[Author’s Name]
[Institutional Affiliation]
Privacy can be defined as “the claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others” (Brands, 2001). However, there are people around there who breach in and get access to the private information of the others. Clipper Chip III and its successors are used for outgunning cyber attacks and are said to bear up an attack by high-speed computers that attempt to rupture its encryption cryptogram (Slovick, 1994). The contemporary society is widely reliant on the power grid and its generated electricity. If a virus damages the power grid, it would be really difficult to bring back the previous conditions. Secondly, Electro Magnetic Pulse can significantly damage to infrastructure of Information Technology. In the same manner, no business can be done without employing Internet. Therefore, privacy is to be secured (Spinello, 2011). Thus, with the use of nanotechnology, privacy problems have increased greatly.
On the other and it also offers a number of benefits to an individual, businesses and governments. The accessibility to vast databases has made it possible for the users to gather, store and use great amount of information. This accessibility is expected to increase in the future as well. There will also be a dramatic increase in “the capacity for data mining, the exploration and analysis of very large amounts of data for the purpose of discovering meaningful and useful rules and patterns” (Spinello & Tavani, 2004). Governments, organizations and others in power will also be enabled to control the subjects on a large scale by using nano-technological devices.
However, it is also exceedingly important for the authorities, governments and companies in particular, to make sure that privacy legislation is reassessed and there must be some rules and regulations on the use of devices meant for monitoring.
References
Brands, S. A. (2000). Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. Cambridge, MA: The MIT Press. Retrieved March 4, 2013, from http://books.google.com.pk/books?id=U8VUaUiYohIC&printsec=frontcover&dq=Rethinking+Public+Key+Infrastructures+and+Digital+Certificate&hl=en&sa=X&ei=ZDM1UZygG4rotQbxpoGACA&ved=0CDMQ6AEwAA
Slovick, M. (1994, September). The Big Brother Chip. Hearst Magazine (Popular Mechanics), 171(9). Retrieved March 4, 2013, from http://books.google.com.pk/books?id=0OQDAAAAMBAJ&pg=PA116&dq=popular+mechanics+the+big+brother+chip&hl=en&sa=X&ei=czU1Ud3BEIbNsgakgoHYAQ&ved=0CC4Q6AEwAQ#v=onepage&q=popular%20mechanics%20the%20big%20brother%20chip&f=false
Spinello, R. (2011). Cyberethics: Morality and Law in Cyberspace (4th ed.). Sudbury: Jones & Bartlett Learning.
Spinello, R., & Tavani, H. T. (2004). Readings in CyberEthics (2nd ed.). Sudbury: Jones & Bartlett Publishers. Retrieved March 4, 2013, from http://books.google.com.pk/books?id=oUMuHNQ5Sg0C&printsec=frontcover&dq=Readings+in+CyberEthics&hl=en&sa=X&ei=vTk1UcXEE4bJPZuqgOgD&ved=0CC0Q6AEwAA