Rhetorical Analysis: Why Privacy Matters

Improved Essays
Rhetorical Analysis: Why Privacy Matters

While listening to and reading the lecture, Why Privacy Matters, given by Glenn Greenwald at the TedGlobal event in 2014, it because clear to me that this speech presented information that was methodically and strategically conceived to make an argument that would try to change the perception of its targeted audience. The main argument in this lecture is about our privacy when it comes to the internet and its various forms such as services like, Google, or Facebook. The author argues that in an era where more and more intrusion is occurring into our digital lives, people are conforming their actions around the notion that they may be under the watchful eyes of various entities. That’s where the importance
…show more content…
To accomplish that goal many persuasive writing tactics are implemented. For example the author informs that audience early in the presentation that “Over the last 16 months, as I've debated this issue around the world.” I feel that the early inclusion of this statement is a strategy related to the appeal of Ethos in how it tries to imply that person you are listening to is an expert on this topic. I think it’s implementation is crucial as well simply because it may seek to reduce the level of doubt associated with any of the claims made by the author when going forward with their speech. I also find it interesting that Glenn Greenwald doesn't mention his direct relationship to this subject matter and I feel that he makes the assumption that his viewers already are aware of this fact. One of the best persuasive strategies employed within the presentation is the targeted nuance of fear he associates with the statements he quotes by both Eric Schmidt, the CEO of Google, and Mark Zuckerberg. He cites Eric Schmidt of saying. “If you're doing something that you don't want other people to know, maybe you

Related Documents

  • Improved Essays

    Today there is so much technology in the world that makes us split on where to draw the line of what’s using technology to its fullest and what’s invasion of privacy. Two articles show what they think about it, “Private License Plate Scanners Amassing Vast Databases Open to Highest Bidders” and, “Who Has the Right to Track You?” Both share their opinion on the subject by using rhetorical devices to influence the reader to agree with their opinion. The first source uses more logos by justifying the article with facts whereas the second uses pathos to make you feel betrayed by the government.…

    • 515 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In Alexandra Alter’s expository editorial the subject of privacy, and especially its relation to data collection is a controversial topic that has the power to polarize people. This article highlights how a previously solitary act of reading is evolving into something that can be tracked and analysed. The author’s thesis focuses on reading, when done electronically, has become an invasion of privacy. This article also presents the idea that reader-user data and it’s analysis is very profitable for publishers and e-book companies.…

    • 94 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    In Rebecca Solnit’s article, “Easy Chair” I realized that we do not have privacy at all if we use the technology and take care of our things online on the Internet. The article Poison Apple made me realize that we do not have privacy at all if we use technology. For example, Rebecca Solnit mentioned, “Google is the world’s biggest advertising company, watching you on nearly every website you visit’’ (Solnit 5). This passage demonstrates how technology has been part of everyday human's life. Google knows everything about everyone’s interests and it can share this information with its partnerships and use it for their benefits.…

    • 166 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Through a vast majority of the services we utilize daily, most of which often appear innocuous, data about users is collected and distributed to third parties. In the article “A Day in the Life of Big Brother”, Sherman guides the reader through the daily routine of an individual, referred to as J. Doe, and their interactions with a plethora of services that most individuals utilize daily. First, J. Doe wakes up and reads the news through Google. Google, and his Internet Service Provider, use analytical tools, such as cookies, to follow Doe’s reading habits online and use that information to analyze his preferences. Following this, Doe commutes to work through a state that utilizes electronic toll ways, which follow and record his path.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology, the American people 's privacy has shrunk, we are monitored at all times. Cameras at every street corner, cell phones being tracked to the exact foot, every website and Google search seen stored and collected. All of this is done in the name of our safety, but how much of this data is about our safety and more about controlling us? In Adam Penenberg’s essay The Surveillance Society, readers are informed of these measures and are lead to believe the invasion of our privacy is necessary. Some form of surveillance is a necessity in the world we live in today, crimes and terror attacks have been prevented because of it.…

    • 1425 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    However, the scope of this tradeoff has overreached their expectations of reasonable privacy infringement and this balance between security and personal privacy has become the hallmark of the privacy debate. In fact, the events of 9/11 helped to solidify the already growing situation in which technology developments were making information gathering simpler and existing laws for information gathering were undergoing drastic changes (Shamsi & Abado,…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Rhetoric Analysis

    • 258 Words
    • 2 Pages

    Argument surrounds us. It plays “with [our] emotions, changes [our] attitude, talks [us] into a decision, and goads [us] to buy things” (Heinrichs 18). Rhetoric is the argument’s decoder. This section talks about the effectiveness of rhetoric on persuading the audience or adversary to agree with the speaker’s points. It is, as Heinrichs states, an “art of influence, friendship, and eloquence, of ready wit and irrefutable logic.”…

    • 258 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    He explained his argument in a very clear, detailed way by providing specific examples that furthered deepened and gave strength to his claim. Though he didn’t give any insight to the opposing argument on how internet surveillance is a good thing, this is a great piece showing some of the ugly regarding our internet and purchasing privacy. There may be mild exaggeration, but no one can deny we are living in a country completely devoid of privacy, and it’s only becoming more…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nelson And Rubio Essay

    • 629 Words
    • 3 Pages

    Dear Senators Bill Nelson and Marco Rubio, It has been brought to my attention that the Government has access to surveillance systems that can monitor our phone calls, text messages, emails and etc if needed. I agree that the government should have this right, but I believe there must be some strict guidelines placed in order to ensure the personal privacy of citizens. While discussing this topic, it may seem scary to think as a citizen, that everything in our personal lives isn’t as private as we imagined it to be. But, the questions we all seem to ask ourselves about this issue is, “Why is all of our information so important to the government anyways?” or, “I haven’t done anything wrong, so why would they need to look at my texts or listen to my phone calls?”, and last but not least, “How is this legal?…

    • 629 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Dbq Privacy

    • 800 Words
    • 4 Pages

    Privacy should be kept intact even for sake of security. One of the main supporting arguments for security is that if an individual has nothing to hide, then they have nothing to fear. In The Accountability Matrix by David Brin, Brin highlights the fact of having tools…

    • 800 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Why Privacy Matter Even If You Have “Nothing to Hide” In the article “Why Privacy Matter Even If You Have ‘Nothing to Hide,”’ Daniel J. Solove, talking about the government governed the information to analyze without the permission. Many people didn’t realize how many problems by let the government take their information to analyze. Solove does a great job to persuade the readers that we deserve more the privacy by using the appeal to authority and anecdote.…

    • 704 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    “Privacy is not an option, and it shouldn't be the price we accept for just getting on the Internet,” stated Gary Kovacs the president of several software companies (Kovacs). However, since the implementation of the Patriot Act in 2001, the loss of American privacy is one of the many results of the new set of revised laws that have been rewritten to give the government more freedom in observing our electronic fingerprint (“Surveillance Under the Patriot Act”). In their hurry to act on the tragedy of 9/11, Congress passed the Act a mere 45 days of the event, with little to no debate. The result of it’s ratification, was a drastic change in the surveillance laws and restrictions of the federal government (“End Mass Surveillance Under the Patriot…

    • 1537 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    The Fourth Amendment is always a subject of controversy in national defense and law enforcement, and the constitutional protections of liberty, property, and privacy attribute to solidifying America’s greatness. If I had to choose among the three, I value privacy among all three rights. Recently, the privacy of Americans has been subjected to intrusions demonstrated through crisis legislation like the Patriot Act. Many people believe politicians and lawmakers’ coerced the American people through the belief that sacrificing their privacy would prevent future terrorist acts (Welch, 2015).…

    • 231 Words
    • 1 Pages
    Improved Essays
  • Superior Essays

    On June 6th, 2013 The Guardian and the Washington Post revealed the fact that the NSA had access to customer information on Apple, Microsoft, and Google computer products. The information obtained by the NSA was allegedly used to prevent any terrorist actions. However, the NSA has “[built] up a store of information on millions of US citizens, regardless of whether or not they are ‘persons of interest’ to the agency” (Brown). Although terrorist plots are a legitimate threat to America, the U.S government has overstepped its boundaries by violating the citizen’s of America’s fourth amendment right to privacy.…

    • 544 Words
    • 3 Pages
    Superior Essays
  • Superior Essays

    Introduction The most powerful and prominent force in the world has without a doubt has been, the rapid advancement of technology following the industrial revolution. From the introduction of the steam engine by James Watt to the mass expansion of railway lines, technological advancement has increased productivity and globalization exponentially. By breakthroughs in communication, transportation, and information technology, the world in which we reside has become unrecognizable to what it was 200 years ago. This essay encompasses these three ways in which technological advancement has completely restructured and revamped the world of as we know it. Cementing itself as the most powerful force on the planet.…

    • 1516 Words
    • 7 Pages
    Superior Essays

Related Topics