DATA EXPLOITATION

Each brand is a representative of Office701 too as much as it is of itself…
TECHNOLOGY
15.04.2019
1104 VIEWS

DATA EXPLOITATION

DATA EXPLOITATION

In this period of time when the use of the Internet has become widespread, we can now access people's personal information much more quickly and easily. We liked the ease and speed of this at first. But now things are changing and the internet is becoming an unreliable place.
We can now find work, get appointments, have a course, and many more things online. So data leakage becomes inevitable. The illegal use of people's private data not only frightens us but can also lead to crimes.
With the overuse of social media too, the biggest danger of the 21st century appears, data exploitation. Data exploitation does not have a specific definition. Experts speak out that it is a new kind of exploitation not as we know it throughout history. The biggest difference is that people's personal data is exploited as well as societies...
If you use social media actively and you share everything, attention!
With the storage of your data, your information can now be bought and sold.
WeChat, developed in 2011 by a technology company in China, has the compulsory approval to share with third parties. And this paves the way for the use of information.
Personal data is shared in line with the state interests such as national defense, national security, public security, and health without the knowledge and permission of the user. So companies, institutions, and government use data. This causes trust in the state to get damaged and there is no private space left.
Since Data exploitation is not tangible, it can actually be much more dangerous.

Another name for data exploitation is New Oil. Because, although oil is very valuable, it is an item whose reserve is limited. But the data is not like that. It can be used repeatedly anytime, and new ones can be added day by day.
As a result; the internet is a world with no end! It has disadvantages too as well as positive sides. It no longer seems possible in this technology age to not be exposed to data exploitation.

LEAVE A COMMENT