In Google, and other related organizations. The information

In the current society,technology is a crucial tool that serves a centric role in influencing theperceptions of people and information gathering. It is evident that the socialmedia and the internet are now commonlyused as a tool of self-expression.

The information reflected in the sites canbe termed to be irrelevant, and theirapplication may be rendered useless. However, it is evident that suchinformation is resourceful and useful and serves a centric role in thedetermination of the tastes and the preferences of the clients on high capacity. Many companies thus use thecookies in conjunction with the big data technologies to help track theactivities of the users to help target the advertisements in a familiarcontext.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

The analysis of the study is basedon the ethics challenge of the violation of information privacy and how toaddress the problem.Summary of the Article            The article developedby the editorial board of the New York Times is a plea, and an expression of concern on the activities and the ventures include in the trackingof the users of websites of Amazon, Facebook, and Google monitor. The articlecan thus be considered as a plea forintervention to help achieve information privacy which is a significant liability and concern in thesociety. The author develops the idea ofhow the companies easily track the users using the cookies and other relatedtechnologies. The article serves a primary role in exposing the ethical dilemmaon information privacy as posed by the mentioned websites and other similar websites.

Premisesin the article            The context of analysis of the study is based on the analysis of an article from theNew York Times that addresses the problem of tracking people using the mediathrough the application of the data track tools like cookies. Such devices aresusceptible to collecting any nature of the informationthat involves the clients without their consent which is ideally unethical andviolates the privacy of individuals inthe society. The target audience of the article can be considered to be thecompanies that apply the public information of target customers without theirconsent. Examples of the groups include Amazon, Google, and other related organizations.

The information and privacyadvocates also serve a centric role in being the target audience to help offerinsight on the nature of the data andprivacy threats that citizens are facing in the society and thus inducing theneed for an intervention program.Credibilityof the Evidence            The credibility of the evidence can be attested through the critical analysis ofthe experiences in the application of the websites. The ad networks arecommonly used to track the activities of an individual on high capacity without the consent of the users.Although some of the sites assure on thesafety of the users, it is evident theassurance of security is a significant challenge to other companies asthey may be driven by personal interests of information gathering to helpachieve competitive advantage without the concern of the comfort and theprivacy of the clients. It is practical that there is a significant problem and that the cases of information safety andprivacy are a considerable concern thatshould be addressed rationally.IndependentlyVerifying the Evidence            The verification of the evidence is with no doubtpractical considering the fact through the access of the internet everyone issusceptible to the use to the view of the tools like the cookies which tracksan individual without consent. It is evident that it is common that when one isusing the internet to research or view some of the relevant items of personalconcerns the emergence of the cookies is an almost unavoidable feature in thewebsites. The different cookies despite cancelingthe interest to access the cookies it is evident that by clicking on the cancel icons they may lead one to other pages.

The relevance of the evidence accorded in the article is thus critical andhighly rational.HowCounterarguments are addressed in theContext?            Some of the counter-argumentsin the contexts include the fact that the author expresses some gratitude tothe information privacy advocacy unit. However,at the same time, the author suggests that the efforts are notsufficient as the new standards set some significantliabilities and challenges in addressing the problem information safety whichis a considerable concern.

The plea issuch that although the privacy and information security unit have accorded some efforts, it is valuable that a more intense effort should be granted to help address the problem. Othercounterarguments include the appreciationof some of the companies like Apple and Twitter in the development of thesafety of the users through effective intervention mechanisms. However, theactions stand to be not sufficient to facilitate movement and protection of the clients and thus more efficient strategies should be considered.Howthe Writer Presents Personal Interests?            The presentation of personal interests on the promotionof individual information privacy is based on the expression on the level ofdistress and dissatisfaction in the users of the platforms like Amazon,Facebook, Google and other related sites. The primaryconcern is the fact that the information advocates and the privacy units arelimited in their search due to the limits in the dimensions of tracking. Withthe new standard of technology the ability of the companies to violate privacyand information secrecy is profoundlythreatened, and therefore there is a significant liability in information tracking.The expression of personal interests isexpressed through addressing the vitalconcerns of the users of the websites and the liable challenges they stand toface in case the users apply the technology.

HowIs Language used to develop the Arguments?            The nature of the language that the author applies can beconsidered to be highly persuasive. Most importantly, the author usesexploratory and descriptive quality ofthe content to help efficiently expressthe concerns. Use of expressive language is characterized by the use of the examples inthe context.Fallaciesin the Article            The major fallacy in the context is the belief thatinformation privacy for the public information will ever be achieved through the intervention of theprivacy advocates and other relevant units. It is valuable to note the level oftechnology continues to advance every time at a rapid rate that cannot be easily tracked. As the level of informationtechnology continues to progress the dilemma of information privacy is alsoposed which challenges the ability to achieve a universalconsensus on information privacy and safety.            The application of the social media is based on personal interests for anindividual to offer posts on personal information. It is evident that the social media platforms may restrict theapplication of the information posted.

However, the ability to view suchdataset to the public is within norestriction, and thus the implementation and use of such details arechallenging to control. It is valuable to comprehend the ability to avoidpervasion, and the protection of privacyin the social media platforms can only beachieved through the nature of the activities that we may venture. Theability to avoid the problem of violation of privacy should be induced through personal efforts to controlthe confidentiality keeping privateinformation private and not posting to the public.

Individual struggles and theintervention of the advocacy units on information privacy plays a centric rolein the control of cases of ethical violations of privacy and such incidents.HowCompelling Is the Article?            I would consider the article to be compelling andrational in the developments of the arguments. The critical variables that help makethe piece sound comprehensive to include the use of persuasive language which allows a significantrole in influencing the conception of the entire message. Furthermore, theauthor uses critical and practical examples which reflects on the experiencesof the application of the internet and the skillsaccorded. For instance, through readingthe article, it is easy to make theconnections because the use of cookies in many websites is a typical annoying experience.

Furthermore,through research, it is evident that theuse of the articles collects some of theinformation that may look irrelevant andmeaningless.Throughthe use of the internet and some of the relevant sites on the Big data technology, the information is transitioned tobe meaningful and to serve merit to companies especially in market analysis onthe consumption of the different products. Becausethe use of the internet and the social media is an inclusive part of life formany people in the society, it captures the attention of many as they are concerned on their safety in theapplication of the internet.Conclusion            Communication is a crucial element and serves a centricrole in determining how we develop the different ideas on different lifephenomena. It is evident that the media helpsa central purposein communication. In the context, the standard tool is the media through the New YorkTimes platform which allows a centricrole in influencing the attitude towards the application of the internet andthe cookies and the alarm of the information privacy on the users.

It isvaluable that an intervention strategy should be integrated to help address theproblem tracking of people on the internet without consent as it offends andaffects one’s privacy. Furthermore, the technique may be applied by malicioususers as it familiar with the cases ofthe cyber-related crimes.

Author: Jerome Carroll


I'm Mia!

Don't know how to start your paper? Worry no more! Get professional writing assistance from me.

Check it out