Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Privacy and Surveillance in the Digital Age - Movie Review Example

Comments (0) Cite this document
The Minority Report is science fiction movie in which the future was monitored and explored by controlling the present. The movie revolves around three Pre-Cogs having a special ability to predict the future crimes and murders; these psychics were created through genetic experimentation…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
Privacy and Surveillance in the Digital Age
Read TextPreview

Extract of sample "Privacy and Surveillance in the Digital Age"

Download file to see previous pages The story then enters its crucial phase when the system predicts that Anderton will future murderer of Leo Crow; the person whom Anderton did not know. The epic then revolves around the attempts made by Anderton to escape from FBI and his fellow agents. He then successfully approached one of the psychics and is assisted by the program manager; through investigation he realises that the program developer has left a control under him to design and manipulate the future.
High-tech surveillance is the real entertainment offered by director Tony Scott in his movie Enemy of State. The movie has focused upon application of the technological gadgets and software to trace and monitor the daily electronic communication of the American citizens to prevent terrorism. A bill titled Telecommunications Security and Privacy Act was sent to legislation for approval, however the bill was ostensibly rejected by Congressman, the legislator was then shot dead by National Security Agency, however the footage of the Congressman murder was recorded by photographer. The photographer is then traced while he was exchanging this information through telephone; he was then traced however he managed to protect the evidence from the National Security Department. The evidence landed in the shopping bag of the lawyer Dean. The epic moves around the attempts by National Security Agency officials to retrieve the evidence from the lawyer Dean; who is equally innovative and cautious about his security and has bugs installed at his place.
Referring to the Minority Report, the access to future is acceptable, and carrying out attacks on the individuals based upon their future sins is arguable. The prosecutor was executed and justice is delivered after the crime, however in this epic the justice is delivered prior to the occurrence of the crime. The extent of the involvement of the security agencies in the personal life of the individuals only for the sake of National Security is not encouraging. At the end of the movie, it is concluded that the programming was corrupted by the developer; such loopholes in the system further aggravate the situation, and develop reluctance among the masses to accept the change.
I believe that if the criminals are executed based upon the information from future-teller; then it is essential that such system shall be error-proof. I understand that the security of the country is essential but the influence of the technology shall never be to an extent that it restricts and controls the liberty and freedom of the individual citizen.
With reference to the movie Enemy of the State; the importance of the intelligence information to prevent and identify the terrorists and criminals from the society cannot be ruled out, but if the same intelligence is being used to monitor and control the people who are opposed to such intelligence monitoring system then this is erroneous. The photographer was traced through the intelligence monitoring system; however the person carried no terrorism-related affiliation.
I personally believe that it is inappropriate application of the intelligence system which can harm the society. The intrusion and violation of the privacy is an offence, even if this is being done to prevent terrorism. I firmly believe that the lawmakers and intelligence agencies have to mutually define limits for the ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Privacy and Surveillance in the Digital Age Movie Review”, n.d.)
Retrieved from
(Privacy and Surveillance in the Digital Age Movie Review)
“Privacy and Surveillance in the Digital Age Movie Review”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Privacy and Surveillance in the Digital Age

Privacy in a Digital Age

...?Privacy in a Digital Age In today’s age of round-the-clock networking and socialization, the phenomenon known as privacy is like milk in black tea. First and foremost, the world today works on the mechanical, automated and 24-7 on-the-go scenario which was considered sci-fi a few years back. Thus, the case for privacy simultaneously becomes extinct. Secondly, with the almost miraculous spread of the internet and the existence of electronic gadgets becoming extremely common, people are enjoying this newfound way of living life to the hilt. This is in sharp contrast to the situation in the pre-globalization era, where these things were unheard of. Lastly, the most disturbing revelation of lives becoming public is that with our lives going...
4 Pages(1000 words)Essay

The Value of Digital Privacy in an Information Technology Age

...The Value of Digital Privacy in an Information Technology Age Rise in technology has led to increase of information sharing, especially through the internet. In retrospect, technologies used to access individual information have equally increased. Computer hacking has been rampantly used to access sensitive individual information. Hackers access computer networks either legally or illegally by finding out and exploiting the weaknesses in a computer program. Hacking may either be used by computer criminals or computer security experts. In the wrong hands, unauthorized access to information may lead to destruction of vital information or usage of information for destructive purposes. Another way through which individuals can access private...
4 Pages(1000 words)Research Paper

The Value of Digital Privacy in an Information Technology Age

...? The Value of Digital Privacy in an Information Technology Age & Introduction Technology has brought many conveniences to society. Unlike years ago, people can now communicate with each other in less than a second. Paper documents have been greatly reduced because everything is stored electronically in databases. As such, access to information is readily available to anyone with a click of a mouse. This ease of acquiring data, however, has come with a price. Hand-in-hand with the applause for the convenience of getting information is the clamor for stricter privacy laws. Netizens, a term coined for active users of the Internet (Netizen), are complaining about how websites make private information such as their names, phone numbers...
6 Pages(1500 words)Research Paper

The Value of Digital Privacy in an Information Technology Age

...? The Value of Digital Privacy in an Information Technology Age Affiliation with more information about affiliation, research grants, conflict of interest and how to contact 1. List and describe at least three (3) technologies that allow an individual to research citizen’s private data. a. is one of the technologies that helps people to search for relatives, associates, colleagues and every other person living in the United States. An individual can send information or message to anyone using this website. “One of the sites that are hosted by Intelius is Date Check.   This stores numerous reports including names, addresses, birth dates, court records, and cell phone numbers” (The Value of Digital Privacy in an Information...
4 Pages(1000 words)Research Paper

The Value of Digital Privacy in an Information Technology Age

...This paper talks about the importance of digital privacy, and the various laws that affect it. It discusses about the advantages and disadvantages of the public access to an individual’s private information and the measures that citizens should take in order to protect their privacy in regard to information dissemination. This paper gives an example of a federal privacy law that allows the government an access to any private information of an individual. It also identifies electronic laws that protect people privacy, and their effectiveness. The three technologies that allow individuals to research on a person’s private information are (Keizer, 2012); Biometrics Cloud computing. RFID tags. The cloud computing technology involves...
5 Pages(1250 words)Essay

Privacy and Digital Investigations

... a forensics/digital investigation which is fully compliant with a policy which has been jointly drawn up by both the legal and the IT departments. This report will begin with a brief overview of privacy considerations, following which it will describe the organization's policy and highlight both its strengths and weaknesses. 2 Privacy Concerns In instances of unauthorized outsider/insider intrusions upon the organization's networks, the company has to contend with the privacy concerns of two sets of stakeholders: patients and employees. 2.1 Employee Privacy According to federal employment laws, employees have a reasonable expectation of privacy. Aftab (2006) notes that the Electronic Communications Privacy Act of 1986 explicitly...
5 Pages(1250 words)Essay

Surveillance and Privacy

...Abstract The Fourth Amendment protects people against unreasonable searches and seizures but what officers can discover through their ordinary senses in public areas such as streets and parks is of another issue. This paper briefly discusses how surveillance, which is being employed as part of police search to get personal information and evidence have countered the issue of privacy. Moreover, it discusses how innovation of technology can alter or distort the information gathering and how a person is affected through warrantless spying. Thus, it will show how surveillance and privacy conflicts to one another while maintaining the essence of Fourth Amendment. Surveillance and Privacy Technology had apparently...
2 Pages(500 words)Research Paper

The Value of Digital Privacy in an Information Technology Age

...The Value of Digital Privacy in an Information Technology Age The Value of Digital Privacy in an Information Technology Age List and describe at least three (3) technologies that allow an individual to research citizens’ private data. Rise in technology has led to increase of information sharing, especially through the internet. In retrospect, technologies used to access individual information have equally increased. Computer hacking has been rampantly used to access sensitive individual information. Hackers access computer networks either legally or illegally by finding out and exploiting the weaknesses in a computer program. Hacking may either be used by computer criminals or computer security experts. In the wrong hands, unauthorized...
4 Pages(1000 words)Research Paper

Privacy and surveillance in the Information Age

...Privacy and Surveillance in the Information Age Introduction Technology has been at the heart of development and civilization. While technology has been there since prehistoric times, today the term technology is used to refer to ICT. Communication technology has also a long history beginning with inscriptions on the walls of caves to the modern computers and digital networks. In a modern world, the use of technology has managed to increase communication among human beings, but at the expense of personal privacy. The issue of surveillance is one that has received the most heated debate in the American public (Petersen, 2012). According to Nissenbaum (1998, p.4), information technology has not only affected communication, but has actually...
12 Pages(3000 words)Essay

Privacy, Surveillance and Security

ization, when specially hired people collected information by listening to conversations, intercepting letters and watching people through small holes. It is quite obvious that nowadays the government has developed newer ways to perform surveillance. Indeed, at the present moment the population is being tracked with the help of different devices. For example, the all expression “to blend in with the crowd” has almost lost its meaning as it is possible to track the route of a particular person when one is using public transportation. Thus, the cards that people are using in the subway send data to the centre where this information is accumulated and all this allows other people to reconstruct a daily route of a person. In other wor...
6 Pages(1500 words)Essay

Why Do We Age

Senescence also results in increased incidence and severity of a wide variety of age-related diseases and conditions such as cancer, heart disease, stroke, arthritis, and diabetes and can be considered manifestations of ageing (Goldsmith, 2006).

Researchers have come up with many theories over the years to explain the changes that lead to ageing. However, most of these theories have practical difficulties to be tested such as the lack of adequate models make testing these theories a difficult, lengthy, and expensive process. The ageing process may originate from changes occurring simultaneously in different tissues due to intrinsic cellular mechanisms or changes in one tissue. Some authors like Mattson et al (2002) argu...
10 Pages(2500 words)Assignment

The Correlation Between Age and Job Satisfaction

An increasingly ageing workforce presents significant problems. In the first place, many HR scholars and theorists have suggested a direct correlation between age and job satisfaction. In the second place, despite the 1967 Age Discrimination in Employment Act, ageism, referring to discrimination against employees on the basis of their age, is common (AOA, 1999; AARP, 1999; Smedley and Whitten, 2006). The implication here is that, within the context of an ever-ageing workforce, ageism is potentially economically detrimental. Indeed, as several researchers have pointed out, America’s ageing workforce is, currently, the foundations upon which the national economy rests and, the practise of ageism, insofar as it has an incontrov...
14 Pages(3500 words)Research Proposal

How Has Technology Affected Privacy

Financial institutions such as brokerage firms, credit card companies, insurance companies, and banks routinely and legally share their customer information databases with each other. The federal government has not only refused to end this breach of privacy, but the representatives of the people have also facilitated information sharing by enacting the Financial Services Modernization Act in 2001. Financial institutions are allowed to share databases, referred to as ‘affiliate sharing’ but must provide this information for no cost through this caveat is hard of any comfort to those concerned about confidential issues. Information can be sold if the customer approves which is generally slyly obtained by offering an &lsq...
7 Pages(1750 words)Assignment

Music Piracy and Digital Rights Management

But the flaws inherent in the DRM system, which is large as a result of the Information Technology industry’s lack of foresight and rigorous testing of the new business model, has been drawing concerns from commentators right from its inception. For example, Robin Gear, a reputed technology analyst associated with PA Consulting expressed the following words of caution at a very stage of the technology’s application:
“If you have documents going around for the boards' eyes only, you can encapsulate data in that way. You can set up lists of people who have the right to view, modify, forward, and copy, etc. One thing perimeter security does well is that it keeps outsiders from getting in and getting information...
6 Pages(1500 words)Assignment

Why Is Breast-Feeding Low among Young Mothers below the Age of 20 Years Old in the U.K

The benefits that are derived by breastfed babies include less morbidity from gastrointestinal infections and reduction in respiratory tract infections and atopic dermatitis. Besides being an economical means of providing adequate nutrition for the baby the mother derives the benefit of reduced risk for breast cancer, particularly so, when the breastfeeding is extended for a longer period of time. (1). 

In spite of this worldwide recommendation for breastfeeding babies, there is a wide disparity in the breastfeeding of babies in the developing world and in the developed world. In the developing countries, the knowledge of the benefits of breastfeeding and the skills for breastfeeding has been retained in the societ...
12 Pages(3000 words)Term Paper

Social Theory in a Globalizing Age

A comparison between the followers of social theories and the followers of natural sciences (physics and chemistry) revealed that unlike followers of natural sciences social theorists don’t use any techniques to show the exact knowledge or skill. Instead, they prove their work or idea by suggesting a possible way of explaining the facts or arguments usually called hypotheses (Lemert, 2004).
By hypotheses, social theorists cannot easily prove their argument at a time but they require time to prove it. Social theorists are normally criticized for using the hypotheses. Deconstructionists or postmodernists, rigidly critical theorists, disagree with the criticism by mentioning that any research methodology is not 100% pure a...
10 Pages(2500 words)Assignment

Future Digital Design Process

As we shape up the interface between the designer and the virtual environment we are naturally going to produce a greater and far better outcome.
It will enable the end-user to be more creative and experimental and explore possibilities that were previously tedious or impossible. The design possibilities of virtuality will enhance the outlook of environments.
Now we can also term it according to the duration it can last. For any new thing, the duration is 10-30 years. If it lasts for 10 it would be popular as a tool another 10 and it would very well be a theory and if it survives all 30 years it will soon be defined as a revolution.
It was the end of the 20th century and the beginning of the 21st century that saw th...
21 Pages(5250 words)Assignment

Computer Privacy Issue

The requirement has increased because there are unscrupulous computer attacks and private details are being stolen now more and more. These malicious data attacks have left the computers worldwide at a risk and hence the need to have privacy is of fundamental significance. If these privacy regimes are not taken care of, one could guarantee that problems would come about quickly and the computer networks would crash down instantly, thus providing fatal for the businesses and individuals alike. It goes to show without any doubt that privacy forms up as the most essential ingredient of success within a business entity and any organization would absolutely cherish the idea of having privacy within their networks to keep away the negat...
6 Pages(1500 words)Essay

The Use of Rhetoric in the Electronic Age

The rubric of the rhetorical theory is an extremely contested discipline with classical rhetoric theory focusing on the concept of rhetoric as a form of persuasion or an ideological perspective that asserts “rhetoric’s role in upholding power and domination” over the “general public” as the underlying basis of societal communication (Stacks & Salwen, 2008, p.240). However, the boundaries of the classical rhetorical theory have been challenged by cultural change, context and the permeation of alternative perspectives. 

In particular, the impact of the digital revolution and the growth of numerous multimedia streams on cultural norms has challenged classical theory propounding the fu...
14 Pages(3500 words)Article

Age Discrimination in the Workplace

Age discrimination is an equally critical issue as these other discrimination forms and possesses significant impacts in the workforce (Giacalone, 2012, p.167).
For instance, age discrimination in the workplace has significantly reduced the manpower capabilities within an organization, thereby negatively impacting the productivity and profit maximization within the business association (Snape & Redman, 2003, p.80). Additionally, age discrimination has compelled some business organizations into bad reputations, thereby impacting significantly on clientele loyalty. This means that such firms may have reduced sales, and consequently reduced profits.
Age discrimination comes in two aspects of business organizations. Orga...
6 Pages(1500 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Movie Review on topic Privacy and Surveillance in the Digital Age for FREE!

Contact Us