This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Internet of Things (IoT)

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

Internet of Things (IoT) registers three primary concerns loss of jobs, breach of privacy and over-reliance on the use of technology. When any products or services are put on the internet platform, there is a possibility it will be affected by either of the identified concerns. There are several security measures considered to ensure the information is protected, but the hackers will always keep trying to hack the system and steal available private data. For instance, there were identified anonymous group of persons who were successful to hack the federal sites, and they mined confidential information from the public. The government is expected to have the highest level of security; unfortunately, the system was hacked easily. Therefore, all the information uploaded online needs to be well protected as potential hackers can access the information and use it for malicious activities. There have been reports where some companies have been highlighted to misuse the information that has been availed to them by their clients. This is identified to occur across the board for all companies. For example, Google has been accused of using the availed private information of Google users for their private usage. Moreover, information that has been stored by IoT is considered valuable by many companies.

Increased cases of breach of privacy have resulted in the question on who is to be held accountable for the increase in the cases of who is required to take control of the IoT? For instance, if there was only one firm identified to use clients information then it could potentially result into monopoly but in instances when numerous companies that have access to the information can it be considered a breach of privacy to the clients? Moreover, the information collected where it will be collected. Majority of the phone service suppliers such as AT&T and Verizon are identified to stop offering the consumers the needed unlimited data usage for the mobile phones as it identified to be very costly. A study done by Evans (2011) explains by 2020, there are anticipations that about 50 billion devices are expected to be connected and expected increment in data storage.

There is over-reliance of IoT on technology. Current generations are recognized to depend on ease availability of information on the internet and technology. However, the dependency on technology on a daily basis to make correct decisions can be considered devastating. There is no particular system that is considered robust and fault free. There are constant glitches identified in different systems on the internet. In respect to the information that has been feed into the system, then it determines on how devastating it can be if the system is hacked. Moreover, the more here is a high dependency on the internet in the event it collapses then it can be considered to be catastrophic.

Lastly, the preference to connect more devices on internet results to higher loss of a job. Preference to automate the IoT is likely to have a devastating impact on the employment prospects, especially on the less-educated workforce who depend on their skills (Schumpeter, 2010). For instance, persons who were doing inventories are likely to lose their jobs as the assignments are automated, and the information can easily be transmitted to the respective owners with ease. Automated machines have replaced much staff such as machines provided at the checkpoints at the supermarkets. The highlighted disadvantages are identified to be devastating to respective communities.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask