Written Assignment Format The summary format guidelines are: · Times New Roman 12 · 1-inch page margins · Double line spacing · ½-inch indent for new paragraphs · Capitalization for headings The main...




  1. This week we will discuss the issues associated in the digital age withPrivacy. Your assignment is to examine what is happening in the digital world with respect toPrivacy. Find an example of an invasion of privacy enabled by this technology which seems unusual or even outrageous, and discuss this in a 1-page paper. If this example is from your own experience, that is even better.






Written Assignment Format The summary format guidelines are: · Times New Roman 12 · 1-inch page margins · Double line spacing · ½-inch indent for new paragraphs · Capitalization for headings The main text in this paper is left-aligned; don’t use the right-side justification. Text is double-spaced throughout your paper. This includes not only the body text, but also headings, titles, and the entries in the list of works cited. The first sentence of every new paragraph in your essay is indented half an inch. In longer papers you might want to use headings to help organize and provide structure to your paper. Keep the font and size the same as the body text. In general, boldface indicates greater prominence, while italics is appropriate for subordinate headings. References In-text Citation After researching your topic, you might end up quoting or paraphrasing from other sources. It’s important that you do this correctly in order to avoid committing plagiarism. A proper citation consists of two parts: the in-text citation and the entry in the list of works cited. The in-text citation is placed right after the quote or paraphrase and contains the author’s last name and page number. Usually this information is placed within parentheses. Let’s look at an example: “A membership referendum held today would be backed by 55 percent of Danish voters” (Levring, 8). List of Works Cited The in-text citation discussed above corresponds to an entry in the list of works cited, placed at the end of your paper on a separate page. There you give more information about a source such as the title, publisher and date of publication. If a reference entry is longer than one line, each line after the first should be indented ½ inch (called a hanging indent). The entries in the list are then sorted alphabetically. You may construct this citation manually, or use a generator such as https://www.citationmachine.net/mla/cite-a-website/manual An example follows: Works Cited Adams, Amanda. Citing Sources: How to Cite a Book. Academic Press, 2019. Barnes, Barney. “A Chapter in an Edited Collection.” A Book of Examples, edited by John Smith, Academic Press, 2019, pp. 25–35. Cox, Christopher, and Brian D. Smith. “The Title of the Article.” Website name, 15 Sept. 2019, www.scribbr.com/page. Dayton, Daniels, and Bob Matthew Williams. “Journal Article Title.” Journal of Academic Research, vol. 32, no. 15, 2014, pp. 232–265, doi:10.1080/02626667.2018.1560449. Fox, Ferdinant, et al. The Basics of Citing in MLA Style. 2nd ed., Scribbr Press, 2008. The Computer Revolution and the Information Society Privacy Concerns Philosophical Theories Social Value Legal Framework Privacy The Web has a growing number of forums dedicated to discussing the importance of privacy and the impact of technology http://www.privacyrightsnow.com/ http://www.privacyrights.org/ https://www.eff.org/ Privacy—Anything New Here? Scale of information gathering has changed Much more extensive than in pen and paper days Equifax, a large credit bureau, makes the credit records of > 160M consumers available to > 50K businesses The Federal Parent Locator Service database contains a records of every driver’s license in the U S Etc. ad infinitum... Privacy—Anything New Here? Scale of exchange and interconnection Relatively costless to collect data, and certainly without knowledge or permission of subject Kentucky has a law that allows for suspension of a student’s license if that student cuts classes or is failing classes Information can endure for longer periods and mistakes persist How many of you have ever queried your credit record? Attempted to correct it? Privacy—Anything New Here? Kind of information gathered Keystrokes at computer Citicorp Credit can offer their businesses a profile of their customers, including Income, education, family, housing type and value, age, vocation, “lifestyle” data Voice conversations “this conversation may be monitored for quality assurance purposes…” Internet surfing behavior at companies employers can be held liable for the environment established at a company, including that resulting from the use of the Internet Remote access and maintenance Privacy—Anything New Here? Government collection of information Carnivore (FBI) and ECHELON (US and UK) Broad-based Internet wiretapping Wireless and wireline communications Connected to private/public email server Records, relative to target: Header of email (origin, destination, subject matter) Supports traffic analysis of all digital communications Privacy However, not all data collection would be regarded as harmful Your retailer can serve you better Your doctor can heal you faster/more effectively Your pension system can make better decisions Your police and army can protect you better Since installation of monitoring cameras in Grant Park high rise in New York, police have reported a 44% drop in crime Privacy—Its Origins Social History Modern concept of privacy less than 200 years old and particularly important in Western societies Tribal societies forced to share intimacy in restricted living quarters Communal living persisted well into the Middle Ages and beyond The key resource that was being communally shared was heating Even nobles slept with extended family (and sometimes servants) in large beds Construction of partitioned living spaces is more expensive and requires a more prosperous society Privacy—Its Origins Social History Invention of print encouraged the pursuit of personal privacy Less expensive and more portable books lent themselves to solitary and silent reading Prior to literacy, communication was oral and communal In early American communities, there was rigid social regulation and intrusion into privacy Puritans were expected to spy on their neighbors In 1700’s, mail was routinely opened as it was handled in the postal system Privacy—Its Origins Social History Two aspects of privacy are related and gradually increased in importance Desire for personal physical space—a luxury only the rich could afford, but which later became accessible to the emerging middle classes Attempt to achieve contemplative solitude (”mental space”) A concept foreign to Romans, who bathed and performed toilet activities communally For the Romans, to be private was to be deprived of social contact, and was a condition of slaves Privacy—Its Origins Social History Establishment of a personal relationship with God promoted privacy Perhaps personal relationship with Self is an evolution of personal relationship with God (Jill Lepore) Privacy—Its Origins Philosophical Origins Not explicitly discussed by great liberal thinkers such as Locke, Rousseau, Mill Implicitly emphasized in philosophy of Descartes and Kant Privacy—Its Origins Political Origins In general, a relatively recent phenomenon Reporters sent to Supreme Court Justice Warren’s home to cover a party in 1890 Justices Warren and Brandeis reacted to intrusion by press in their personal lives by publishing a paper in Harvard Law Review “Gossip is no longer the resource of the idle and vicious, but has become a trade, which is pursued with industry as well as effrontery…” In fact, a result of a previous technological change: development of rapid printing processes created need to fill space in newspapers which could be cheaply printed Privacy—Its Origins Political Origins The rights of privacy are among those basic entitlements which men must respect in each other mutual respect is the minimal precondition for love, friendship and political community Not rational to reveal everything about ourselves, since this surrenders the right to control one’s self definition To be forced to do otherwise is an assault on liberty, personality, and self-respect. Some areas of behavior are conventionally regarded as more private than others Sex, health Privilege against self-incrimination Privacy—Theories Intrinsic vs Instrumental Value Privacy Has Intrinsic Value Rachels (“Why Privacy Is Important”) “…a characterization of the special interest we have in being able to be free from certain kinds of intrusions” Examples of instrumental benefits Competitive non-disclosure Medical records Insurance and credit applications But importance of privacy transcends instrumental usage and has intrinsic benefits Privacy—Theories Intrinsic Value Basis of our ability to create and maintain different sorts of social relationships with different people Are different sorts of relationships essential to having relationships? Is this disguising the real person? Is this hypocritical behavior? What would be the alternative? If same facts were known by all acquaintances, perhaps we would not have a diversity of relationships, but would we not still have relationships? Is there some information we would not want to disclose to anyone, regardless of the social relationship? Privacy—Theories Intrinsic Value Privacy a precondition of involvement Relationships are the marketplace in which privacy is traded Privacy implies the ability for others to know about us; i.e., it is an inherently social or relational concept A hermit is not private Privacy—Theories Intrinsic Value Privacy is not simply an absence of information about us in the minds of others; rather, it is the control we have over information about ourselves Criticisms Rachels may have overemphasized the necessity of having a diversity of personal relationships The relationship we have with organizations that are collecting and using personal information is quite different Privacy--Theories Privacy Has Instrumental Value Gumpert & Drucker (“The Demise of Privacy in a Private World”) Privacy may not be a basic instinct More basic may be the need to achieve safety in a threatening world Our behavior suggests that we do not, in fact, desire privacy Malls, health clubs, other public spaces—”public privacy”, i.e., freedom conferred by an anonymous environment Web cams, chat rooms, electronic lurking/voyeurism/exhibitionism People watching, masquerading, eavesdropping, telephoto lens, gossip * Privacy—Theories Instrumental Value Rather, privacy may be a socially-defined concept which exists on a continuum of trade-offs with other social benefits As communication media intrude more fully on our “private” sphere, and redefine the boundaries of public/private spaces, our cry for privacy is really the search for “nonpainful, nonobligatory, nonthreatening public relationships with others…” * Privacy--Theories Privacy of Insignificant Value Scott McNealy, CEO of Sun Microsystems, caused a flurry several years ago by saying: “…that the war about privacy had been lost, so consumers should get over it…” Privacy Key questions Is the sense of privacy culturally relative? http://www.npr.org/sections/codeswitch/2013/05/05/181126380/how-different-cultures-handle-personal-space Privacy Culturally Relative Americans generally keep doors open except when they want privacy (bathroom, bedroom, etc.). Offices also often have an open plan (cubicles) and an “open-door” policy. Germans generally keep doors closed at all times. Although there are exceptions, offices also usually have separate rooms and a “closed-door” policy (knock before entering). Privacy Culturally Relative In a recent study of Facebook users in Japan and the US: Japanese SNS users are more concerned about Internet privacy than American SNS users Americans have higher general trust, they less likely to believe that a stranger would take advantage of their private information, should it be leaked online. Privacy Culturally Relative In many parts of Europe, for example: Personal information cannot be collected without consumers’ permission, and they have the right to review the data and correct inaccuracies. Companies that process data must register their activities with the government. Employers cannot read workers’ private e-mail. Personal information cannot be shared by companies or across borders without express permission from the data subject. Checkout clerks cannot ask for shoppers’ phone numbers. Privacy Culturally Relative Europeans trust government more In Sweden, for example, some information from tax returns is public information, whereas
Oct 22, 2021
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here