Privacy Pragmatism Analysis

Improved Essays
Solutions Outline

P1: (Introduction) Hook: People’s information’s are being shared to everyone it seems there’s not much we can do about it.
Thesis: However, both articles, “How Should We Think About Privacy” and “Privacy Pragmatism”, provide solutions to keeping our privacy safe within the boundaries of our personal lives.
BODY: Lanier sees privacy where power and information as the most important tool in keeping your data. On the other hand, Mundie, author of “Privacy Pragmatism”, provides a solution which allows people to put their trust into an organization that would keep track of his preferences. Her article introduces the wrapper concept where all electronic data would be kept in a “wrapper” metadata without revealing its content.
…show more content…
In addition , they would be penalized if wrongfully taking information. The wrapper concept installs a demand for authority, not from corporations, but from the people.
P9: Lanier vs. Corp.
TOPIC: Lanier’s approach would put customers in control over corporations.
Body: There would be the ability to deny requests from large corporations. This would also affect the corporations’ ability to predict and sell. Because of the lack of information they are allowed access, corporations would be most affected if customers were to put a price tag on their information. Because the NSA allows corporations to pry into the public’s information, putting a lock on the information would make the corps. lose power over its customers.
P10: Mundie vs. Corp.
TOPIC: If government were to use Mundie’s wrapper program, they would be affected adjust as much as a
…show more content…
Body: He understands the nature of society and how people wold much rather be assured by a company they trust about the isolation of their data in only one corporation. Lanier presents a solution where you would be bargaining the price of your privacy, a first come first first serve basis of which company, corporation, or government would be pounding down asking for one’s information. Lanier’s user’s would soon find the influx of corporations asking permission to buy your personal information. One would later become tired of the constant bombardment. The option of using a wrapper to protect privacy proves to be more realistically possible in keeping ones data safe.
P13: Conclusion
Can people’s privacy be kept in this technology age where governments and corporations manage to break through those boundaries? Both Mundie and Lanier prove that it is with two possible solutions, monetizing one’s own personal information and protection information by incasing it in a “wrapper”. The idea of putting one’s information into a wrapper seems more doable in keeping one’s privacy. In doing so, a person would be in control of their own data. Lanier’s presents a solution that would be unable to perform due to the amount of care each person would have to take in order to keep their data

Related Documents

  • Improved Essays

    Caftori and Steve (2002) conducted research on issue of privacy in the Information age. The study conducted by Lee on Trust and Privacy online revealed that people are concerned about privacy, but they are ready to share their information when they have some benefits.…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    In Rebecca Solnit’s article, “Easy Chair” I realized that we do not have privacy at all if we use the technology and take care of our things online on the Internet. The article Poison Apple made me realize that we do not have privacy at all if we use technology. For example, Rebecca Solnit mentioned, “Google is the world’s biggest advertising company, watching you on nearly every website you visit’’ (Solnit 5). This passage demonstrates how technology has been part of everyday human's life. Google knows everything about everyone’s interests and it can share this information with its partnerships and use it for their benefits.…

    • 166 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Through a vast majority of the services we utilize daily, most of which often appear innocuous, data about users is collected and distributed to third parties. In the article “A Day in the Life of Big Brother”, Sherman guides the reader through the daily routine of an individual, referred to as J. Doe, and their interactions with a plethora of services that most individuals utilize daily. First, J. Doe wakes up and reads the news through Google. Google, and his Internet Service Provider, use analytical tools, such as cookies, to follow Doe’s reading habits online and use that information to analyze his preferences. Following this, Doe commutes to work through a state that utilizes electronic toll ways, which follow and record his path.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Privacy is a state that provides a barrier from the world outside and puts an individual in control of the information they want to present to the masses. However, one question that has lingered since the conventional times and that is “what we want to keep private and what we want to make public” (Singer, pg 59.); where should be the line drawn. This debate is discussed by Peter Singer in Visible Man Ethics in a world without secrets. One of the points he makes is that privatization is a concept that is more fashionable and acquainted with the Americans of today. They take it as “status symbol” (pg 59.).…

    • 396 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    The National Surveillance Agency was birthed as a result of alarmist politics. The terrorist attacks of 9/11 inspired a governmental overhaul of its security measures. With the entire world in shock, the United States federal government approached security threats with new governmental programs designed to protect the public. Although the public did not learn about this program until a few years after it was created, this program was the United States’ preemption against terrorists and enemies alike. Several years have gone by since the program was known to the public, and as a result, many individuals and courts have seen the detrimental harms that the NSA has done to the rights of people.…

    • 1412 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Dbq Privacy

    • 800 Words
    • 4 Pages

    Privacy should be kept intact even for sake of security. One of the main supporting arguments for security is that if an individual has nothing to hide, then they have nothing to fear. In The Accountability Matrix by David Brin, Brin highlights the fact of having tools…

    • 800 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Why Privacy Matter Even If You Have “Nothing to Hide” In the article “Why Privacy Matter Even If You Have ‘Nothing to Hide,”’ Daniel J. Solove, talking about the government governed the information to analyze without the permission. Many people didn’t realize how many problems by let the government take their information to analyze. Solove does a great job to persuade the readers that we deserve more the privacy by using the appeal to authority and anecdote.…

    • 704 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Having to live in control of Big Brother is like giving up your soul . I wouldn't be able to live in a era such as 1984 ,being on a raider at all times isn't my cup of tea. ‘’Privacy is not by controlling someone's life it's when you know you're finally free. Is privacy really a phone? Many people today have smartphones.…

    • 723 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The communication privacy theory focuses on privacy boundaries and what information one chooses to withhold from another person. This privacy management system is focused on three parts: privacy ownership, privacy control, and privacy turbulence. Privacy ownership is our private information that only we know and others do not. This also encompasses our personal privacy boundaries. Depending on the person, our privacy boundaries could either be thin and porous, or thick and hard to break through (Griffin p. 151).…

    • 1200 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    As supported by Harris’s experiments, the loss of privacy that we perceive when we use the Internet occurs in part because, like Michael Foucault claims, being under constant surveillance in a panoptic environment causes people to constantly feel watched and in part because, like Saadi Lahlou claims, people are forced to reveal information and act in a setting in which they normally would…

    • 1183 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Spying In 1984

    • 825 Words
    • 4 Pages

    Everything you do electronically can be tracked, saved, and manipulated, regardless of where you are. Widescale spying occurring today eerily mimics George Orwell’s 1984 in an imminent and frightening way, as average people are no longer as private as they used to be. In 1984, Winston is trapped within a totalitarian government that watches everything its residents do or say. These residents are spied on everywhere they go and are never immune to government overwatch. In the United States today, normal citizens are being watched by internet-connected devices, government big-data collection, and businesses looking for profit.…

    • 825 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In Defense Of Distraction

    • 1246 Words
    • 5 Pages

    Authors Anderson, Goldberger, and Franzen address the audience about concerns within societies and the effect technology has disconnected the reality and everyday social lives of one another and how these distractions have invaded our privacy and the idea of it. They accomplish this argument by using sources with a variety of experts and interviews that give expertise to persuade the argument of technology and the distractions it creates among society’s ultimate connections and ideas of privacy. In this way Anderson, Goldberger, and Franzen convince the audience of the ultimate distraction technology creates in the attention society seems to diminish and invade the privacy we once had. In the essay “In Defense of Distraction” in Writing Analytically…

    • 1246 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In our daily lives, we relinquish some of our private information ignorantly. As human beings, many of us tend to simply hand out our information in exchange for other items or free services. Many times, online shopping offers better prices but at what cost? Sometimes, better prices means relinquishing your private information that could be obtained by anyone at anytime. In the article, The Convenience-Surveillance Tradeoff, the author makes compelling points on how our society is unaware of the repercussions that come with relinquishing our…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Why Privacy Matters

    • 1428 Words
    • 6 Pages

    In this essay the author Solove has contends that the issue of privacy influences more than just people concealing an off-base. He clarifies how this argument originates from a lacking meaning of what privacy is and the worth that privacy has. The disciples of the nothing-to-hide argument express that in light of the fact that the information won't be uncovered to the general population, the privacy hobby is negligible, and the security enthusiasm for…

    • 1428 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays