Essay 2: Delayed Thesis Argument
Imagine that you are searching the internet, and you stumble across a website that strikes you as odd. You begin to wonder if you should click the link to satisfy your curiosity. So you decide that clicking this odd website link probably is not the best idea, but you click the link anyways. Then, the information on the website says, “You can win a $250 gift card of your choice! All you have to do is enter some information and you can claim your prize!” After seeing this message, your screen begins to go black and you are being hacked. Now your information and accounts from banks to Hulu membership, has been controlled by someone with mischievous intent. The protection of personal information is becoming a bigger and bigger concern. On the other hand, the internet allows for greater access to knowledge and people. With the invention of the “world brain”, the human species has been able to connect and learn everything that we know as a race by simply searching an engine of information that gives you the power to know what nature knows. We are still learning much about the information of the “world brain”.
The flow of information on the internet has allowed for increased connectivity worldwide. This is because of the fast networks of telephones and the volume of connectivity through social media platforms. In addition, “Due to digitalization today, we are more connected than ever before in human history. Access to the Internet has increased from 16 million in 1995 to 4157 million users by the end of December 2017. The industry which helped humanity connect and made the world a global village is the telecommunication industry” (Farooq, M., Raju). Furthermore, “Introduction to the Internet has transformed traditional businesses; this transformation leads to the era of transformation Marketing (Kumar 2018; Meyer 2018; Varadarajan 2018). It has transformed different sectors. For instance, publishing, advertising, and music media are completely different today compared to a decade ago (Akamai 2013). The twenty-first century is the century of disruption. In the last two decades, the changes the world has seen were never witnessed in human history. Many changes which the world has embarrassed made people’s life easy (Farooq et al. 2018, 2019). Introduction of iTunes helped people to listen to their desired customized songs without buying the complete albums, and Airbnb is offering the people the opportunity to leave the hotels and be guests of someone in some other country or region” (Farooq, M., Raju).
Also, the flow of information on the internet is being controlled more and more due to cybersecurity problems. “For example, an invasion of privacy is a violation of or intrusion into something valuable that should be protected. Discussion of the concept, however, brings into question why privacy should be cherished and protected. In the digital age, the normative dimension is the object of intense discussion. Existing dangers to privacy—because of big data applications, cloud computing, and profiling—are widely recognized, but feelings of resignation and why should we bother lie dormant” (Marcel Becker).
There are many explanations as to why information on the internet has been more controlled recently, but on the other hand, information on the internet has been beneficial too. One example as to how the flow of information on the internet has been beneficial for education is learning programs and tools for online learning. “In addition, the flow of information on the internet has been beneficial for connectivity because of the mass production of cellular devices and the social media platforms contained within these cellular devices.
Overall, the flow of information has many different areas of discussion, but it has been controlled by corporations and governments more and more. This “information lockdown” has caused a major distrust in governments and large corporations by citizens, who have a right to privacy of information and also protection of the citizen’s information. Furthermore, “A view of privacy as the norm that regulates and structures social life (the social dimension of privacy) has gained importance in both law and philosophical literature. For instance, the European Court of Human Rights previously stressed that data protection was an individual’s right not to be interfered with” (Marcel Becker).
HR: Ziegeldorf, Jan Henrik, et al. “Privacy in the Internet of Things: Threats and Challenges.” Security and Communication Networks, vol. 7, no. 12, 2014, pp. 2728–2742., doi:10.1002/sec.795.
Guo, Lei, and Yiyan Zhang. “Information Flow Within and Across Online Media Platforms: An Agenda-Setting Analysis of Rumor Diffusion on News Websites, Weibo, and Wechat in China.” Journalism Studies, vol. 21, no. 15, 2020, pp. 2176–2195., doi:10.1080/1461670X.2020.1827012.
Jost, John T, et al. “How Social Media Facilitates Political Protest: Information, Motivation, and Social Networks.” Political Psychology, vol. 39, 2018, pp. 85–118., doi:10.1111/pops.12478.
Quax, Peter, et al. “Efficient Distribution of Emotion-Related Data through a Networked Virtual Environment Architecture.” Computer Animation and Virtual Worlds, vol. 20, no. 5-6, 2009, pp. 501–510., doi:10.1002/cav.278.
Lee, Jung, et al. “Antecedents of Cognitive Trust and Affective Distrust and Their Mediating Roles in Building Customer Loyalty.” Information Systems Frontiers : A Journal of Research and Innovation, vol. 17, no. 1, 2015, pp. 159–175., doi:10.1007/s10796-012-9392-7.
Siering, Michael, et al. “A Taxonomy of Financial Market Manipulations: Establishing Trust and Market Integrity in the Financialized Economy through Automated Fraud Detection.” Journal of Information Technology, vol. 32, no. 3, 2017, pp. 251–269., doi:10.1057/s41265-016-0029-z.
Becker, Marcel. “Privacy in the Digital Age: Comparing and Contrasting Individual Versus Social Approaches Towards Privacy.” Ethics and Information Technology, vol. 21, no. 4, 2019, pp. 307–317., doi:10.1007/s10676-019-09508-z.
Hi, this is a comment.
To get started with moderating, editing, and deleting comments, please visit the Comments screen in the dashboard.
Commenter avatars come from Gravatar.