StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

CIA Monitors Up to 5 Million Tweets Daily - Essay Example

Cite this document
Summary
The paper "CIA Monitors Up to 5 Million Tweets Daily" talks about how the CIA monitors people's activities on social media sites Twitter and Facebook. The agency gathers facts in several languages to build an instantaneous image of the mood of various territories in the world. The CIA…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
CIA Monitors Up to 5 Million Tweets Daily
Read Text Preview

Extract of sample "CIA Monitors Up to 5 Million Tweets Daily"

Article Data privacy Vijayan, Jaikumar. “CIA Monitors Up to 5 Million Tweets Daily, Report Says.” Web. 10 November 2011 . This article talks about how the CIA monitors peoples activities on social media sites twitter and face book. It is reported that the security agency monitors close to five million tweets on a daily basis. The justification given by the CIA on its action is that, the agency gathers fact in several languages to build an instantaneous image of the mood of various territories in the world. The CIA initiated the process of collecting information anonymously following advice by the 9/11 commission. The data privacy issues in this article are that the CIA collects information without the consent of twitter and face book accounts holders hence infringe on their privacies. Burnham, Kristin. “Online Privacy: How to Block Google Ads and Adjust Your Settings.” 2011. Web. 10 November 2011 . This article highlights how Google an online service provider, collects information from its services users to optimize online searches. For instance, the article highlights that most of the advertisements Google shows are linked to the subject of the email exchange or thread. In view of this, if a Gmail account holder receives several emails centered on the theme of photography, Google collects this information and optimizes it for advertisements related to photography. Google claims to protect its online user’s privacy by not offering the users information that individually identifies them to the third parties such as marketers. The relevance of the article to data privacy is that, it offers tips on how to adjust Google setting to safeguard ones privacy. The Privacy Projects. “National Cyber Security Alliance to Coordinate Data Privacy Day.” 2009. Web. 10 November 2011 . In this article the National Cyber Security Alliance, highlights some of the measures it has put in place, to create awareness on data privacy and protection in the online platform. National Cyber Security Alliance highlights some of the achievements, which have been realized in data safety through collaborative efforts. The relevance of this article to data privacy is that organizations have realized data privacy is an issue in the online platform hence the need to safeguard it. Data protection Day 2010 - Think Privacy - new videos. 2009. This video centers on the needs to safeguard information shared. Those who do not safeguard their information do not enjoy peace, while those who do safeguard their information enjoy privacy. Thus, information shared with the public can be used against the owner resulting into bad consequences. Data protection lesson. 2009. This video focuses on educating young people on the importance of data privacy, how data is collected and misused. Furthermore, the teachers in this video teaches her students on various methods through which data is obtained and how it is used to benefit everyone such as through a census. The significance in this to data privacy is that individuals need to be careful with who they share their information with Data Privacy and Social Networking 01-28-2010.mov. Dir. ontargetweb. 2010. http://www.youtube.com/watch?v=_YLt3g8hI5I This video focusses on how information shared on the online platform can turn out to be disadvantageous to the owner. Furthermore, the video highlights measures people can put in place to safeguard data privacy such as maintaining anonymity in the online social setting. Poor data privacy can lead to loss of jobs, loss of finances and loss of identity in an event the information shared is accessed by unauthorized individuals. Article 2 Intellectual property rights Understanding Intellectual Property Law. Perf. Stephan Kinsella and Adam. 2011. http://www.youtube.com/watch?v=P1NYpfOz6PU This video is a criticism of how intellectual property rights for years have been used indiscriminately. This is because majority of consumers are unaware of how intellectual property rights work. In addition, intellectual property rights protection does not harm the evolution of technology. Intellectual Property Rights for Educators - Scenario Video: Using Music in Lectures. Dir. University college fall. 2011. This video focuses on the importance of upholding intellectual property rights when using other peoples work in lectures. Choosing the correct procedure while using other peoples work, helps avoid disagreement between the owner of the intellectual property rights in music or other digital content. Video 3: Marshall Lerner Harvard Lecture Copyright Infringement pt1/7. Perf. Marshall Lerner. 2009. This is a lecture on copyright violation, fair use, and the use of the internet to access intellectual properties. What is allowable with respect to the exploit of digital work under the patent law is not always obvious. Even though there are some stipulations by patent law for fair use, the internet raises fresh issues of what is lawful, correct, and reasonable to property owners and end user. The International Trade Administration, U.S. Department of Commerce. “Intellectual Property, What is It?” 2011. Web. 10 November 2011 . This article focuses on the various types of intellectual property available in America, what they cover and the laws governing them. Intellectual property rights are divided into various categories depending on the content being restricted. For example, digital content, such as music is covered by copyright laws. Violation of intellectual property rights constitute to criminal acts punishable by law. Masnick, Mike. “Pirate Bay Loses A Lawsuit; Entertainment Industry Loses An Opportunity.” 2009. Web. 10 November 2011 . This article discusses the case of “pirate bay” a site that used to offer copyrighted digital content such as music freely without the consent of the copyright owners. This case is relevant to copyrights because it highlights the threat presented by the digital media such as the internet to intellectual property rights. Savitz, Eric. “Google Sued By Photographers Alleging Copyright Infringement.” 2010. Web. 10 November 2011 . This article discusses copyright infringement by search engine giant Google on the privileges of illustrators, photographers, and other image artist. The article is relevant to copyright issues because it highlights how use of other people work without their authority can lead to lawsuits. The internet presents a platform whereby original content can be reproduced and distributed within a very short time, hence causing large losses to the intellectual property owners. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Digital Essay Example | Topics and Well Written Essays - 750 words - 1”, n.d.)
Digital Essay Example | Topics and Well Written Essays - 750 words - 1. Retrieved from https://studentshare.org/business/1436270-digital
(Digital Essay Example | Topics and Well Written Essays - 750 Words - 1)
Digital Essay Example | Topics and Well Written Essays - 750 Words - 1. https://studentshare.org/business/1436270-digital.
“Digital Essay Example | Topics and Well Written Essays - 750 Words - 1”, n.d. https://studentshare.org/business/1436270-digital.
  • Cited: 0 times

CHECK THESE SAMPLES OF CIA Monitors Up to 5 Million Tweets Daily

The 1979 Revolution and Modern Day Iran

However, as indicated in most historical books, the revolution occurred as a result of the people of Iran being fed up with the Shah's rule which was characterized by corruption, ill-conceived modernization programs, suppression of civil liberties and western loyalties (World Savvy Monitor, par 5)....
4 Pages (1000 words) Research Paper

Air Quality in the Twin Cities

The paper "Air Quality in the Twin Cities" tells that midway through the 20th century, the United States started growing concerned with air quality, especially in larger cities.... Beginning with the Air Pollution Control Act of 1955, the government would continue to pass Acts.... ... ... ... According to the US government regulation website, the timeline for nonattainment states is varied based on which pollutants the state complied with or defied the NAAQs....
20 Pages (5000 words) Research Paper

Environment Degradation in China

The predicament is that China's remarkable development has come to the detriment of similarly stunning environmental degradation.... Ever since the start of reforms, the most frequently precise forms of environmental pollution in China are namely, Water shortage and pollution, Air pollution and Land degradation & deforestation. ...
11 Pages (2750 words) Essay

Satellite Technologies as the Subject of the Broker by Grisham

The reason for engineering Backman's release and helping him to go into hiding is to set him up as bait to fish out the parties involved in the deal for the satellite software.... The key element that drives this book on to its climax in the fact that the reader does not know who put up the secret satellites and who's trying to buy the software and the intense surveillance maintained on Backman as he lives in Italy is geared towards unlocking these secrets.... The Director of the cia convinces the President to pardon him but the motive behind his action is not altruistic....
6 Pages (1500 words) Book Report/Review

Democratic-Republican National Convention 2003

For instance, the expenditure for security arrangement and planning for the FTAA Conference in Miami in 2003 was anticipated to scale up to $23.... Precedent political conventions such as this one are anticipated to have brought anywhere from $150 - $160 million to the home economies of the host city.... In comparison, the 2007 Super Bowl is likely to have brought over $463 million to the local economy of the tri-county area consisting of Miami-Dade, Broward, and Palm Beach counties (Kan, 2006)....
9 Pages (2250 words) Essay

The Modern World-System

million; India, 158.... million; China, 193.... million (Davis, p.... Back them up with skilled productive catalysts.... This paper "The Modern World-System" discusses the following questions: what is the most appropriate conceptualization of development with regard to poor countries and, alsowhat are the possible objections to taking a positive approach and having a World Plan....
11 Pages (2750 words) Assignment

How Someone's Every Move Can Be Monitored by Surveillance

"How Someone's Every Move Can Be Monitored by Surveillance" paper states that the way governments are putting up the state of the art surveillance systems to spy on their own people; it is not paranoid to think that someone is lurking in the shadows but it may rather be the truth.... There are plenty of cases held up in American courts to prove it wrong.... BrainByrd believes that the reason to show the picture was to pressurize the couple into giving up the computer for repossession easily....
6 Pages (1500 words) Article

Development of a Surveillance Cameras System

We have had several cases where Homeland Security in America has monitored the tweets from various users since the 9/11 disaster on American soil.... When they monitor the users' tweets on Twitter, they will also have the personal details about the user's account and can be able to track down the users to the location they actually reside....
7 Pages (1750 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us