Effects Of Geotagging

Improved Essays
Adjacent to privacy invasion risks, geotags pose an even bigger problem; physical threat. According to Abraham Maslow, humans require safety as a basic need to live and physical threats that stem from the negligent use of geotagging via social media threaten this fundament (1943). Since geotags reveal accurate location data, online criminals waiting to lure victims through the use of a computer are no longer contained by hidden location barriers, thus enhancing the risks of cyber-stalking. A Toronto citizen named Vanessa Bruno was cyber-stalked in 2013 by a stranger residing in Stoney Creek who threatened to stalk her at work and rape her (Dempsey, 2014). According to The Star, Bruno actively posted personal content on Facebook, Twitter and …show more content…
Research noted that 78% of ex-convicted burglars strongly believed social media networks are being used by current thieves to target properties (Schiffner, 2013) which points to more detrimental effects of geotagging. Attaching location-based data to content posted online can reveal private information to strangers which can lead them to determine when, where, and what time is best to foil an attack on the personal property of users. This further contributes to the lack of physical safety of self and property brought upon by negligent use of geotags over social media. Essentially, geotagging over social media gives online criminals what they want without them having to input as much effort into finding a user’s location; this “ease of access” frames geotagging as a detrimental …show more content…
Location patterns of individuals reveal their private whereabouts; where they are; where they were before; where they usually go; where they work; where they live, all made possible by geotags (Albrechtslund, 2008). In fact, these private whereabouts are constantly under surveillance which brings into question whether they are private at all. In the words of Celeste Chaney, “Surveillance doesn’t go both ways. There are those who watch, and those who are watched; the powerful, and the powerless” (2015). Government surveillance can access the precise location of someone’s existence through geotagging which is problematic considering individuals have no knowledge of where such data is stored or how it is used. In fact, government surveillance is constant, thereby allowing the monitoring, hacking, surveillance, and collection of individuals’ locations at all times which endangers the freedom of users within a society (Albrechtslund, 2008). The debate over government surveillance has flocculated regularly, however with an added element of location coming into focus, the sensitivity of the subject increases. Ultimately, through geotagging, the government is constantly watching the existence of a user in their private space, without their

Related Documents

  • Improved Essays

    Aily Shimizu’s view on stalking specifically revolved around cyberstalking in her work of Recent Developments Domestic Violence in the Digital Age: Towards the Creation of a Comprehensive Cyberstalking Statute. She describes how much more dangerous for stalking has gotten to because of the digital technologies everyone has now. “Indeed, the Internet has provided a new vehicle by which individuals can commit the traditional act of stalking” (117). Due to the emphasis Shimizu set on the word ‘tradition’, it meant that it is more dangerous now than before because of the extreme reliance of technologies and being able to use it as an advantage of easy access, predators have found ways to prey on those who frequent social media sites.…

    • 523 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In an article entitled “A Day in the Life of Big Brother” by Erik Sherman, the components of services that citizens use daily are observed as to how they track, and in turn report, the actions of their users.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Blown To Bits Analysis

    • 346 Words
    • 2 Pages

    Blown to Bits Chapter 2 showed us how private the digital world is. Headline spoke upon different types about privacy around the globe. The main topic was Radio Frequency Identification Tags (RFID). The topic entirely went into detail about how it knows almost everything about a person or company. This Chapter reveled benefits, effects of technology being in our private lives and the change it has had on our society as a whole.…

    • 346 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    The Role of Anonymity and the Justification of Voyeurism in the Apartment-Dwelling World of Rear Window voyeurism noun | voy•eur•ism | \ vwä-ˈyər-ˌi-zəm , vȯi-ˈər- \ a: the practice of obtaining sexual gratification from observing others b: the practice of taking pleasure in observing something private, sordid, or scandalous Do you know the person who lives next door to you? You probably saw them a couple of times in the elevator or the parking lot, maybe even chatted with them. What was their name again? Neither of you care enough to remember, thus, forming the notion of paradoxical anonymity of the 21st century.…

    • 1670 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    With the advancement of technology, the American people 's privacy has shrunk, we are monitored at all times. Cameras at every street corner, cell phones being tracked to the exact foot, every website and Google search seen stored and collected. All of this is done in the name of our safety, but how much of this data is about our safety and more about controlling us? In Adam Penenberg’s essay The Surveillance Society, readers are informed of these measures and are lead to believe the invasion of our privacy is necessary. Some form of surveillance is a necessity in the world we live in today, crimes and terror attacks have been prevented because of it.…

    • 1425 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Because online activities are treated like any other communications, the rules of privacy should apply. When people engage in online activities they have a legitimate expectation of privacy and this privacy is violated when the government accesses online activities without a warrant. The government should therefore not be allowed to access your online activities without a warrant. Moreover, there are situations where the government does not need a warrant but a court order to access this information. Despite the lesser evidence required for court orders, they nevertheless involve some adjudication on whether it is proper to infringe on the individual’s right to privacy.…

    • 1234 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Embedded Assessment

    • 776 Words
    • 4 Pages

    With the increased use of social media by society, there are more opportunities than ever before to steal identities or execute fraud online. For example, status updates posted on Facebook or tweets posted on Twitter and many other social media sites can be used by criminals. In regards to stealing or stalking one’s identity, by posting photos and/or videos on websites such as YouTube, Flickr, etc. could provide stalkers deeper information about you, regarding your family, friends, interests and other vital…

    • 776 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Modern slavery Human and sex trafficking is the second largest crime in the world behind the selling of illegal drugs; with anywhere from 14,500 to 17,500 people being trafficked in the United States, and 600,000 to 800,000 all over the world (11 facts). Many of the victims being kids ranging in ages from 12 to 14. One of the ways that people are tricked into becoming a trafficking victim are through “friends” that they meet online and want to meet up. Seeing how popular social media sites are in today 's society shutting them down is not an option. A solution to help better protect people while online is to teach society what the do’s and dont’s while on any social media as well as what could be a threat.…

    • 974 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    In a world where technology has overtaken society, people have found it much easier to commit crimes. We've all heard of websites such as Facebook, Twitter, Ebay, and possibly the most talked about for being so dangerous, Craigslist. These are websites where people can interact with one another, but sometimes it may just so happen that you do not know who you're truly talking to. What or who is hiding behind a computer screen on the other side may just be your worst nightmare. Philip Markoff, an aspiring medical student was dubbed the Craigslist killer in 2009 for committing robberies and even killing one of his victims.…

    • 1726 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    1984 Technology Analysis

    • 1525 Words
    • 7 Pages

    In contrast, in our modern society the citizens are in fact tracking themselves by constantly updating their location and posting their every thought on twitter and Facebook. The modern world does not seem concerned with hiding their thoughts and feelings because everyone is posting updates constantly because they want other people to know what they are doing at all times. Ian Crouch writes in “So Are We Living in 1984?” that “the notion that one’s personal digital messages would remain inviolably private forever, or that they would not be saved or stored was probably naïve” (Crouch).…

    • 1525 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    In our modern day society, individuals are actively on the internet, exposing themselves in every aspect unknowingly. We are oblivious to who is watching and collecting our information. Many of us are oblivious to how far the government is willing to go to uncover any secrets or imminent threats. In Peter Singer’s essay, Visible Man, we explore how we have currently encircled ourselves in an environment that calculates our every choice and action because we constantly reveal our information. Singer explains how we have deliberately invited the government into our private lives.…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    With the continuing development of the Internet, the center stage of individual, business, and government discussions became a new globally sought after resource, data. Since its origin, Internet users have been warned about the dangers of posting personal, intimate information publicly; however, recent events have shifted privacy discussions away from discouraging posting ill-advised information to bringing awareness to under the radar data collection. Data is a very broad term that encompasses almost all Internet activity. What users search, click, view, and type is all collected and processed by either the website, Internet browser, or even the device itself. The demand for this personal data is enormous.…

    • 1224 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Panopticon Theory

    • 1659 Words
    • 7 Pages

    “They are like so many cages, so many small theatres, in which each actor is alone, perfectly individualized and constantly visible”(Foucault, par. 9). Social networking sites are the metaphorical prison cells of a virtual community. However, we still have the ability to choose, or at least limit, our ‘guards’ by changing our profiles’ privacy settings. Inside these metaphorical cells, we are under the inescapable gaze of the public.…

    • 1659 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    The parallels are undeniable. We live in a world in a world where it’s comical to say you are alone and where privacy cannot be purchased with a set of drapes. Government surveillance has resulted in loss of privacy, loss of individualism, and conformity, evident throughout 1984 and today’s…

    • 1070 Words
    • 5 Pages
    Superior Essays