In today’s world privacy is very much necessary, whether it is in the private life or be it on the net. The issue of privacy is a very controversial topic(Serafini, Rye & Drysdale, 2013). Many people believe that the government is spying on them and keeping track of everything that they do. They also believe that it is an unauthorized gesture by the government towards the people. But the majority of them do not pay attention to the topic. They intend to take it lightly while in reality it should be a matter of concern. Everything and every action taken or done by the people will be known to the government. While most think that it will be private and will be known by none. Many of the people who are aware of this topic are seriously concerned as to what the government could do with this information. Every action they take is thought out carefully. But the main topic of debate is why does the government need access to all of the private information of the people? Many believe that it is done to protect the people. They also believe that it is done to promote the common good. There are many things that the government does that are not made aware of the people. Many people believe that it may be a matter of national security. Action implies thoughts, and as such what people do tell a lot about them. Many theorist, states that through the analysis of the massive amount of data that is collected, it is possible to achieve many things that was previously impossible(Tene, 2010). Researchers can track the harmful effects of drugs, the spread of diseases, to provide necessary facilities to the needy. They can also monitor the progress of the economic behaviors and can create many new plans or a project that aims to benefit the masses. They can take new initiatives to develop the use of energy and try to make it eco-friendly; new laws can also be imposed to improve the services of the preexisting facilities like the traffic or the transportation etc.
Apart from that, many claim that the invasion of privacy can be allowed under certain circumstances. Such cases may include the collection of information about a crime that has taken place. It may be done to bring out the criminal and punish the wrongdoers. The government can also make use of the information to uncover terrorist, to stop them from committing any acts of terrorism which would harm the ordinary people. The information collected can help the government track the spread of diseases and how many people have been affected by the disease. The information can also be utilized to stop the bullying that is quite prevalent in schools and colleges. Economic efficiency that is a primary concern can be controlled and can be led to a better path by monitoring and analyzing the data that is collected. Many theorists believe that in order for the government to work appropriately and efficiently, it has to maintain a proper balance between the social values like healthcare, the safety of the public, progress of the country and the ethics of invasion of the privacy of its people. The question of ethics, whether it is right and wrong to spy on people vary from person to person(Lee & Pinney, 2003). Many of them are comfortable with the government spying on them while many are uncomfortable with the fact that they are being spied. Many think that as long as the information gained from them is not misutilized in any kind and they do not cause them any harm they are the least bit worried. Conspiracy theorist states that there are many organizations in the government that are specifically tasked to keep an eye on the social media and the personal lives of the ordinary people. They also state that the phones are tapped to gain the knowledge as to whom the people are taking to(Hwang, 2013).
Bickel, P. (2010). Leo Breiman: An important intellectual and personal force in statistics, my life and that of many others. Ann. Appl. Stat., 4(4), 1634-1637. doi:10.1214/10-aoas404
Dewing, J. (2002). Older people with confusion: capacity to consent and the administration of medicines. Nursing Older People, 14(8), 23-29. doi:10.7748/nop2002.11.14.8.23.c2228
Hacked climate emails update. (2013). Phys. Today. doi:10.1063/pt.4.0931
Hard parts business is sold. (2007). Sealing Technology, 2007(5), 5. doi:10.1016/s1350-4789(07)70227-1
Hwang, J. (2013). Big data, how to balance privacy and social values. The Journal Of Digital Policy And Management, 11(11), 143-153. doi:10.14400/jdpm.2013.11.11.143
Lee, C., & Pinney, A. (2003). A question of leadership: Under what circumstances can leaders change?.Leadership In Action, 23(5), 13-14. doi:10.1002/lia.1038
Serafini, T., Rye, B., & Drysdale, M. (2013). Taking sides. New York: McGraw-Hill.
Tene, O. (2010). Privacy: The new generations. International Data Privacy Law, 1(1), 15-27. doi:10.1093/idpl/ipq003
Wartzman, R. (2009). Now, more than ever. Leader To Leader, 2010(S1), 9-11. doi:10.1002/ltl.382
Young people say that police contact and high aspirations will keep them on track. (2013). Br J School Nurs, 8(4), 163-163. doi:10.12968/bjsn.2013.8.4.163a