Regulating Social Media

Improved Essays
Privacy is essential and very much needed in today social world. In this paper, readers will know what the right of privacy according to Warren and Brandeis. The way the first and fourth amendment coincides with the right of privacy will be described in this text. A quote will be interpreted made by the authors of Regulating Social Media. The writer will discuss flaws and issues in electric media. According to Regulating Social Media the authors’ states “Warren and Brandeis believed that the social mores and customs of the late 19th century United States were diminishing the quality of life for people like them.” Interpreted as the way people communication has evolved since the 19th century, when information was shared directly. The two feel that privacy is sacred and should be valued more than it is today. The argument was made that the concept of privacy developed by Warren and Brandeis is primarily a product not just …show more content…
The quote “you have zero privacy anyway. Get over it” it is interpreted as no one has privacy anymore; nothing is really hidden on the web. This is where the flaws and issues in electric media come into play. Terms and conditions can be seen as major flaw. By clicking agree you become valuable to spam mail, computer viruses, and hackers. Electric media can also bring dangerous situations like cyberbullying and cyber harassment. (Swisher, 2009)
In conclusion everyone should seek privacy and try to obtain it. Within the text the readers were informed about warren and brandies views of right of privacy. The fourth amendment and the right of privacy have obvious similarities but the first amendment coincide with the two in a different way. “You have zero privacy. Get over it,” was a shocking quote from Scott McNealy which is interpreted as privacy is a thing of the past. Electric Media has it flaws such as hacking and cyber

Related Documents

  • Improved Essays

    When Alter states that “for centuries, reading has largely been a solitary and private act” (3) she is making the kind of leap in logic and generalization that is exaggerated. There is simply no way of proving that reading has been a private act for centuries. Given the existence of events like public readings, performances of plays, and other art forms that bring words into the public sphere, it seems an exaggeration to suggest that reading has “largely” been anything at all over such a large time span. Suggesting that reading has been private nearly exclusively, however, frames Alter’s argument for revised policy guidelines when it comes to the privacy of data collection in e-books in a much more dire light; one that requires quick action than a more even-keeled rhetorical approach would dictate. Furthermore, Alter also manages to intersperse quotes that help amplify the perceived significance of the essay’s stance, relying on a cyber security expert’s overblown comment to make it seem as though data collection through e-books could be a massive infringement of our privacy rights: “’there are a gazillion things that we read that we want to read in private,’ Mr. Schneier says” (22).…

    • 1287 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Petitioner was convicted under an indictment charging him with the distribution of methamphetamines via text communication resulting in the death of a minor in violation of 21 U.S.C. § 863. Evidence of petitioner's distribution of the conversations, received by Instrusia local police had cloned the cell phone of petitioner through local call phone carrier collecting evidence as text messaged were sent, was introduced at the trial. The Court of Appeals dismissed the conviction, finding that there was yes Fourth Amendment violation, since there was "no warrant secured for probable cause." MRS. JUSTICE EVANS delivered the opinion of the Court.…

    • 697 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    He goes on to explain that social media is designed for the information to be shared and mined for profit. Social media, according to the author, is built on the antithesis of privacy. Edmond’s point in this paragraph stumbles in the main argument. Data being sold to a company is different than allowing an employer to have access to your Facebook password. Data sold to a company is sorted through to find people with interests related to their product to target advertisements.…

    • 1331 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    However, the scope of this tradeoff has overreached their expectations of reasonable privacy infringement and this balance between security and personal privacy has become the hallmark of the privacy debate. In fact, the events of 9/11 helped to solidify the already growing situation in which technology developments were making information gathering simpler and existing laws for information gathering were undergoing drastic changes (Shamsi & Abado,…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Fourth Amendment Privacy

    • 485 Words
    • 2 Pages

    Even though the United States Constitution does not outright give American citizens the express right to privacy, many amendments contain the protection of certain privacies, more specifically the First, Third, Fourth, Fifth, Ninth, and Fourteenth Amendments. The Fourteenth Amendment has a very broad claim, stating that “No State shall… deprive any person of life, liberty, or property, without due process of law.” The word “liberty” in this statement singlehandedly guarantees this wide sense of privacy to American citizens, as shown through countless amounts of court cases decided based upon this clause of the Fourteenth Amendment. In the past few decades, privacy rights are often debated closely relating to technology as new methods of hacking,…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    The Fourth Amendment is comprehensive and highly valued by American citizens and reflects the framers belief that the government should not be allowed to interfere in some aspects of a citizen’s life. The Fourth Amendment clearly protects a person’s home and personal property, but their electronic communications are less defined and protected under current law. When the Constitution was written, paper records were all that existed and these were protected; electronic records should qualify equally and be considered the same as “papers and effects.”…

    • 130 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    However, Mary Madden, who works with Lee Rainie states “93% of adults say that being in control of being in control of who can get information about them is important”(Madden). This comes to show the a great majority of the population does not have great faith with online privacy. Even celebrity Stephen Colbert “confronted Facebook and Google for selling us out on his tv show Late Night with Stephen Colbert”(Papenfuss). With no amendment strictly protecting privacy, we would now have problems with being sold out as pawns to just make more…

    • 1159 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Furthermore, I have noticed that Baym did not pay more attention to the issue of privacy and how it affects on personal connections in the digital world. I do believe that privacy matter is considered an noticeable weakness of digital media If it is misused. Thus, I hope if she talked about it in more depth with investigation of many examples from our contemporary life. In general, this book is worth reading because it provides an overview of everyday life that has a close connection to technology and digital media. Surely I recommend this book to those people who are interested in technology and its impact on the people.…

    • 1485 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Right To Be Forgotten

    • 1014 Words
    • 5 Pages

    The Right to Be Forgotten was passed in Europe in the last few years. Jeffrey Rosen, a professor of law, discusses “The Right to Be Forgotten.” This article shows three categories of the law explained by Peter Fleischer. The first category is the least controversial; if people put their pictures on the Facebook, they can easily take them down. In Europe, The Right to Be Forgotten protects the secret of each individual on the social network.…

    • 1014 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Why Privacy Matters

    • 1428 Words
    • 6 Pages

    Assignment Submitted By Yours Name here Submitted To Yours Instructor Name here To Meet the Needs of the Course Nov., 2015. For this rhetorical analysis task, I have selected the article which is titles as Why Privacy Matters Even if You Have Nothing to Hide, written by Daniel J. Solove.…

    • 1428 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Deplorable crimes and factors have pushed the government to take extreme measures regarding the issue of national security. In order to preserve the order and public safety of every citizen it has been introduced the Electronic Communications Privacy Act (ECPA) which contradicts the ideals of the founding fathers reflected in the Fourth Amendment. The ratification of this act has been of great controversy. Personally, as Benjamin Franklin expressed is not “essential liberty” what it is guaranteed to its citizens when governmental agencies access to the people’s private life. Giving up this right without questioning is like not understanding the importance of this principle.…

    • 571 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Technology and media play a significant role in most people 's lives in today 's society. Digital devices are starting to rule over people 's lives. In Fahrenheit 451, Ray Bradbury illustrates a fictional society that revolves around electronics. The people living in Bradbury 's creation are brainwashed by the government, almost programmed to be the same, with a world in which reading books is illegal. The novel sends a clear warning to the real world showing how electronics can destroy freedom and independence.…

    • 1601 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Technology has created a false comfort in the public domain. We feel free to share everything on our Instagram and Twitter and express who we want to be; however, we are not truly secure. The internet is a mysterious realm that most people do not understand, and what you post, retweet or share is not kept private. Turkle discusses this through a memory she has with her grandmother. In this memory, she details how her grandmother grew up in Germany at a time when they would spy on your mail to see what you were up to and it frightened her.…

    • 1606 Words
    • 7 Pages
    Improved Essays
  • Decent Essays

    PART ONE: Specific Purpose Statement to inform the audience about social media PART TWO: Speech Sections Introduction Attention getter: Did you know 92% of teens go online daily and 24% go on constantly? Preview speech body: Everyday we are constantly using our phones and computers whether it be Instagram, Twitter, Facebook, Snapchat, etc. Social networking sites play a constant role throughout today’s society whether it be negative or positive. Site like Facebook connect old friends or site Twitter and Instagram have become platforms to make people famous. But it has also become a sanction to hold people against their own personal information.…

    • 724 Words
    • 3 Pages
    Decent Essays