Chat with us, powered by LiveChat Conduct a critical analysis and, in at least 150 words, respond to at least two of your classmates postings, as well as any follow-up instructor q | EssayAbode

Conduct a critical analysis and, in at least 150 words, respond to at least two of your classmates postings, as well as any follow-up instructor q

  1. Conduct a critical analysis and, in at least 150 words, respond to at least two of your classmates’ postings, as well as any follow-up instructor questions directed to you, by the end of the workshop.
  2. Each response to your classmates should be at least 150 words in length and include a citation to one credible information source. The response citation should follow APA formatting.

Please find the attachment. 

Post 1: Sridevi

From the textbook reading, what concerns are apparent in the use of technology and the internet and one’s expectation of privacy? Of the concerns described, which is most relevant to you? Consider why this is important to you. How does this affect your personal life?

This aims to estimate the asses and the impact of the technology which can be in the private kind of lines with the people. So, this can be as approached towards the perspective kind of development in the specific kind of emphasis where we can get the concept in the privacy as what we had expected. This will be one of the issues in taking the expectation of privacy for the development as what we will be considering from information as a profession by the solutions to the ethical issues as what we have been discussed. So, the economic activities are very apparent in the personal life to the information as a profession.

What are the most significant laws and regulations in place to protect people and organizations? After thinking about the current legal environment, what do you believe still needs to be addressed regarding the personal privacy of a user’s information?

There will be many kinds of laws and also go through the privacy protection which is enough and also can take the clear kind of holistic approach in the legal and also administrative kind of development in a technical safeguard. So, this will be taking the frameworks as an individual data by the adoption in a general kind of data in the protection of what we had experienced from the private sector abilities in their development as accordance of international standards in a broad kind of provision as what we expect from the information which will be limited to the purpose of the personal data (Coyle, Laws, 2015).

As you think about current and emerging technologies (artificial intelligence, for example), what privacy issues will require some kind of remediation?

There will be a resource in emerging this kind of technologies for development in taking the system through information as privacy which will be a part of nontechnical in an audience for the loss as what we will be expected from questions that will be posted in the association. So, we need to take these private issues into a kind of remediation as a development in the high level and also in the public sectors for an opportunity on taking them to the AI which will be representing them about the privacy of the information that is been linked. So, we have to get a linear kind of intelligence in taking the programs which are considered and also see the argued existence which will be developed (McCann, Shipan, 2022).


Coyle, C. M., & Laws, K. R. (2015). The use of ketamine as an antidepressant: a systematic review and meta‐analysis. Human Psychopharmacology: Clinical and Experimental30(3), 152-163.

McCann, P. J. C., & Shipan, C. R. (2022). How many major US laws delegate to federal agencies?(Almost) all of them. Political Science Research and Methods10(2), 438-444.

Post 2: Cathrine Johnason

Information systems collect and store data; misuse of this data raises privacy concerns. The growing digital footprint contains more information about our lives, such as our purchases, health information, communication, location, and browsing history. The information collected is easily accessible by organizations and the government, violating our privacy. Cookies appearing on web pages have the potential for PII leakage. The different types of data breaches include POS intrusions, physical theft and loss, web app attacks, crimeware, cyber-espionage, and miscellaneous errors that can cause privacy concerns. The most relatable concern to me is crimeware or malware attacks. Crimeware enters the system as a virus or spyware and steals personal identities, confidential information, system slowdowns, and financial losses. A malware attack can allow the attacker to access my passwords, IP address, and banking information which can cause identity theft and financial loss.

The privacy laws are created to safeguard the integrity, usage of personal information, security, and harm. "Congress has approved, and the federal government has implemented, many laws addressing personal privacy" (Ralph & Reynolds, 2017). Fair Credit Reporting Act (FCRA), Right to Financial Privacy Act, Electronic Communication Privacy Act, Cable Act, and Gramm-Leach-Billey Act are a few. The Freedom of Information Act is the widely used privacy act in the United States to allow the public to request records from the government. The major challenge for our legal system is to keep up with the amount of data generated from n number of devices. The data privacy laws need to be created across the globe with a common baseline to reassure people.

Emerging technologies are greatly influencing our culture, lifestyle, and work environments. "The significant lag between the development and adoption of new technologies poses a large risk that developers will fail to anticipate privacy implications and user expectations around these technologies" (National Academics of Sciences, 2016). The privacy challenges with AI are to protect algorithms from intrusions and achieve transparency requirements. Similarly, for IoT, the challenge is control and transparency of the network. 


Stair, Ralph, and George Reynolds. Principles of Information Systems. Available from: Slingshot eReader, (13th Edition). Cengage Learning US, 2017.

National Academies of Sciences, Engineering, and Medicine. 2016. Privacy Research and Best Practices: Summary of a Workshop for the Intelligence Community. Washington, DC: The National Academies Press.

Related Tags

Academic APA Assignment Business Capstone College Conclusion Course Day Discussion Double Spaced Essay English Finance General Graduate History Information Justify Literature Management Market Masters Math Minimum MLA Nursing Organizational Outline Pages Paper Presentation Questions Questionnaire Reference Response Response School Subject Slides Sources Student Support Times New Roman Title Topics Word Write Writing