Lobbying Exercise

Improved Essays
5. What could you have done differently during our lobbying exercise to ensure the opposite outcome?
5. For the lobbying exercise, my role was Diane Schwier, an aggregate inspector with the ministry of natural resources. In order to change the outcome of the quarry not being built I and the other Diance Schwier could have done more advocating against the quarry. As a part of provincial government, we could have talked with other provincial government peoples about why we should vote against it. In my case, voting against the quarry did not make a lot of sense as an aggregate inspector however we could have also prepared ourselves more for opposite roles. If I went into this activity with promising side affects and downfalls for both sides,
…show more content…
During Brett Gaylors DoNotTrack web series, he poses many suggestions as to what we can do in order to protect our privacy online. He explains that we all have been taken advantage of in that we are signing contracts, which allow websites to use our identity and do whatever they essentially want with it. He explains that although we are being taken advantage of, there are advantages such as security. There is no such thing as privacy without having security and that we have many opportunities to protect our identity online to a certain extent. One, being to watch what websites you’re visiting. Where do our gigabits go? What parties and trackers do we really want to be using our privacy? This can be seen in the first video of DoNotTrack where we have the ability to type in a news page and view what other websites are then tracking us and accessing our identity through cookies. We can protect your privacy online by also viewing and reading the terms of use and privacy settings. This is something that many people do not do, however would be surprised and upset at the fact that for instance, the pictures that they are posting on Facebook of their children are actually being sold and used on third party websites. And this is one hundred percent legal, as you signed the terms of use saying that anything you post on Facebook becomes there content. If we read these terms of use we would be aware of how much of our identity a website is trying to take from us. With this, we can restrict what we post and present online. Next, is to understand the hidden cost of free. We live in a time where people want everything for as cheap as possible and a way the Internet has taken advantage of this is through keeping these websites such as Facebook and Google free. In exchange, a third party is buying the data you leave behind. The last main suggestion Gaylor has for Internet users are to pay attention to what we are liking and viewing on social media. When you like or follow

Related Documents

  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    PART B Question 2 In Canada, Lobbying is legal as it is essential for the open government the government promotes and it is also part of democratic ideologies. The federal Lobbying Act defines as when a person is paid to communicate with a public office holder in matters concerning policy or set up a meeting between a public officer and another party. Access to open government is important in Canada as it allows citizens to participate in the government. However, lobbyists can use their influence negatively thereby introduce corrupt practices.…

    • 616 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    1) The discourse community I chose to study was Political Science, as it follows my major of Law and Constitutional Studies. 2) My discourse community communicates via email, research journals, face to face and through the American Political Science Associations various pages, for example, on the internet and through Facebook. 3) Professor Sharp polled his colleagues in the Political science department prior to our interview. He reports that they use writing at least 50% of their time. When Professor Sharp was employed by the State Department he wrote every day and he said, “You better do it well!”…

    • 952 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    I prepared for this assignment by reaching out to my district senator. I made an appointment with my senator named John Hoffman. I also read the required reading in the book. I thought the meeting would be more me talking about the bill I was supporting but it turned out to be so much more.…

    • 671 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Was it right of Monica Lewinsky to pleasure Bill Clinton to climb the political ladder? Would it be okay to pay a teacher to look the other way while you cheat on an exam? Would it be socially acceptable to pay your local politicians so you exclusively can dump your shit in the river? No, of course not!…

    • 1261 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Government In Balance

    • 1730 Words
    • 7 Pages

    Watching America grow throughout time as been a ferocious journey this semester, from learning just where America began, our founding fathers to the Constitution. Even with all this greatness there still seemed to be a particular unbalances in our system. With the Constitution we had based rules on how our country should look and behave, yet something was still missing. This huge shift of unbalance came from the views of our Federalist Papers. When opinions were brought together between the Constitution and the Federalist Papers; our government found its balance, in other words their happy medium.…

    • 1730 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Olaf Dietrich: Case Study

    • 1537 Words
    • 7 Pages

    Once you have chosen a case, begin conducting your research. Your research should cover the following details: 1 The individual or group that had their rights infringed—who were they? Olaf Dietrich had his rights infringed. 2 Which right(s) was infringed? How was the right(s) infringed?…

    • 1537 Words
    • 7 Pages
    Improved Essays
  • Decent Essays

    The word security has changed over time in different ways including what it means, context, and what it really stands for. Security in today’s age means the state of being in good protection from danger. However, looking back the definition was more so related to social status and economic security meaning you were making steady income. Both still mean protection from danger, as in now we think of it as protection for life but back then it was protection from what people thought you were, homeless or poor. Let's look at the text 1, Declaration of Independence, which talks about its contextual meanings.…

    • 457 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    This Generation of society has no boundary on privacy, with social media and connecting through technology more, It is much easier for private/personal information to get out and into the wrong hands. According to Boonsri Dickinson, a researcher for ZDNet states that “The popular social media feed Facebook, got three clever criminals in New Hampshire a lot of loot. They checked on Facebook to when people weren't home, and being the holiday season leaving their incoming gifts vulnerable. Just after 18 homes they accumulate $100,000-$200,000 dollars in stolen goods”(Dickinson) . All because people allowed themselves to be vulnerable!…

    • 1159 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    The Importance Of The National Security Agency

    • 1199 Words
    • 5 Pages
    • 1 Works Cited

    This procedure can be quite noticeable because once you visit a site for example, Nike.com, and go to a site like Facebook, an ad for a Nike product will consistently appear. Though the method is used for website owners to monitor the vigor of their site, government has taken it to another level by using it as a highway into our thoughts. We use the internet every day, with blogs, vlogs (video blogs), and the highly trending use of social media. We put our positions, feelings, and thoughts online to share with the world. This makes us conscious of what we write and aware of whom reads it, but unconscious of the fact that everyone interprets things in different ways, and that someone can be a person watching for suspicious things said.…

    • 1199 Words
    • 5 Pages
    • 1 Works Cited
    Superior Essays
  • Improved Essays

    3-6 Assignment 1 Submission: Writing Plan 1. What is the argument you will be addressing in your persuasive essay? Explain how the argument is derived from your major, the major you are considering pursuing, or your field of work. In my chosen topic, the point I am trying to make is that changing high-school schedules to start later will not change sleep problems in teenagers.…

    • 1623 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    To support this we look at Nicholas Thompson’s article “Bigger Brother: The Exponential Law of Privacy Loss.” Thompson argues that the internet is designed to collect information from people therefore, even with privacy laws in place, owners of sites will continue to find creative ways to socially connect people (Thompson 284). He continues by referencing software designed by carrier IQ that is specifically created to track searches, locations, and purchases. Thompson states that the purpose of this software is to better enhance the network as well as peoples average everyday lives (285). Nicholas later goes into detail explaining the exponential law of privacy loss.…

    • 974 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In our daily lives, we relinquish some of our private information ignorantly. As human beings, many of us tend to simply hand out our information in exchange for other items or free services. Many times, online shopping offers better prices but at what cost? Sometimes, better prices means relinquishing your private information that could be obtained by anyone at anytime. In the article, The Convenience-Surveillance Tradeoff, the author makes compelling points on how our society is unaware of the repercussions that come with relinquishing our…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays