StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Issues of Privacy and Surveillance about the Internet - Coursework Example

Cite this document
Summary
This paper 'The Issues of Privacy and Surveillance about the Internet' tells that Privacy is security. It protects our autonomy and power in controlling our personal lives. It is the heart of our freedom and the center of our fundamental rights. The intrusion of our privacy infringes on violates our fundamental rights…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
The Issues of Privacy and Surveillance about the Internet
Read Text Preview

Extract of sample "The Issues of Privacy and Surveillance about the Internet"

The Issues of Privacy and Surveillance in Relation to the Internet Introduction Privacy is security. It protects our autonomy and power in controlling our personal lives (Moore 184). It is the heart of our freedom and the center of our basic rights (Rotenberg, qtd. in Buchholz and Rosenthal 34). Hence, the intrusion of our privacy infringes our freedom and violates our basic right. Thus, privacy should be respected and protected. Unfortunately however, the digital world that made online social networking possible has essentially reduced the issue of privacy irrelevant and trivial, as online surveillance has become rampant. Edward J. Snowden, a former contractor of the NSA (Devlin 12) proved this to be true. The 50,000 pages NSA classified documents he leaked to the media revealed to the world the magnitude of the US government’s surveillance of U. S. citizens, world leaders, and others over the Internet (“The Surveillance State and Its Discontents,” 64). Snowden’s exposé rekindled issues of privacy which in today’s context of global security has become more complex than ever. Gen. Keith B. Alexander, the director of NSA himself did not deny Snowden’s exposé but rather insisted that online surveillance is a necessary evil to win the war against terrorism, as he saw it the only best way to spy on terrorists (Sanger and Shanker, par. 1). Hence, online surveillance is meant to assure us of our security. But on the contrary, we do not feel secure and at ease knowing that we are being watched even if we are law-abiding citizens. In fact, we are equally terrorized by the mere thought of identity hacking, cyber bullying, cyber stalking, and other cybercrimes that we see happen due to online surveillance. In short, online surveillance creates more fear and insecurity than otherwise, knowing how dangerously intrusive the Internet can be. Although the NSA claims its online surveillance as simple intelligence work against terrorism and other crimes, the very nature of digital technology today proves otherwise. In the Internet, profiling has become easy not only because of the technology, but also because the required information to profile people is free and readily accessible in online social networking sites. “The digital technologies that have revolutionized our daily lives have also created minutely detailed records of those lives” (Richards 1934). These profiles can be used for whatever purpose most useful and most profitable to those who have them (Buchholz and Rosenthal 34). In the end, profiling makes us vulnerable to anything, whether good or bad. Breaching people’s privacy is not a new thing. The difference today is the sophistication and subtleness of violating one’s privacy that even the law meant to protect individual’s privacy is rendered ineffective. Hence, it is more chilling. The resurgence of our assertion for privacy, specifically Internet privacy, does not mean we condone terrorism. Rather, we wanted to draw a clear line between privacy and security interest, as we see how easily online surveillance can be abused not only for cybercrimes but much more frightening for witch hunting. Internet privacy is not a trivial matter but in fact has become more necessary and urgent today as global insecurity reigns; it has become more compelling as the intrusive nature of the Internet (Garfinkel 260) has blurred the line between privacy and security and in defining what is public information and what is private information. Internet Privacy Since its inception, the Internet has become the center of all human communications whether personal, business related, social, or political. Every time we communicate via the Internet, we are storing bits and pieces of information about ourselves and other people that can be easily retrieved and accessed, not by us, because we rarely retrieve information about us. Those interested in doing this are cyber criminals, business companies, service providers, and the state. This information when aggregated and analyzed produces our profile that may be used any way they want without us knowing it. Internet privacy protects us from possible unpleasant third party usage of our personal information and associations. Internet privacy could be understood following the general meaning of privacy – the “right to maintain a certain level of control over the inner spheres of personal information… right to limit public access to the ‘core self’ – personal information that one never discloses – and to information that one discloses only to family and friends” (Moore 182). However, Boyd clarifies that Internet privacy does not refer to the relation of the individual to information. Rather, privacy is the confident feeling that users have control of their social situations and that they have the sufficient agency to assert control. Control, she explains, does not pertain to the control of the technology or the enabling of privacy settings on users’ social network accounts. Rather, control refers to the full understanding of the social situation in which users participate (i.e., the viewers and the nature and reason of viewing, the norms and boundaries of the network). It is only through this control that users can make responsible choices. Hence to have Internet privacy, users must first understand what it is. On the other hand, agency refers to structural factors that help the user assert control. Hence, Internet privacy does not simply refer to restricting the accessibility of information. Instead, it refers to having sufficient agency to feel in control over the spread and interpretation of information. Boyd also emphasizes that breach of Internet privacy is not only harmful to an individual but can actually be more harmful to the networked public. As such, she recommends that policy makers and privacy advocates should address issues of privacy beyond the individual approach to a collective approach. Key to this is the full understanding of “what happens as the data flows across networks and as the data is networked together.” (2, 5) In short, Internet privacy is not an individual matter but a collective matter because online communication is a networked communication. Your online participation does not simply reveal about you, but even the people that are connected to you. Internet privacy is not simply enabling online social networks their privacy settings or restricting access to information. Rather, it is having the full understanding on the flow of the data that go through various networks and that are networked together. Why is this so, lies on the fact that traditional communication settings greatly differ from that of the Internet. For example, unlike the Internet, which is “a store-and-forward technology… a personal face- to- face communication is fleeting. A phone call is most likely to be confined to dyad that conducts it. A social party on held private property is presumably self-contained.” (Walther 3-4) Online Surveillance Surveillance comes from the Latin verb ‘vigilare’ and the French term ‘surveiller’ which means to watch over (Petersen 4). There are different ways in conducting surveillance. In the past, surveillance is popularly depicted by George Orwell’s ‘Big Brother’ and Jeremy Bentham’s ‘Panopticon’. It involves a few, primarily the authority watching over the many. It uses surveillance equipment such as electronic bugs and camera. (Albrechtslund, sec. 4) As such, surveillance can be easily traced and countered. But the development of digital technology has radically changed the very nature of surveillance. No longer is surveillance physical and personal, because information is virtually stored and networked through the Internet. As such, it is almost untraceable unless there is a breach in the system. Furthermore, surveillance has become participatory and interconnected. Information is freely provided, stored and made easily accessible through social networking sites and e-mail communications. People may not even realize that through the Internet they, themselves are freely subjecting their selves and even their families and friends to surveillance, not until the like of Snowden leaked information. Moreover, surveillance is no longer exclusive to the state. Anyone with the required technological expertise can now watch anyone online, because the Internet is largely unregulated. In short, online surveillance is almost inescapable because once you communicate online your data and prints are automatically captured. However, Albrechtslund argues that online surveillance is not necessarily harmful as traditionally understood. He contends that online surveillance has a social aspect which can be understood as a form of participatory surveillance. Here, the elements of mutuality, empowerment, and sharing are present. This, he furthers, creates positive social relations between and among people from different parts of the globe. Thus, he recommends that the concept of surveillance should be redefined. (sec. 4-5) As to how it should be redefined Albrechtslund did not proceed any further. But following his thoughts, it seems that he would like to define surveillance to be not necessarily intrusive or invasive. In short, he is implying that online surveillance does not necessarily threaten Internet privacy. Though he recognizes the dangers of online surveillance, the best thing to do to avoid this is to take precautionary measures. And what is the best precautionary measure against abuse on online surveillance? It is no other than Internet privacy. To Lyon’s definition, surveillance refers to “any collection and processing of personal data, whether identifiable of not, for the purposes of influencing or managing those whose data have been garnered” (2). For Lyon therefore, what makes online surveillance dangerous and a threat to privacy is not the absence of mutuality, but rather the cunning use of manipulation, as what Snowden revealed about the NSA’s online surveillance, to reorder society. This to my belief is what makes surveillance dangerous. This is what makes surveillance an activity that should be highly regulated. Perhaps if surveillance did not involve manipulation, it may not be as contentious as it is today. Conclusion Privacy has become more complex and contentious with the emergence of the Internet. The emergence of the Internet has drastically changed people’s concept and way of communicating from the traditional oral face to face communication to virtual communication. Communications have become more internationally interconnected and unregulated. Interactions have become non-physical and non-personal. People suddenly live in a single world, knowing in a single mouse click what happens on the other side of the globe and being able in a single mouse click to be part of that other side of the globe. Thus, it made people’s communication and interaction more convenient, in-time, inexpensive, and far-reaching. But given its intrusive nature, the Internet has made online surveillance highly effective, inescapable and almost untraceable, making Internet users vulnerable to prying and communications, interactions and transactions on the Internet equally susceptible to abuse. The best way for users to be protected from this danger of online surveillance while they enjoy the social aspects of the Internet is to assert Internet privacy as defined by Boyd. Works Cited Albrechtslund, Anders. “Online Social Networking as Participatory Surveillance.” First Monday 13.3 (2008). 31 Jan. 2014 http://firstmonday.org/ojs/index.php/fm/article/view/2142/1949http%3A. Boyd, Danah. “Networked Privacy.” Personal Democracy Forum 6 June 2011. http://www.danah.org/papers/talks/2011/PDF2011.html (30 Jan. 2014). Buchholz, Rogene A. and Sandra B. Rosenthal. “Internet Privacy: Individual Rights and the Common Good.” SAM Advanced Management Journal 67.1 (2002): 34+. Devlin, Frank. “Cyber Risk Rising: Cyber Security Experts Explained Their Many Challenges at a Recent New York Chapter Panel Discussion.” The RMA Journal October 2013: 12. Garfinkel, Simson. Database Nation: The Death of Privacy in the 21st Century. Sebastopol, CA: O’Reilly & Associates, Inc., 2000. Lyon, David. Surveillance Society: Monitoring Everyday Life. Buckingham: Open University Press, 2001. Moore, Adam D. “Intangible Property: Privacy, Power, and Information.” Information Ethics: Privacy, Property, and Power. Ed. Adam D. Moore. Seattle, WA: University of Washington Press, 2005. 172-190. Petersen, Julie K. Introduction to Surveillance Studies. Boca Raton, FL: Taylor & Francis Group, 2013. Richards, Neil M. “The Dangers of Surveillance.” Harvard Law review 126 (2013): 1934-1965. “The Surveillance State and Its Discontents.” Foreign Policy Nov/Dec. 2013: 64+ Sanger, David E. and Thom Shanker. “N.S.A. Director Firmly Defends Surveillance Efforts.” The New York Times 12 Oct. 2013: 1-2. 29 Jan. 2014 . Walther, Joseph B. “Introduction to Privacy Online.” Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web. Eds. Sabin Trepte and Leonard Reinecke. Berlin Heidelberg: Springer-Verlag, 2011. 3-8. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Issues of Privacy and Surveillance about the Internet Coursework Example | Topics and Well Written Essays - 1500 words, n.d.)
The Issues of Privacy and Surveillance about the Internet Coursework Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/journalism-communication/1806520-the-issues-of-privacy-and-surveillance-in-relation-to-the-internet
(The Issues of Privacy and Surveillance about the Internet Coursework Example | Topics and Well Written Essays - 1500 Words)
The Issues of Privacy and Surveillance about the Internet Coursework Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/journalism-communication/1806520-the-issues-of-privacy-and-surveillance-in-relation-to-the-internet.
“The Issues of Privacy and Surveillance about the Internet Coursework Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/journalism-communication/1806520-the-issues-of-privacy-and-surveillance-in-relation-to-the-internet.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Issues of Privacy and Surveillance about the Internet

Technology and its Effects on Privacy

These problems are mainly concerned with the right of privacy and the right of access to information, which are threatened by the current free flow of information, as well as the safeguarding of the financial interests of the owners of intellectual property.... the internet has played a major role in making this happen, since most people from different world regions will easily link up today by using the E-mail and other social network sites, including Facebook and MySpace....
5 Pages (1250 words) Essay

Government Surveillance and Data Mining Operations

Reports about the National Security Agency's recent operations have precipitated the recent controversy about government surveillance and data mining operations.... With the cooperation of telecommunication networks, they have gained access to call records of most of the citizenry. Do government surveillance and data mining operations do more good in protecting against terrorism than they do harm in violating privacy Reports about the National Security Agency's recent operations have precipitated the recent controversy about government surveillance and data mining operations....
2 Pages (500 words) Essay

International privacy rights a primer

Surveillance of the internet will also reveal considerable information.... The mismanagement of data on the internet will also cause loss of faith in the customer and result in losses to the company apart from violation of the moral and legal code.... It is also prudent to inform customers of their right to privacy and the efforts being made by the company to protect it.... Invasion of privacy implies access to information without consent....
2 Pages (500 words) Essay

Why should we stop worrying and learn to love WK3 assignment

This is through the development of spyware software that the specialists install on the internet linked computers.... e all should stop worrying about the surveillance and embrace it and learn to love it.... This is by maintaining an individual's privacy and enabling everyone to make their decisions (Boris, 2013).... hellip; IT specialists can monitor internet links.... IT specialists can monitor internet links....
2 Pages (500 words) Essay

Theories of Human Rights

There have been cases reported about FBI agents breaking into and searching people's homes without notice.... Targets of FISA surveillance are not furnished with the contents of the court order that led to their arrest and as such, they lack the grounds to challenge wiretaps and searches done illegally....
5 Pages (1250 words) Term Paper

Legislative and Executive Powers

hellip; implications of the law violate one of the most fundamental rights of any individual, the right to privacy and security guaranteed by the Constitution. This act was enacted as a kneejerk reaction to the tragic events of September 11 brought about by terrorists.... The implications of the law violate one of the most fundamental rights of any individual, the right to privacy and security guaranteed by the Constitution.... The wide reach of the law allows surveillance of private individuals that extends to their phone conversations, internet communications and even bank transactions....
1 Pages (250 words) Coursework

Cyber Intelligence and Privacy Breach

as obstructing the privacy and basic rights of ordinary citizens.... a working mechanism which will allow for a more transparent, efficient and little controversial working mechanism with regard to privacy and public personal life (Brand).... It largely observes and conducts surveillance activities on online traffic and via phone calls recording.... This has led to questioning with regard to… The pertinent question is to ensure maximum security, and at the same time ensure that the privacy is not breached. Owing to this concern, number of citizens moved the pleas presented were based on the fact that privacy is being eroded....
6 Pages (1500 words) Essay

The Relationship between Science and Ethics

hellip; Moreover, at the present moment the internet has become one of the most effective platforms for communication; so, not only ordinary people but terroristic groups as well use it to coordinate their actions.... Thus, continuing this idea, one might point out that the notion of privacy in the social environment is ephemeral since from the very beginning people knew that they had to sacrifice it.... The author of this paper "The Relationship between Science and Ethics" provides the discussion of the views of two widely known philosophers on the nature of government as well as the role it plays in the lives of the people and projects these ideas on the issue of surveillance....
10 Pages (2500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us