Privacy In 1984, By George Orwell's 1984

Good Essays
Privacy is a way to be able to have an individual expression within ourselves. It has been a long argument and controversy stating that the citizens of this country are having their privacy invaded through any technology source. There has been many inquiry investigations and theories relating to this specific topic. In the novel 1984 by George Orwell he gives a prediction of how our thoughts and ways to communicate freely will be invaded by spurious idols to scare the people to consume all the false information. There has been more reliable sources anyone can turn to, such as “That’s no phone. That’s my tracker” by Peter Maass and Megha Rajagopalan talk about how our source of technology can be a way to track and follow us every step we go, …show more content…
This is how the privacy is invaded using the novel and credible outside sources.
George Wilson wanted to warn and prevent the use of controlling someone’s privacy. He admitted several examples and employed imagery to all his theories about the government being intrusive to everyone’s personal space. The novel 1984 stated, “The program of the Two Minutes Hate varied from day to day, but there was none in which Goldstein was not the principal figure” (Orwell, pg. 12). The people of Oceania believed that their enemy was a strong depraved luminary which was Goldstein. The Two Minute hate was a way that anyone could represent unlimited hate towards Oceania’s worst enemy. Any person that contradicted and worshiped Goldstein secretly was automatically observed and took into consideration to later being punished. The novel also states, “Smith! Yelled a voice
…show more content…
That’s my tracker” by Peter Maass and Megha Rajagopalan talk about how our technology is not only for research or entertainment it can be use as a tracker that can affect us in several ways through our self privacy. The article stated, “These invasive services have proved irresistible to consumers, and millions now own sophisticated tracking devices (smartphones) studded with sensors and always connected to the internet” ( Maass, Rajagopalan 2012). Although our technology devices are off, speaker and other services in the device are still on. Some devices work on speaking and others through self movement. Whenever the device is off the internet is connected and notification will still be visible. Anyone can be able to access the speaker and use any information that was spoken of. The article also states, “If someone knows exactly where you are, they probably know what you’re doing.” (Maass, Rajagopalan 2012). This is an argument that has been battled through this situation, and many seem to agree. New apps have been released and location sometimes is required to find surrounding players or people connected. This can be used in different ways and location can cause a certain surrounding that is not friendly. It can be a threat and that is what many mostly worry. Location is a way that privacy is being invaded using this source which is our cell phones. Not necessarily only but that is

You May Also Find These Documents Helpful