Daniel Solove Analysis

Improved Essays
Each day through the use of emails, research, internet, and dating sites, personal information (Big Data, geolocation,) is being modified and introduced to third parties for consumption. According to Daniel J. Solove, the John Marshall Harlan Research Professor of Law at the George Washington University Law School, he states that in his article, one of the bloggers proclaimed: “Do I care if the FBI monitors my phone calls? I have nothing to hide. Neither does the 99.99 percent of the population. If the wire-tapping stops one of these September 11 incidents, thousands of lives are saved” (Solove 735). When people are asked about “government surveillance”, they quickly respond with, “That is okay, I have nothing to hide.” (Solove 734) Supporters …show more content…
Solove uses these metaphors to illustrate the differences between information collection and information processing. Solove’s writing about these two literary works, gives a definition, so that even if you have not read them, you are still able to understand his point because it affects the power relationships between people and the institutions of the modern state. They not only frustrate the individual by creating a sense of helplessness and powerlessness, they also affect social structure by altering the kind of relationships people have with the institutions that make important decisions about their …show more content…
Specific ethical issues concerning Big Data raised questions for the authors like, what is the status of “public” data on social media? Can they use the information without asking for permission? The problem with privacy is that there are too many holes in the “wall.” “Any data on human subjects inevitable arise privacy issues, and the real risks of abuse of such data are difficult to quantify” (Nature, cited in Berry, 2011). (qtd. in boyd and Crawford 758) If the information is there, people think it is okay to use it without realizing that their research might be unethical.
In paragraph 8, of the excerpt from Six Provocations for Big Data, boyd and Crawford quote Bruno Latour, who notes, “change the instruments, and you will change the entire social theory that goes with them.” Latour defines the “instruments” as the “Big Data.” If the information that is out there, is somewhat managed, than the amount of data will be minimized/manipulated and/or the privacy issues will be a little more

Related Documents

  • Superior Essays

    Regarding the matter of information having the capacity to be gotten to overall and much simpler it gives an effect on the opportunity of data furthermore the individual security. With the flexibility of data it has a constructive effect and this is on the grounds that the web has created and permitting individuals to get to data about whoever at whatever point it will gives them the opportunity to do this and this is utilized a great deal with specific sites, for example, Google maps as it permits you to discover bearings to a man 's home and we should place it into substance that its astound visit it then brings it into substance about individual protection, imagine a scenario in which this individual does not need an amazement visit. Individuals need their own particular individual protection about their own particular data they may not need certain individuals to have admittance to data about them about what their home looks like or what there postcode or range number for the telephone…

    • 1688 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Article #1: Sinha, G. Alex. " NSA surveillance since 9/11 and the human right to privacy." Loyola Law ReviewWinter 2013: 861+. Academic OneFile. Web.…

    • 1103 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    With this metaphor of comparing information to stormy seas, Carr shows his audience the negative effects of information. Anyone can drive a few miles and find a body of water. Information is so accessible that it can consume anyone. Many people drown their time in looking up shows, movies, places when surfing the internet. At the same time, however, information can be so dense that people do not want to tire themselves trying to decipher huge amounts of knowledge.…

    • 1345 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    The world has registered huge technological intricacies concerning about social media. There are no contentions that the thrilling defect elevated to an extent that created the ethical issues governing social media. With increased usage of the social media for purposes other than personal affections, the question of privacy and confidentiality has been much highlighted by experts. Whereas the social media gives individuals the platform to publish and or share whatever they have in mind, there are expectations of limitations as to the extent to which personal information could be shared within these platforms.…

    • 284 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    With the advancement of technology, the American people 's privacy has shrunk, we are monitored at all times. Cameras at every street corner, cell phones being tracked to the exact foot, every website and Google search seen stored and collected. All of this is done in the name of our safety, but how much of this data is about our safety and more about controlling us? In Adam Penenberg’s essay The Surveillance Society, readers are informed of these measures and are lead to believe the invasion of our privacy is necessary. Some form of surveillance is a necessity in the world we live in today, crimes and terror attacks have been prevented because of it.…

    • 1425 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The events of September 11, 2001 will never be forgotten by the American people. One of the largest changes made in the United States after 9/11 was the introduction of the USA Patriot Act on October 26, 2001. The act allows US government agencies to easily gain access to the private records of people within the United States. The records include phone records, banking statements, and credit reports. Without any limits on the power of government agencies, the possibility of infringing on the rights of private citizens arises.…

    • 564 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Why Privacy Matter Even If You Have “Nothing to Hide” In the article “Why Privacy Matter Even If You Have ‘Nothing to Hide,”’ Daniel J. Solove, talking about the government governed the information to analyze without the permission. Many people didn’t realize how many problems by let the government take their information to analyze. Solove does a great job to persuade the readers that we deserve more the privacy by using the appeal to authority and anecdote.…

    • 704 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Citizenfour Throughout the world, the government scrutinizes citizens without them knowing about it. Devices such as computers and cellphones are being hacked by the NSA and used to monitor everyone’s actions. The documentary, Citizenfour, reveals how the government has expanded its surveillance methods. The government’s secrecy of spying on peoples lives not only declines individual’s privacy, but their freedom as well.…

    • 816 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    On June 6th, 2013 The Guardian and the Washington Post revealed the fact that the NSA had access to customer information on Apple, Microsoft, and Google computer products. The information obtained by the NSA was allegedly used to prevent any terrorist actions. However, the NSA has “[built] up a store of information on millions of US citizens, regardless of whether or not they are ‘persons of interest’ to the agency” (Brown). Although terrorist plots are a legitimate threat to America, the U.S government has overstepped its boundaries by violating the citizen’s of America’s fourth amendment right to privacy.…

    • 544 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    According to George Gao, 56% of Americans disapprove of the NSA collecting phone records and text messages, but that means the other, almost half, of Americans feel the need to give up some of their freedom to protect national security. (Civil Liberty in America, May 29 2015) WikiLeaks, the notorious website that finds and exposes government information, poses a real threat to the national security. While a popular website today due to its high credibility, it has revealed highly classified information that has hurt not only national security but foreign relations as well as reveal military info that they could use against terrorism in the middle east. There was a small public outrage over the censorship, or rather “un-censorship”, in a St. Louis sexual assault case.…

    • 875 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    National security vs personal privacy has been a hot topic post-9/11. President Obama gave a speech on January 17, 2014 where he stated “in our rush to respond …. , the risk of government overreach – the possibility that we lose some of our core liberties in pursuit of security – also became more pronounced.” (Office of the Press Secretary) Due to the tragic event on September 11th, 2001, our government was placed under extraordinary pressures to find the terrorists and bring them to justice using whatever means possible. This brings around questions regarding ethical dilemmas as they relate to security and our right to privacy.…

    • 978 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    This onslaught of technology has reduced our ability to stay informed in all aspects of our lives, and this includes keeping educated on current political events. Singer is not to be held accountable for not acknowledging those who are naturally apathetic or apolitical. Since his argument and main claim is based on technology, however, he must address technology’s broad transformation of society into a more apathetic group of people due to the fact that technology has complicated the information retention process and made it harder to…

    • 1240 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    With the continuing development of the Internet, the center stage of individual, business, and government discussions became a new globally sought after resource, data. Since its origin, Internet users have been warned about the dangers of posting personal, intimate information publicly; however, recent events have shifted privacy discussions away from discouraging posting ill-advised information to bringing awareness to under the radar data collection. Data is a very broad term that encompasses almost all Internet activity. What users search, click, view, and type is all collected and processed by either the website, Internet browser, or even the device itself. The demand for this personal data is enormous.…

    • 1224 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    Amazon Research Paper

    • 1604 Words
    • 7 Pages

    Has big data improved amazon as a company Introduction This research paper will focus on answering the question “ Has big data improved amazon as a company?” The objectives of this assignment is to examine why the timeline of amazon is relevant to big data. An additional objective is to explore whether amazon have met the needs of its customers through e-commerce and whether the technology in place can be deemed beneficial to the company. An additional objective is to determine if any ethical or security issues are involved.…

    • 1604 Words
    • 7 Pages
    Superior Essays