Nowadays technology is increasing being used to monitor what people are saying and doing (for example, through cellphone tracking and security cameras). In many cases, the people being monitored are unaware that this is happening.
It is a growing concern that our private
information
is being recorded without our consent due to the popularity of digital devices. Personally, the benefit of keeping community and nation safe are outweighed by its drawbacks in the sense that personal privacy is being breached and that may compromise individual safety.
Use synonyms
To begin
with, it is true that the graphic and vocal Linking Words
information
collected via mobile phones and public cameras may provide vital intel to the government. A clear example would be by analysing the footage received from downtown security cameras, police can locate the bank robbers in a matter of a minute. Use synonyms
In addition
, a computer keyword filtering program is Linking Words
also
in place in most countries to identify certain phases to prevent cyber or terrorist attacks before they happened. Linking Words
Therefore
, retrieving these private data may seem harmless as long as these actions can be justified and keep the public safe.
Linking Words
Nevertheless
, problems arise if the Linking Words
information
were collected illegally or fall into wrong use Use synonyms
such
as identity theft and cyber blackmail. It is a fairly common crime in most Europe cities that criminals are selling tourists' detail from the stolen luggage. Linking Words
This
private Linking Words
information
Use synonyms
are
Change the verb form
is
then
used to apply for numerous credit cards or worse, transferring all your valuables to an untraceable offshore account. Linking Words
Moreover
, using the Linking Words
information
against Use synonyms
your
not only can lead to a financial loss, but it may Correct pronoun usage
you
also
indeed pose danger to your personal security. Linking Words
For instance
, a chief security officer advised the public that kidnappers can hack into any electronic devices and interpret the person's behaviour by studying Linking Words
the
online shopping habits. Correct article usage
apply
In other words
, Linking Words
although
you can hide your physical presence, you cannot cover up your digital footprints.
In conclusion, even though monitoring some of the private Linking Words
information
may help to ensure the safety of the public, it is impossible to control who has the rights to view these data, not to mention your digital records are widely available on the internet. As Use synonyms
such
, I maintain my view that there are more downsides to monitoring people digitally than the merits.Linking Words
Submitted by george0847 on
Unauthorized use and/or duplication of this material without express and written permission from this site’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to Writing9 with appropriate and specific direction to the original content.
Your opinion
Don’t put your opinion unless you are asked to give it.
If the question asks what you think, you MUST give your opinion to get a good score.
Don’t leave your opinion until the conclusion.
Here are examples of instructions that require you to give your opinion:
...do you agree or disagree?...do you think...?...your opinion...?