my computer class in elementary school and my proceeding technology education has failed to teach me are answers to the questions “what is privacy in a world of constant connection?” and “how do we protect ourselves and stay connected?”. What is privacy in a world of constant connections? To answer this we first need to define privacy, a notoriously ambiguous object of contestation. The reason privacy is difficult to define lies in part in its subjective nature. Defining privacy relies heavily on personal preferences and values, among other individualistic factors. What is private and not private leaves the debate of cyber security in murky waters. This coupled with government, private and corporate fascination in the inner workings of individuals minds and the ever expanding ways information can be stored and shared has often left privacy as an afterthought.  A glance at the informational open philosophy of GenZ further explains the encroachment of commercial information use on the once dormant cybersphere, specifically in regard to social media. I was four years old when Facebook began and, though it took a couple years to develop into the Facebook we all know and love (or not) today, it has undeniable shaped the technological world as well as my generations perception of privacy.  “Friends” now meant the close group of people we connect to on a personal level and the dozens, hundreds, thousands of people we barely know. The contradictory dual definitions symbolize the pull of society to familiarize technological situations that had never existed before. Our generation was the guinea pig that tested the effects of being raised in a world of rapidly expanding connection and, as a result, optional privacy on the grand scale. The push to familiarize social media leads to challenges in differentiating meaningful relationships and frivolous online “relationships”. We had to learn the difference between the girl we’ve known since first grade and sunshinegirl56, especially in regards to information sharing. But in the naive minds of children, dangers can be overlooked and private information can quickly become unprivate. While we were taught to not talk to strangers online, the familiarity of the option to talk to strangers online and the preval
Envoyé Oui
Condensat “how “i “so “what “why  a ability about access acknowledge ads advances advantage afterthought agree all always ambiguous among amount annoyance answer answers any are arises barely barrier baseless because become been before before; began being beneficial between beyond boards bought breaches brought but button buttons can cards care catch celebrity centers challenges chambers characterise children class classroom clicking close comes commercial complex compromised computer conclusion conditioned conditions conditions” connect connected connection connections considering constant contestation continue contradictory corporate couple coupled created credit culture cyber cybersphere dangers day debate define defining definitions detail deteriorating develop difference different differentiate differentiating difficult districts document don’t dormant down dozens dual dulled dwindling dynamic early echo economic economy education effects elementary encouraged encroachment entire envision especially essentially ever every evolution evolving existed expanding experienced experimental explains exposed eyes facebook facilities factors faculty failed familiarity familiarize far fascination faster feeling first flip flooding followed following formation formed formulated formulation four frivolous from fuel full further game generation generations genz girl glance god government grade grand group growing guinea hackers had half has heavily held high holding horror hundreds i’ll icky idea ignore imminent impaired implications importance important increasingly individualistic individuals infamously information informational inner interaction internet isn’t isolation its just know known knows lack larger leads leaked learn learned leaves leaving left level lies like likely limited long love many marketing mass meaningful meant media member members met middle mindlessly minds minute more morph most much multitude murky naive nature necessary need network never new niche not notoriously now numb number object obvious occuring of  often old once one ones online only open operations option optional other ourselves out overhead overlooked pages part people perception permanently personal philosophy phone phones pictures pig place play playing policy pop possible possibly posts precautions preceded preferences present prevalence privacy private proceeding products progressed progressing projectors prone protect protective provide pull push question questions quickly raised ramifications ranging ransom rapidly rates reading really reason reciprocating regard regarding regards relationships relies research resource result risks sacrifice saw say scale school scroll searched seconds security see seemed seems seen shaped shaping shared sharing should showing shrinking significance signs simply since situations slightly slow slowing small smart smartboards social society society’s someone specifically stagnant stay stored stories stranger strangers student students subjective sunshinegirl56 symbolize take talk tap tapping taught teach technological technology telling tendency terms tested than these think thirty though thousands through time today took traded transformation trust trusted typing uncertainty undeniable under understood unique unknown unprivate updates ups usage use used values vast wasn’t watch watched waters wave ways we’ve well what when without workings world would year years younger
Tags Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: