In Google, and other related organizations. The information

In the current society,
technology is a crucial tool that serves a centric role in influencing the
perceptions of people and information gathering. It is evident that the social
media and the internet are now commonly
used as a tool of self-expression. The information reflected in the sites can
be termed to be irrelevant, and their
application may be rendered useless. However, it is evident that such
information is resourceful and useful and serves a centric role in the
determination of the tastes and the preferences of the clients on high capacity. Many companies thus use the
cookies in conjunction with the big data technologies to help track the
activities of the users to help target the advertisements in a familiar
context. The analysis of the study is based
on the ethics challenge of the violation of information privacy and how to
address the problem.

Summary of the Article

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

            The article developed
by the editorial board of the New York Times is a plea, and an expression of concern on the activities and the ventures include in the tracking
of the users of websites of Amazon, Facebook, and Google monitor. The article
can thus be considered as a plea for
intervention to help achieve information privacy which is a significant liability and concern in the
society. The author develops the idea of
how the companies easily track the users using the cookies and other related
technologies. The article serves a primary role in exposing the ethical dilemma
on information privacy as posed by the mentioned websites and other similar websites.

Premises
in the article

            The context of analysis of the study is based on the analysis of an article from the
New York Times that addresses the problem of tracking people using the media
through the application of the data track tools like cookies. Such devices are
susceptible to collecting any nature of the information
that involves the clients without their consent which is ideally unethical and
violates the privacy of individuals in
the society. The target audience of the article can be considered to be the
companies that apply the public information of target customers without their
consent. Examples of the groups include Amazon, Google, and other related organizations. The information and privacy
advocates also serve a centric role in being the target audience to help offer
insight on the nature of the data and
privacy threats that citizens are facing in the society and thus inducing the
need for an intervention program.

Credibility
of the Evidence

            The credibility of the evidence can be attested through the critical analysis of
the experiences in the application of the websites. The ad networks are
commonly used to track the activities of an individual on high capacity without the consent of the users.
Although some of the sites assure on the
safety of the users, it is evident the
assurance of security is a significant challenge to other companies as
they may be driven by personal interests of information gathering to help
achieve competitive advantage without the concern of the comfort and the
privacy of the clients. It is practical that there is a significant problem and that the cases of information safety and
privacy are a considerable concern that
should be addressed rationally.

Independently
Verifying the Evidence

            The verification of the evidence is with no doubt
practical considering the fact through the access of the internet everyone is
susceptible to the use to the view of the tools like the cookies which tracks
an individual without consent. It is evident that it is common that when one is
using the internet to research or view some of the relevant items of personal
concerns the emergence of the cookies is an almost unavoidable feature in the
websites. The different cookies despite canceling
the interest to access the cookies it is evident that by clicking on the cancel icons they may lead one to other pages.
The relevance of the evidence accorded in the article is thus critical and
highly rational.

How
Counterarguments are addressed in the
Context?

            Some of the counter-arguments
in the contexts include the fact that the author expresses some gratitude to
the information privacy advocacy unit. However,
at the same time, the author suggests that the efforts are not
sufficient as the new standards set some significant
liabilities and challenges in addressing the problem information safety which
is a considerable concern. The plea is
such that although the privacy and information security unit have accorded some efforts, it is valuable that a more intense effort should be granted to help address the problem. Other
counterarguments include the appreciation
of some of the companies like Apple and Twitter in the development of the
safety of the users through effective intervention mechanisms. However, the
actions stand to be not sufficient to facilitate movement and protection of the clients and thus more efficient strategies should be considered.

How
the Writer Presents Personal Interests?

            The presentation of personal interests on the promotion
of individual information privacy is based on the expression on the level of
distress and dissatisfaction in the users of the platforms like Amazon,
Facebook, Google and other related sites. The primary
concern is the fact that the information advocates and the privacy units are
limited in their search due to the limits in the dimensions of tracking. With
the new standard of technology the ability of the companies to violate privacy
and information secrecy is profoundly
threatened, and therefore there is a significant liability in information tracking.
The expression of personal interests is
expressed through addressing the vital
concerns of the users of the websites and the liable challenges they stand to
face in case the users apply the technology.

How
Is Language used to develop the Arguments?

            The nature of the language that the author applies can be
considered to be highly persuasive. Most importantly, the author uses
exploratory and descriptive quality of
the content to help efficiently express
the concerns. Use of expressive language is characterized by the use of the examples in
the context.

Fallacies
in the Article

            The major fallacy in the context is the belief that
information privacy for the public information will ever be achieved through the intervention of the
privacy advocates and other relevant units. It is valuable to note the level of
technology continues to advance every time at a rapid rate that cannot be easily tracked. As the level of information
technology continues to progress the dilemma of information privacy is also
posed which challenges the ability to achieve a universal
consensus on information privacy and safety.

            The application of the social media is based on personal interests for an
individual to offer posts on personal information. It is evident that the social media platforms may restrict the
application of the information posted. However, the ability to view such
dataset to the public is within no
restriction, and thus the implementation and use of such details are
challenging to control. It is valuable to comprehend the ability to avoid
pervasion, and the protection of privacy
in the social media platforms can only be
achieved through the nature of the activities that we may venture. The
ability to avoid the problem of violation of privacy should be induced through personal efforts to control
the confidentiality keeping private
information private and not posting to the public. Individual struggles and the
intervention of the advocacy units on information privacy plays a centric role
in the control of cases of ethical violations of privacy and such incidents.

How
Compelling Is the Article?

            I would consider the article to be compelling and
rational in the developments of the arguments. The critical variables that help make
the piece sound comprehensive to include the use of persuasive language which allows a significant
role in influencing the conception of the entire message. Furthermore, the
author uses critical and practical examples which reflects on the experiences
of the application of the internet and the skills
accorded. For instance, through reading
the article, it is easy to make the
connections because the use of cookies in many websites is a typical annoying experience. Furthermore,
through research, it is evident that the
use of the articles collects some of the
information that may look irrelevant and
meaningless.

Through
the use of the internet and some of the relevant sites on the Big data technology, the information is transitioned to
be meaningful and to serve merit to companies especially in market analysis on
the consumption of the different products. Because
the use of the internet and the social media is an inclusive part of life for
many people in the society, it captures the attention of many as they are concerned on their safety in the
application of the internet.

Conclusion

            Communication is a crucial element and serves a centric
role in determining how we develop the different ideas on different life
phenomena. It is evident that the media helps
a central purpose
in communication. In the context, the standard tool is the media through the New York
Times platform which allows a centric
role in influencing the attitude towards the application of the internet and
the cookies and the alarm of the information privacy on the users. It is
valuable that an intervention strategy should be integrated to help address the
problem tracking of people on the internet without consent as it offends and
affects one’s privacy. Furthermore, the technique may be applied by malicious
users as it familiar with the cases of
the cyber-related crimes.

Author:

x

Hi!
I'm Eileen!

Would you like to get a custom essay? How about receiving a customized one?

Check it out