How Data Shapes Meaning?



How Data Shapes Meaning

Individuals are unique in their ways. Many people believe that their personality makes them what kind of a person they are. Personalities are greatly affected by a person’s environment. The environment one is brought up has a significant influence on one’s data. To some extent, heredity and genetics can play a major role in shaping one’s data along with the environment. Our individual personality is a mental characteristic that makes us unique from others. Data any information relating to identifiable or identified natural person. It covers any vital information that is about an identifiable person. Data can become personal from pieces of personal information that are likely to come into an individual’s possession. A person’s name is the likely identifier of the identity of an individual. This paper seeks to analyze how data changes meaning and defines who we are.
Ways in which data can determine identity
Data about a person will apparently include his or her medical history. Criminal record, achievements, work history, name, certificates, emails, and membership records among others. Data that does not about a person may include all information about his or her activities. Data such as itemized telephone bills or personal bank statements are personal data about the individual who is operating the account (Ludington 2006). In case data is not about an identifiable person, it might be of importance to consider whether it’s being processed, or would otherwise be processed to record, learn, or determine something about an individual. Information can be regarded as personal data where the incidental consequence or aim of the processing is that one learns to record anything about an identifiable individual (Fears 2014).
Data can be linked to a person to provide particular information about that specific person. As such, data influences who we are and what we are capable of doing or attaining. In fact, different organizations or persons may process the same data in different ways and for different purposes. What one person perceives as personal data, maybe a different thing to someone else depending on the situation at hand (Ludington 2006). Though my full name is a likely identifier of who I am, may occupation and address would influence my identity too. I come from a very competitive location where many people are business minded. After school, my thoughts will shift to business. This means that there is a likelihood that shortly I will be a shopper so as to be in an ideal position to compete favorably with other competitors.
Elements like physical appearance can be used to define someone. In fact, it is possible to be defined depending on how others with your similar characteristics are defined. For instance, my physical appearance can expose me to a situation of a mistaken identity. I have had my friends mistake me with others. I have had them accusing me of seeing me in places I have never been before. I am this serious guy who rarely smiles. A person who does no know me would think I belong to a terrorist group. In fact, I have had issues with security officers trying to access admission in areas where there is a public gathering. I can easily be accused of being a terrorist because I am this kind of a guy who likes beards and most terrorists are associated with similar characteristics and some of my friends to tell me there is a resemblance to me and some of the most wanted criminals. There have been people convicted for mistakes they have not done even in a court of law due to mistaken identity. Therefore, similar incidents are likely to happen to me.

Control over data
At times, it’s hard to have control over data since what an organization may consider as personal data; another person can consider it like something different (Causey III, Purvis & Henke 2003). I would have control over what I would do after completion of school, but it would be difficult to monitor what other people think of me when they see me. When it comes to physical appearance, being in control of your data can be challenging since it’s something that I cannot directly influence. Changing my ambitions would be possible. For instance, I can work as a shopper after school or else start a small business and act like a shopper. Therefore, I got no control over a much of the data that can be used to describe my personal identity.
Data defines us in different ways in that’s the same case with me. The problem with the way data defines me is the fact that it people can have a negative perception of who I am and what is right for me. It is possible to get embarrassed before peers or people who hold a different opinion about me as for the case of mistaken identity. The best thing one can do in such a situation is creating a positive image in the eyes of the public. With a positive image, it would be possible to build trust among most of the people who are familiar with my identity and thus will act as my ambassadors.

How does the data that define you could be controlled?
The data that describes one can be checked from the public access by several ways. This is because when one detail is accessed, they could be some of the risks which are inherent with the ordeal. The act applies to any individual who handles or has admittance to, data about people. It additionally offers rights to the general population the data is about. Information security applies at all levels in PCS (Chatterjee 2007). Wherever information is held, whether it is branch records, messages or nearby participation records, the privileges of the person to the protection and get to apply. We are all independently in charge of following the information insurance enactment when we are utilizing individual information. If we don’t go along the data, a magistrate can make authorization move against PCS or potentially the person. This principle applies at all the levels. One should be fully aware of the ramifications of the exposing the one’s data to the public (Purdy, Fowler & Cochran 1998). Awareness should be made to the organization or the union to ensure that the data of an individual is controlled. Also when our details are no longer in need, we need to dispose of safely. In a decision, data on persons’ names and addresses, which are secured by the Information Assurance Act, must not be utilized without the particular power of the union and assent of the person.
It is as PC projects programming used to secure information. That is to say; a sender enters his/her information; it is first to get scrambled and afterward decoded before it reaches to the collector. It is one of the best answers for these potential dangers. Encryption is recognized to ensure correspondences and secure information successfully and securely. Hence it can be advocated that encryption ought to be upheld by the associations inside and remotely. This likewise applies to cell phones, for example, mobile phones and portable workstations where information is put away. Great and powerful secret word administration strategy ought to be actualized at work environment. As an issue truth, verification is the key component of security issues, in this manner, it is critical to have reliable techniques, for instance, change secret key frequently and change the default (Chatterjee 2007). Staff ought not to sidestep secret key in any way. Instruction and preparing on information assurance ought to be persistently held fast to representatives. Open critical framework ought to be actualized as it gives a way to produce, oversee and disavow computerized endorsement. It works like personal IDs, and open key gives verification whereas the private key gives classification (Fears 2014). Like this, encryption ought to be placed in a drive when information is transmitted starting with one place then onto the next, for passwords to restrain unapproved get to keeping in mind putting away information in databases and documents.
Strategies which tries to curb the influence of data
The data should be kept in a manner that no one can easily access. To bar this data from clearly defining us, we need to put them in a parable way or in a way that they could not be easily understood by the public hence reducing. We should put the security to these documents to boost privacy and alerts the organizations or the authorities to keep our data secret (Causey III, Purvis & Henke 2003). Our documents should be locked or put a password to enhance the security of our personal details. We should report any case of exposure or change our security in the event of anything. The data information is utilized by the organization the organizations and the businesses. The information kept should be;
• Utilized reasonably and also lawfully
• Should be used accurately
• They shouldn’t be kept for more than the stipulated time
• Should be stored safely and securely
• They should not be utilized by another organization apart from the organization having the data.
There should be an adamant legal reform which ensures that the personal data is kept safe in the organization. The sensitive information like the information concerning health, sexual health the ethnic position, political opinions and the criminal information should be kept safer than any other information since they are sensitive.
Physical appearance of the individual can be mistaken with peoples with certain characteristics. The case of the similar characteristics happens in the Pakistan where Mr. Bake was shot death by the police officers having been mistaken for the certain terrorist in the area. The police had a criminal photo which was similar to the appearance of Mr. Bake. The physicals traits were alike from the beads, complexion, beads and the movement resembles the one for the suspect hence the police decided to shut him down. The general appearance of somebody depicts certain traits. Peoples with an individual behavior are associated with a particular group of persons (Adelola, Dawson & Batmaz 2015). The actions of somebody are used to describe or to depict on the behavior. Many have been arrested because they possess the characteristics which are similar to a certain group of peoples. Some peoples have the characteristics similar to each other such that if one mistakes the other one could be mistakably arrested. This is always a very the chance to focus on the framework and 88% of the associations had lost cash between 500 dollars to 10 a great many dollars. The most shocking actuality is when staff leaves the association, they are the person who common situation in life. These vices should be stopped, and proof beyond a reasonable doubt should be undertaken to ascertain that the right person is obtained since most people’s look alike and therefore whoever suspected should be arrested and taken for interrogations to enhance substantiation.
According to the case study, the reality and figures demonstrate that 99% were the staff that had turn into the aggressors of the organization. Security breaks when there is an absence of getting to control which prompts data innovation disrupt. Contends that on the off chance that it is to the advantage of the patient, data can be shared inside the multidisciplinary group administering to the patient and does not have any significant bearing on research, instructing or other unfit members (Fears 2014). Accordingly, it can be legitimized that data ought to just be revealed suitably and securely to the general population required or approved by the enactment and thus this will enhance the security issues.
Individuals need to assume more prominent liability for the individual information they transfer on the web. No one is driving people to transfer individual data to person to person communication locales (Adelola, Dawson & Batmaz 2015). The new EU information assurance rules guarantee to convey more than is functional. By removing duty from people and supplanting it with a legitimate structure, they may make absurd desires for protection and a misguided feeling of wellbeing and security on the web.
The police should undertake a proof beyond a reasonable doubt before they execute any action like killing somebody just because he looks like a suspect or he possess the similar traits (Harris, Woodward & Borgstahl 2001). The data of an individual can be used by another person and masquerade him, or her thus one’s details should be kept privately. If one details are exposed or are known by one or other peoples, he or she may risk because his/her personal data are misused and can lead one to risk his her life.
A standout amongst the most critical current discourses in legitimate and good rationality is the security of information. It has turned into a focal issue for some associations to accomplish a useful data framework inside characterized scope, quality, and time and cost limitations with a specific end goal to ensure protection, privacy, and security (Freeman & Gelernter 1996). There have been extraordinary changes in the arrangement of wellbeing administrations since the presentation of PCs around three decades back, and issues identified with the insurance of individual wellbeing data have brought about both specialized research and political debate. Therefore, it can be advocated that security of information is still the main source of disappointment in programming framework improvement.

Adelola, T., Dawson, R., & Batmaz, F. (2015). Nigerians’ perceptions of personal data protection and privacy.
Causey III, J. D., Purvis, R. E., & Henke, J. (2003). U.S. Patent No. 6,558,320. Washington, DC: U.S. Patent and Trademark Office.
Chatterjee, R. (2007). Cases of mistaken identity. Science, 315(5814), 928-931.
Fears, R., Brand, H., Frackowiak, R., Pastoret, P. P., Souhami, R., & Thompson, B. (2014). Data protection regulation and the promotion of health research: getting the balance right. QJM, 107(1), 3-5.
Freeman, E., & Gelernter, D. (1996). Lifestreams: A storage model for personal data. ACM SIGMOD Record, 25(1), 80-86.
Harris, J. M., Woodward, E. E., & Borgstahl, R. W. (2001). U.S. Patent No. 6,331,972. Washington, DC: U.S. Patent and Trademark Office.
Ludington, S. (2006). Reining in the data traders: A tort for the misuse of personal information. Maryland Law Review, 66.
Purdy, P. K., Fowler Jr, E. F., & Cochran, M. J. (1998). U.S. Patent No. 5,726,660. Washington, DC: U.S. Patent and Trademark Office.

Did it help you?

Cite this Page

How Data Shapes Meaning?. (2022, Jan 28). Retrieved from

Need customer essay sample written special for your assignment?

Choose skilled expert on your subject and get original paper with free plagiarism report

Order custom paper

Without paying upfront