function to assist the FBI to gain access to the suspects' phone, to confirm any ties to ISIS. At this time, Apple does not have the means to disable the auto erase function, and has denied, the court order, siting protection of their customer's privacy. Apple should not be forced by the government to jeopardize…
Having the necessary information is crucial in almost any area, especially for research and development. The purpose of collecting data is primarily for knowledge discovery, then for further consideration. In other words, all websites gather people’s information and base on them to explore their behaviours and trends. From there, they will shape the browsing experience that match each person’s preference in the future. As mentioned above, social media, especially Facebook and Google, track all…
person or object, and perhaps other information, on a microchip known as identity chip. A microchip implant could be used as a virtual barricade, to limit movement, and even to act as a tag for prisoners. In the realm of medicine, it could be used to save medical records for patients, records that could be pulled up anywhere in case of an emergency. It could also be used to monitor people with Alzheimer’s disease. However, as with most technology, RFID technology privacy and security…
access to the computers’ webcam. The goal of the one to one program was to increase the connectivity between home and school for students. The access to computers enabled the students to access online programs and activities that relate to the information that the students learned in the classroom during the day. The computers given to the Lower Merion School District’s students were not only used by…
habits and gathered a bulk of their personal information. Former CIA employer and NSA contractor Edward Snowden, responsible for stealing these government files, is currently “wanted” for espionage. His efforts to inform America of the government’s actions has fueled the ongoing controversial debate between the right to privacy and national security. Was the NSA truly justified in their surveillance methods? While many American citizens believed their privacy was violated, others understood…
Should we be concerned about surveillance throughout the places we go? If so, why? Is it not meant to keep us safe? These are the questions I asked myself as I walked along Whittier Boulevard in East Los Angeles. This street, along with Broadway street in Downtown Los Angeles, hold an important piece of history due to the fact that many significant events have occurred there. The 1970 Chicano Moratorium, for example, took place on Whittier Boulevard and immigration rallies have taken place in…
My level of concern about privacy when it comes to my location and whereabouts would rank as a 7 for me on a scale of 1 to 10. I am uncomfortable with my location being tracked, but I do not think that the people with access to it would use it maliciously. I assume that the people who could possibly have access to this information would be my cell service provider and the makers of apps on my phone. I think that apps should be allowed to use this information if it provides for a better…
rivacy and Security in Tandem In preparing this paper, I struggled with how to approach the topic of privacy and security, both as singular issues and as to how one relates to the other. There are many strong arguments that privacy is being traded off for the sake of security. However, rather than looking at it as being “traded off”, we must instead look at the necessity of such measures in this changing world of technology. As a country and society, we must change with the times. Supporting the…
Elimination of privacy is another prominent motif that is explored through these novels. Initially, the society in The Circle is almost identical to the readers’ society. Yet as the novel progresses, Mae slowly transforms into the company’s ideal employee, gradually brainwashed into believing that self-exposure is ‘the right thing’ to do, as “privacy is theft”. The horror is accentuated due to the similarity between the society in the novel and the society of the readers, hinting a possibility…
In the article, Nothing to Hide, there is the reference to the various aspects of information privacy, with consideration of the inherent risks existing in the structure as it stands, concerning the advancement of the digital era. The author notes that “the nothing-to-hide argument pervades discussions about privacy.” The historical context of the argument is laid out where reference is made to the origins of the “nothing-to-hide” narrative, in the cultural and legal contexts. The policy is…