In this article, John Swartz explains how owners of Facebook fare more concerned with profits than protecting people’s privacy. He also explains the dangers associated with lack of privacy. This article contributes greatly to the argument that smart phones and computers have an overall negative effect on society.…
Wolf, Naomi. “The New Totalitarianism of Surveillance Technology.” The Guardian. The Guardian News and Media, 2012. Web. 08 Nov 2012. <http://www.guardian.co.uk/commentisfree/2012/aug/15/…
“Closer to people I’m far away from, but maybe farther from the people I’m close enough to” (Rose, 613) This short post perfectly sums up social media. Written by the author of the article, Josh Rose’s friend, he explains his feeling on the revolution of the internet. Josh Rose himself believes that the social media movement has brought forth positive changes. His examples not only include his friend who was able to reach people from far away but his son who is now able to have those daily mundane talks without having to see his father day to day. Rose also brings up information about a post he recently viewed on Facebook, the headline reading “In China, microblogs finding abducted kids” in which he states that their form of social media was able to save children as young as the age of six from their abductors. Rose explains that people fall into three…
The first example of Orwellianism seen in today’s society is how social media and third-party providers use these platforms to obtain information from their consumers. According to an article, “Government Using Social Apps to Spy on You”, the government stores your data, metadata, to keep track of you (Bloom, 2014). This article contemplating today’s society shares strikingly similar characteristics to the book 1984, by George Orwell, because both societies are watched and monitored as the book 1984 states, “Big Brother is Watching You!”. In 1984, civilians’ thoughts and actions are closely and constantly monitored by the government and through the thought police while in today’s society, our world is run on the constant use of technology which also involves the daily, constant use of social media to post pictures, set up meetings, and to share personal information. Through…
Congressional Digest, 94(10), 8. Sun-ha, H. (2017). Criticizing surveillance and surveillance critique: Why privacy and humanism are necessary but insufficient. Surveillance & Society.…
Kurlander speaks the truth when he says, “We walk Main Streets and drive thoroughfares that are monitored by cameras and speed passes. We work at computer terminals that allow our bosses to monitor our behavior and work productivity, and we use social media and search engines that can track our usage and establish personality profiles to sell and share.” (Kurlander). Today, technology that analyzes and records our personal preferences becomes increasingly popular. For example, Netflix provides suggestions to its users, and Facebook recommends friends that people have in common. Kurlander brings up, “We now also routinely spy on our families and one another too in our homes, businesses, and elsewhere, simply [by] clandestinely hiding spy cameras or affixing and monitoring GPS [global positioning system] monitors to phones, computers, vehicles or possessions.” (Kurlander). New and advanced security systems allow the owners to view footage from their micro-sized cameras. Today, average people are able to spy on each other because this surveillance technology is not only owned by the government but can also be privately…
Now that technology is becoming more advanced, many individuals feel the need to expose every action and thought they make to the public. Social network users are constantly updating their profiles with posts, pictures, and videos; and at the same time other members are peeking at what is being posted. Ordinary people can easily be searched and found on the…
The creation of chat rooms like my-space, face-book, cell phones, and other personal messaging services has created ethical issues and opportunity for criminals to commit crimes. “Since the wide spread use of computers and the Internet have entered the mainstream of American life. Millions of Americans spend hours every day using computers and mobile devices to send and receive email, surf the Internet, maintain databases, and participate in countless other activities,” (Office of Legal Education Executive Office for United States Attorneys, 2009). The creation and widespread use of social networks have led to ethical problems of protecting the rights citizens and law enforcement agencies. Even though we want law enforcement agents and the government to capture criminals, we want to protect the rights of law abiding citizens. “The Electronic Communications Privacy Act and the Stored Wire Electronic Communications Act are commonly referred together as the Electronic Communications Privacy Act of 1986 (ECPA).” (Justice Information Sharing , US. Department of Justice, 2012). “ The onset of computer and other digital and electronic communications prompted the need to make updates to the ACT.” (Justice, 2012) The USA PATRIOT Act and subsequent federal enactments have clarified and updated the ECPA in light of the ongoing development of modern communications technologies and methods, including easing restrictions on law enforcement access to stored communications in some cases. (Justice Information Sharing U.S. Department Of Justice, 2012). “The Electronic Communications Privacy Act (“ECPA”) was passed in 1986 to expand and revise federal wiretapping and electronic eavesdropping provisions. It was envisioned to create “a fair balance between the privacy expectations of citizens and the legitimate needs of law enforcement.” Epic.org. (2010). The advances in social networking and telephone communications brought the…
In the recent past, law enforcement in various parts of the world has come under serious threat from different types of media. In the United States, law enforcement agencies argue that their work is greatly affected by the misrepresentation made by the electronic, print, and social media (Colbran, 2014). They fear that in the contemporary world, social media platforms such as YouTube, Facebook, and Twitter are negatively affecting their work and playing a major role in the rising cases of violence across the country. The misrepresentation of law enforcement by media has been termed as the biggest challenge that authorities have had to deal with in the contemporary world of high technological advancements. People have developed a tendency…
Media is a means of communication with the intent to influence a wide audience (Stuart, 2013). Social networking, which allows multiple people to share information with one another and it provides the public with reporting power of major or everyday incidents with the push of a button. Law enforcement agencies are well aware of this and have stepped up their efforts of using this means of communications as a crime fighting tool. Social media can be used for public relations, crime prevention, and criminal investigation. Departments that create a presence on social media sites open a new door of communication with the general public. By doing so citizens can receive real-time information, as well as an electronic method of asking questions, making suggestions, and providing tips that help solve crimes (Stuart, 2013). However, there has to be some kind of controls established to manage the information in a way that does not create misinformation and technicalities.…
As a result, more people are using electronic devices to access social networking sites, to date, their bank accounts, their email, to shop, etc. While these people are using these sites, criminals are taking advantage of this vast amount of information people are putting on the social networking websites. Which is why law enforcement must alter their policing strategies and techniques and use the same source (social networking) to capture these criminals.…
From the 6th to the 10th of August, the UK suffered from clashes with the police, rioting, arsons and lootings which spread from London across the country resulting in five deaths and 1500 arrests and a lot of accusations towards social media. The initial riot began as a response to the death of Mark Duggan, who had been fatally shot by special police forces two days earlier in Tottenham, an area of London which is well known for its difficulties between the black community and the police. However, the unrest of the riot spread to other London areas and even to other English cities. Speculations arose about how the spread of violence could have happened so easily, eventually blaming social network services for their simplicity to privately contact large groups of people and instigate riots. The purpose of this study is to learn more about the dangers of social media and how we can prevent them increasing violence and crime in the future. The papers first section will analyze social media regarding the behavior of youth, the second section will focus on which form of social media had the biggest impact and the last section will analyze why the police could not control the social network services.…
Spying on friends has never been easier thanks to social media. Social media websites such as Facebook and Instagram give you the opportunity to peer into other people’s lives without even having to contact them in person. Sometimes this can get out of hand, leading to voyeurism and stalking. Although “The Rear Window” was produced in 1954, it relates to social media in this day and age when it comes to peering into other people’s lives.…
“Privacy seems to encompass everything, and therefore it appears to be nothing in itself” (Solove, 2008, p. 7). It is an oversimplification to define privacy as all what an individual owns. With the evolution of new technologies nowadays, it is very hard to define privacy because it varies from one person to another and from one culture to another (Solove, 2008). With the rise of social networks during the last decade, new views about privacy started to emerge due to its special mechanism in sharing information. Social networks enable users to instantly share information, thoughts, photos, products and videos with the many users in the network at once. Unlike other means of communication, the information in social networks can spread to hundreds of users in seconds. Then, the users who received the information may share it among their network, and then further to other networks, which will end up in spreading the information to millions of people in no time, just like a chain reaction. This new mechanism of sharing, which is becoming faster every day, raised new concerns about privacy among individuals and organizations. In spite of all these concerns about the personal privacy on the social networks, social networks websites are the most visited websites in the internet. For example, Facebook has reached 901 million monthly active users in April, 2012 (Hachman, 2012). Although social networks enables an easy sharing of private information about individuals or low profile information about organizations, individuals and organization should not be afraid of using social networks due to privacy concerns, and instead they should be more public and utilize the social network.…
Of this week’s reading by Julia Angwin draw on her observation and experience that highlights how the technology we use every day to converse, could easily be used against us by interfering with our privacy .Because our privacy is not really private, it could it up hurting up as well, Angwin found this to be true when Face book decided to change its policy, which made it possible for people to see you friends list even if you had a private account. As a result, not only was her life in danger but everyone she communicates with.…