StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Privacy and technology - Essay Example

Cite this document
Summary
Privacy and Technology Name: Institution: PRIVACY AND TECHNOLOGY Achieving total privacy in today’s world is next to impossible and majority of people have now accepted that they can only live semi-private lives. However, even in this case, most of them are unaware of the extent to which their privacy is being invaded without their permission and knowledge every day…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
Privacy and technology
Read Text Preview

Extract of sample "Privacy and technology"

Download file to see previous pages

According to If Looks could kill by The Economist and Trading Liberty for Illusions by Wendy Kaminer, the world today tends to prefer the inconsequential over the important aspects in their lives. For instance, people now judge based on race after the 9/11 attacks, airport security has become increasingly intrusive, and technological advances have eroded whatever little privacy people had left. Both Wendy Kaminer in Trading Liberty for Illusions and The Economist in If Looks Could Kill refer to terrorism as one of the main reasons why the privacy of ordinary American citizens is being invaded.

The main reason for Kaminer’s article is to opine that the government hides behind the threat of terrorism to excuse their infringement on their citizen’s rights. She uses the rhetorical technique of pathos to appeal to the readers’ emotions. She starts her article by saying, “Only a fool with no sense of history would have been sanguine about the prospects for civil liberties after the September 11 attack” (Kaminer, 2004). This ensures the reader knows she is against the invasion of privacy on the pretext of terror threats.

She contends that the Bush Administration held over a thousand non-native Americans after the 9/11 terrorist attacks, although most of them were not connected to the events of the day (Kaminer, 2004). Kaminer concludes that the fear of the government and subsequent attacks make citizens give their liberty up because they have been fed on security illusions. On the other hand, The Economist’s main reason for writing their article is to opine that the threat of terrorism and crime has pushed technology to higher heights.

They use the rhetorical device of logos to contend that technology talking about the ability of new technology to use micro-expressions rather than the old profiling technique. This technology will remove the risk of racial profiling by the police because all it detects are expressions made by an individual, rather than the color of their skin (The Economist, 2008). In addition, The Economist also contends that the technology will be important in cases where packages are left by suspicious individuals and will alert security officials on the potential danger.

The Economist talks about other technologies aimed at anti-terrorism that measures breathing and heart rate, perspiration rates, temperature of one’s skin, and the flow of blood, doing all this while the potential suspect is some meters away from them. They say that this machine was tested, and it identified 80% of individuals attempting to sneak weapons into a room (The Economist, 2008). It is clear that The Economist and Wendy Kaminer have very different ideas on the use of technology to combat terrorism.

While Kaminer contends that the current technology fails and infringes on the privacy of ordinary citizens, The Economist is of the idea that new technologies in the pipeline will be more reliable and will not be culpable to racial profiling. The two articles discuss the issue of technology and privacy but organize their arguments in different ways. Wendy Kaminer in Trading Liberty for Illusion begins her article by contending that terrorist attacks and crime have always led Americans to allow the government to trample civil liberties when there is an attack because they feel under siege or frightened (Kaminer, 2004).

She gives a brief history of US Presidents who

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Privacy and technology Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/english/1487604-privacy-and-technology
(Privacy and Technology Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/english/1487604-privacy-and-technology.
“Privacy and Technology Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/english/1487604-privacy-and-technology.
  • Cited: 0 times

CHECK THESE SAMPLES OF Privacy and technology

Is technology an invasion of privacy

Technology is an invasion of privacy through the fresh information technologies that encompasses larger issues concerning the multifaceted inter-relations of society and technology;... This paper will show how technology is an invasion of privacy.... The influence of private and governmental organizations to coerce disclosure (whether centered on circumstance, technology, or law) and to collect, analyze and disseminate personal data is growing swiftly(Lyon& Zureik 45)....
5 Pages (1250 words) Essay

The Proliferation of Electronic Patient Records

Yet in an information security survey of 4,255 information technology and information security managers, forty one percent of respondents said they do not have formal security policies (Anthes, 1998).... The benefits include enhanced patient autonomy, improved clinical treatment, advances in health research, and public health surveillance The challenge to providers due to this proliferation is the creation of legal challenges in three interrelated areas: privacy of identifiable health information, reliability and quality of health care, and tort based liability (Hodge, et....
30 Pages (7500 words) Essay

The Hidden Threat to the Digital Future

E-commerce has been part of the marketing and sales methodology for such organizations since the Internet opened to commercial organizations in 1995.... Organizations also make use of the Internet to allow their employees to telecommute and to facilitate communication with business partners.... hellip; An enterprise level organization (10,000+ user accounts) will have a mixture of platforms and customized applications (legacy systems)....
3 Pages (750 words) Essay

Master's level APA-style paper as prescribed herein

There are very few nations in which Nike products are not available, and there are no economically viable countries in which Nike does not have a recognizable and profitable market… Financial leader Warren Buffet has 0.... % of his portfolio dedicated to stock in Nike, Inc.... (Warren, 2009), allowing the assumption that the stock is a trustworthy investment....
25 Pages (6250 words) Essay

Management of Technology

This extensive spread or integration of technology and innovation is constituted under broad social psychological/sociological theory named as Diffusion of Innovations.... hellip; One of the main proponents of this theory is Everett Rogers and he has interpreted diffusion of technology or innovation in various perspectives.... So, this paper will first focus on Rogers' and other experts' perspectives or ideas of technology diffusion.... Then will discuss the origins and functioning of the RFID technology and how diffusion process is applicable to this technology....
20 Pages (5000 words) Essay

Surveillance Technology: Paradox in Private Security

This research analyzes the changes brought by technology in surveillance.... hellip; The modern-day period has given a widespread opportunity for technology to flourish.... Together with the rise of surveillance technology are the consequent rackets created by privacy advocates who question the moral and legal implications brought by the rising popularity of surveillance technology.... Although the benefits of surveillance technology may have a considerable impact on peoples' living conditions, its basic technique threatens the foundation of individual rights to privacy, possibly outweighing public welfare for private privileges....
8 Pages (2000 words) Research Paper

National Security Agency

The agency uses signals of intelligence to collect, process, destroy from foreign signals so as to protect the defense operations of the military The agency as well helps the Network Warfare Operations in defeating terrorists and all their organizations, alongside upholding US laws and protecting the privacy and civil liberties (the United States 1).... The American Civil Liberties Union is the party that had presented the case expressed their disappointment regarding the decision as an understatement to privacy implications of government surveillance....
6 Pages (1500 words) Case Study

Information Technology and Privacy

This term paper "Information Technology and Privacy" presents privacy and confidentiality that relate to the ability of information to be kept away from third persons (Garson, 2003).... hellip; Various other characteristics aided by developments in Information technology have also increased the invasion of individual privacy.... Security measures such as the implementation of the USA Patriot Act have also further increased interference with citizen privacy....
11 Pages (2750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us