quora
Nobody downloaded yet

Privacy and technology - Essay Example

Comments (0) Cite this document
Summary
Privacy and Technology Name: Institution: PRIVACY AND TECHNOLOGY Achieving total privacy in today’s world is next to impossible and majority of people have now accepted that they can only live semi-private lives. However, even in this case, most of them are unaware of the extent to which their privacy is being invaded without their permission and knowledge every day…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful
Privacy and technology
Read TextPreview

Extract of sample
"Privacy and technology"

Download file to see previous pages According to If Looks could kill by The Economist and Trading Liberty for Illusions by Wendy Kaminer, the world today tends to prefer the inconsequential over the important aspects in their lives. For instance, people now judge based on race after the 9/11 attacks, airport security has become increasingly intrusive, and technological advances have eroded whatever little privacy people had left. Both Wendy Kaminer in Trading Liberty for Illusions and The Economist in If Looks Could Kill refer to terrorism as one of the main reasons why the privacy of ordinary American citizens is being invaded. The main reason for Kaminer’s article is to opine that the government hides behind the threat of terrorism to excuse their infringement on their citizen’s rights. She uses the rhetorical technique of pathos to appeal to the readers’ emotions. She starts her article by saying, “Only a fool with no sense of history would have been sanguine about the prospects for civil liberties after the September 11 attack” (Kaminer, 2004). This ensures the reader knows she is against the invasion of privacy on the pretext of terror threats. She contends that the Bush Administration held over a thousand non-native Americans after the 9/11 terrorist attacks, although most of them were not connected to the events of the day (Kaminer, 2004). Kaminer concludes that the fear of the government and subsequent attacks make citizens give their liberty up because they have been fed on security illusions. On the other hand, The Economist’s main reason for writing their article is to opine that the threat of terrorism and crime has pushed technology to higher heights. They use the rhetorical device of logos to contend that technology talking about the ability of new technology to use micro-expressions rather than the old profiling technique. This technology will remove the risk of racial profiling by the police because all it detects are expressions made by an individual, rather than the color of their skin (The Economist, 2008). In addition, The Economist also contends that the technology will be important in cases where packages are left by suspicious individuals and will alert security officials on the potential danger. The Economist talks about other technologies aimed at anti-terrorism that measures breathing and heart rate, perspiration rates, temperature of one’s skin, and the flow of blood, doing all this while the potential suspect is some meters away from them. They say that this machine was tested, and it identified 80% of individuals attempting to sneak weapons into a room (The Economist, 2008). It is clear that The Economist and Wendy Kaminer have very different ideas on the use of technology to combat terrorism. While Kaminer contends that the current technology fails and infringes on the privacy of ordinary citizens, The Economist is of the idea that new technologies in the pipeline will be more reliable and will not be culpable to racial profiling. The two articles discuss the issue of technology and privacy but organize their arguments in different ways. Wendy Kaminer in Trading Liberty for Illusion begins her article by contending that terrorist attacks and crime have always led Americans to allow the government to trample civil liberties when there is an attack because they feel under siege or frightened (Kaminer, 2004). She gives a brief history of US Presidents who ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Privacy and technology Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/english/1487604-privacy-and-technology
(Privacy and Technology Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/english/1487604-privacy-and-technology.
“Privacy and Technology Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/english/1487604-privacy-and-technology.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Employee and Technology Privacy: Is the Boss Spying
A study conducted by Vault.com to find out how employees use internet at work for their personal items, indicated that their employers have software, which they use to track and see the websites that their employees have visited (Jennings, 2008). This report also indicated that employees spend a large amount of time surfing the net instead of doing their jobs.
4 Pages(1000 words)Essay
Technology and its Effects on Privacy
The present age is the age of information, where most activities, including economic activities, are information based. This is mainly because of the high level of technological advancement today. Technology has made the world to become a global village, as it has broken down all the geographical boundaries and barriers to enable people from different parts of the world to communicate easily through the trans-border flow of data.
5 Pages(1250 words)Essay
The Value of Digital Privacy in an Information Technology Age
This paper talks about the importance of digital privacy, and the various laws that affect it. It discusses about the advantages and disadvantages of the public access to an individual’s private information and the measures that citizens should take in order to protect their privacy in regard to information dissemination.
5 Pages(1250 words)Essay
Privacy and New Technology
However consent becomes only relevant to the application of some privacy principles. It is either framed as an exemption to general prohibition done against handling of personal information in a certain way or it is also done as a
1 Pages(250 words)Assignment
Effect of Technology on Workplace Privacy
This advancement in the field of technology, most particularly in the surveillance technology has had abounding effects on the extent of privacy granted to individuals at the workplace. In other words, it has affected the extent to which the employees have been deprived of their rights of solitude.
20 Pages(5000 words)Essay
Privacy Issues in the Workplace- Technology and Social Media
We have common and federal laws that govern the right to privacy. Other laws governing the privacy of employees in a working environment include the National Labor Relations Act (NLRA) that forbids an
2 Pages(500 words)Essay
Privacy
For an individual, his privacy is his right to determine with whom, when and what sort of information regarding himself he intends to share with others or allow other to access. Personal privacy of an
3 Pages(750 words)Essay
Substantive literature review on the issue(s) presented;pervasiveness of technology, technological dependence, privacy, autonomy, security of data, democracy online, freedom of expression online, technological euphoria
This rapid change comes as a result technological advancement that changes the day-to-day technological devices from less to a more powerful device of smaller sizes than the personal computer. This change has recorded progressive production of natural products that
5 Pages(1250 words)Essay
Privacy
widely discussed by the public with questions such as what level of privacy exactly should be accommodated and when is it ok for one to breach another individual’s privacy (Quinn, 2012). Privacy is also related to a number of other subjects such as anonymity which is an
5 Pages(1250 words)Essay
Is technology an invasion of privacy
The current technologies comprise of computers, spectrographs, video lens and transmitters. A significant substance obtained is personal data. During 1928, US’ Supreme Court Judge Brandeis wrote that invention and discovery have rendered it conceivable for the authorities, by techniques far more effectual than stretching on the rack to acquire disclosure in a law court of what is hissed within the closet.
5 Pages(1250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Privacy and technology for FREE!
logo footer
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us