In today’s world privacy is very much necessary, whether it is in the private life or be it on the net. The issue of privacy is a very controversial topic(Serafini, Rye & Drysdale, 2013). Many people believe that the government is spying on them and keeping track of everything that they do. They also believe that it is an unauthorized gesture by the government towards the people. But the majority of them do not pay attention to the topic. They intend to take it lightly while in reality it should be a matter of concern. Everything and every action taken or done by the people will be known to the government. While most think that it will be private and will be known by none. Many of the people who are aware of this topic are seriously concerned as to what the government could do with this information. Every action they take is thought out carefully. But the main topic of debate is why does the government need access to all of the private information of the people? Many believe that it is done to protect the people. They also believe that it is done to promote the common good. There are many things that the government does that are not made aware of the people. Many people believe that it may be a matter of national security. Action implies thoughts, and as such what people do tell a lot about them. Many theorist, states that through the analysis of the massive amount of data that is collected, it is possible to achieve many things that was previously impossible(Tene, 2010). Researchers can track the harmful effects of drugs, the spread of diseases, to provide necessary facilities to the needy. They can also monitor the progress of the economic behaviors and can create many new plans or a project that aims to benefit the masses. They can take new initiatives to develop the use of energy and try to make it eco-friendly; new laws can also be imposed to improve the services of the preexisting facilities like the traffic or the transportation etc.

Apart from that, many claim that the invasion of privacy can be allowed under certain circumstances. Such cases may include the collection of information about a crime that has taken place. It may be done to bring out the criminal and punish the wrongdoers. The government can also make use of the information to uncover terrorist, to stop them from committing any acts of terrorism which would harm the ordinary people. The information collected can help the government track the spread of diseases and how many people have been affected by the disease. The information can also be utilized to stop the bullying that is quite prevalent in schools and colleges. Economic efficiency that is a primary concern can be controlled and can be led to a better path by monitoring and analyzing the data that is collected. Many theorists believe that in order for the government to work appropriately and efficiently, it has to maintain a proper balance between the social values like healthcare, the safety of the public, progress of the country and the ethics of invasion of the privacy of its people.  The question of ethics, whether it is right and wrong to spy on people vary from person to person(Lee & Pinney, 2003). Many of them are comfortable with the government spying on them while many are uncomfortable with the fact that they are being spied. Many think that as long as the information gained from them is not misutilized in any kind and they do not cause them any harm they are the least bit worried. Conspiracy theorist states that there are many organizations in the government that are specifically tasked to keep an eye on the social media and the personal lives of the ordinary people. They also state that the phones are tapped to gain the knowledge as to whom the people are taking to(Hwang, 2013).

 They also say that it can be used as an active means to know if anyone is linked to crime related activity or connected to an act of terrorism that can bring harm to the ordinary citizens. If they find it irrelevant than it can pass, but if anything unusual is found then the shift measurement can be taken against it. Linking the phones can also help when an emergency occurs like an accident or health-related problems(‘Hard parts business is sold’, 2007). The authority can act upon it quickly and try to resolve it as soon as possible. It can also be said that the government takes into account all the potential effects these things affect everybody. They seem to try to make people understand that it affects everyone and applies to everyone, and no one is an exception to it. Authorities claim that in this digital era, privacy is much more transparent than it was ten years ago(Dewing, 2002). The faces of the people who are operating from the background are unknown, they can hide in plain sight and be well known yet their ulterior motives affect many without the need for discrimination. The truth of the matter is that not only the government but also many are trying to access information about others(‘Young people say that police contact and high aspirations will keep them on track’, 2013). Computer hackers, people who try to get information about others, are a real threat now a day. They send fake e-mails to an unsuspecting person who is unaware of such activity that has made to access it, and when they do they create a link with the hackers. The hackers are then able to access freely all the contents of the individual including his personal information(Bickel, 2010). Even if the hacker does not collect the information, it shows that information can be accessed and can be used for malicious purposes. But few can be trusted with such information and they can make such information available to the public, just for the fun of it. Cookies are made by the websites to store information about an individual like the name of the user, their address, their social security number, etc. When surfing the net, they enable others to track them by providing their personal information. Hackers often use these cookies to track others. Many are largely unaware of this and give up their  privacy in the hand of others. There are many websites that actively use cookies, and an individual cannot gain access to that site without these cookies. So in a sense they let others take advantage of them without realizing or giving them up willingly. The central question then arises that the monitoring of technologies should be allowed or not? (Wartzman, 2009) The answer is quite easy; it is in the fact that even if an individual is against the monitoring of them, they will find it impossible to go against it. It is accepted all over the world and is quite prevalent. An individual cannot go against the government because it affects him just like all the others, and he is not an exception. Even the government is not safe from the onslaught. They are also made to suffer the effects, as information is leaked out frequently. This has happened in the past, and it is quite easy to say that it will happen in the future.  So if anyone wants to keep his privacy from anyone especially when using social media, he will have to stay away from it which is near to impossible in this age. So all one can do is to comply with the process and try to stay safe as much as possible(‘Hacked climate emails update’, 2013).


Bickel, P. (2010). Leo Breiman: An important intellectual and personal force in statistics, my life and that of many others. Ann. Appl. Stat.4(4), 1634-1637. doi:10.1214/10-aoas404

Dewing, J. (2002). Older people with confusion: capacity to consent and the administration of medicines. Nursing Older People14(8), 23-29. doi:10.7748/nop2002.

Hacked climate emails update. (2013). Phys. Today. doi:10.1063/pt.4.0931

Hard parts business is sold. (2007). Sealing Technology2007(5), 5. doi:10.1016/s1350-4789(07)70227-1

Hwang, J. (2013). Big data, how to balance privacy and social values. The Journal Of Digital Policy And Management11(11), 143-153. doi:10.14400/jdpm.2013.11.11.143

Lee, C., & Pinney, A. (2003). A question of leadership: Under what circumstances can leaders change?.Leadership In Action23(5), 13-14. doi:10.1002/lia.1038

Serafini, T., Rye, B., & Drysdale, M. (2013). Taking sides. New York: McGraw-Hill.

Tene, O. (2010). Privacy: The new generations. International Data Privacy Law1(1), 15-27. doi:10.1093/idpl/ipq003

Wartzman, R. (2009). Now, more than ever. Leader To Leader2010(S1), 9-11. doi:10.1002/ltl.382

Young people say that police contact and high aspirations will keep them on track. (2013). Br J School Nurs8(4), 163-163. doi:10.12968/bjsn.2013.8.4.163a