РефератыИностранный языкTeTechnology Or Privacy Essay Research Paper George

Technology Or Privacy Essay Research Paper George

Technology Or Privacy? Essay, Research Paper


George Orwell said it best in his novel 1984; Big Brother Is Watching you . He


wrote these words in 1949. Who would have thought that fifty years from then it is


becoming reality instead of fiction? It now seems as if technology makes the planet


revolve. I will discuss certain aspects of the issue over privacy rights in conjunction with


technology. In this paper I will prove that the government, businesses, and individuals


have access to almost anyone s information. I will also prove that this will neither end,


nor slow down. I will also offer theories about government cover-ups.


Anything you store on your computer can be used against you. (Wang, p.69) The


government has access to every bit of information you put on a form. Anything from


medical records to credit reports. Even your most sensitive information is available to the


government. Virtually every major change in life is recorded somewhere in a government


files. Shortly after you are born, a birth certificate is issued. When you obtain a driver’s


license, get married, buy a house, or file a lawsuit, these events are recorded in


public documents easily available to you and to others. (Privacy Rights Clearinghouse,


http://www.privacyrights.org/FS/fs11-pub.htm) Businesses also have access to sensitive


information such as credit reports and credit card numbers. In fact, anyone with a


justifiable business need for it has access to it. Spamming is also a loss of privacy.


Spamming is junk mail on your computer. Often its advertisements for money making


schemes, business opportunities, or even pornography. Some people sell e-mail addresses


to businesses to make money. Also, when you put your e-mail address on forms, you run


the risk of it being sold to businesses for the purpose of spamming. The cost of spamming


is low, therefore, even if one percent of the people spammed actually read and do what the


spam asks them to do, it will cover the minimal costs of spamming. Telemarketers also


interfere with peoples privacy. Technology such as national phone number databases and


automated dialing machines allow telemarketers to reach nearly anyone with a phone line.


With the right tools, any ordinary person can gain access to your personal information.


Computer hacking is one way; computer viruses known as Trojans can give allow


sensitive information to be revealed to a curious hacker. (Wang, 301) I was the victim of


a Trojan this past summer. The person who put the Trojan on my computer had access to


everything on my hard drive including my passwords. These are not easily detected unless


you are careful and know what to look for. One might think that they have complete


privacy, but little do they know a person two blocks away or two hundred thousand miles


away could have access to their information. Interactions between people that are


mediated by technology are prone to both conscious and inadvertent intrusions on


privacy (Bellotti, 66)


Technology is growing at an unbelievable rate. Within a period of about fifteen


years, the Internet has gone from a medium used strictly by universities, scientists, and the


military to a global medium used for everything from education to entertainment by a


majority of the US population. According to research by MIT, the size of the Internet


tripled from 1993 to 1996. (Internet Growth – Summary,


http://www.mit.edu/people/mkgray/net/internet-growth-summary.html) By the year 2000,


it is projected that nearly half of the population of the world that speaks English will have


Internet access. (Global Internet Statistics, http://www.euromktg.com/globstats/) Will


this growing ever stop? I can t predict the future, but I would be willing to bet that it


won t. It is now common wisdom that the power, capacity and speed of information


technology is accelerating rapidly. The extent of privacy invasion – or certainly the


potential to invade privacy – increases correspondingly. (Privacy International,


http://www.privacyinternational.org/survey/Overview.html#Heading2) The Internet is


accessible to anybody. Therefore, the people who use it are ac

cessible to anybody.


It is my firm belief, that the government has more technology than we could ever


dream of that we do not know about. The Manhattan project, a well known example, in


the 1940 s gave the United States the ability to destroy the world. This top secret project


created nuclear weapons. Civilians and most military personnel had no idea this was even


going on. This was developed to end World War II, little did they know that this


technology could destroy the world. The Central Intelligence Agency s main function is


espionage. The government grants them the right to spy on other countries, so what is


stopping them from spying on us? Nothing. Law enforcement has the ability to track


people with cellular telephones. (EPIC, http://www.epic.org/privacy/#hot) Here is


another thing to think about: As reported in Wired News, Image Data — a company


ostensibly seeking to provide a new method of stopping credit card and check fraud — has


been building a database of cross-referenced photographs and purchase histories.


Documents obtained by EPIC through Freedom of Information Act requests show the role


of the Secret Service in directing and funding Image Data’s pilot programs. In its project


of establishing an unprecedented national identity database, Image Data purchases driver’s


license photos without the permission or knowledge of citizens. (EPIC,


http://www.epic.org/privacy/#hot) The next time you pick up your telephone, how can


you be sure that someone from the government (who s salary you help pay to protect you)


is not listening in on your conversation? According to the Electronic Privacy Information


Center (EPIC), the request for federal and state wiretaps and bugs increased 12%. (EPIC,


http://www.epic.org/privacy/wiretap/) Should the government be trusted? Would you


believe me if I told you that the government bribed phone companies to make wiretapping


and bugging easy? Its true. EPIC reports: On the last night of the 1994 session,


Congress enacted the Communications Assistance for Law Enforcement Act (CALEA),


sometimes called the “Digital Telephony” bill. CALEA requires telephone firms to make it


easy to wiretap the nation’s communication system. The bill faced strong opposition from


industry and civil liberties organizations, but was adopted in the closing hours of Congress


after the government offered to pay telephone companies $500,000,000 to make the


proposed changes. EPIC opposed passage of the bill and believes that the government has


failed to justify the $500,000,000 appropriation required. (EPIC,


http://www.epic.org/privacy/wiretap/) If it makes it easier for law enforcement to tap,


doesn t that make it easier for curious civilians to tap? I believe that the government


should be using their power to protect our privacy instead of encroaching it.


All in all, I believe our privacy is in jeopardy. The government is the catalyst for


technology increasing. As long as it is growing the greater loss of privacy we have. Its


inevitable, this trend of technology forces privacy out the window. People just like us


within the government are allowing this to happen; this is what scares me. I began this


essay with a quote that has turned out to be true, and I will end with one that I hope


doesn t come true. It seems as if we are well on the road to it becoming true. It s in


your nature to destroy yourselves – The Terminator (speaking about humankind)


References:


Agre, P.; Belloti, V.; et al. (1997). Technology and Privacy: The New Landscape.


Cambridge, Mass: The MIT Press


Wang, W. (1998) Steal This Computer Book San Francisco: No Starch Press


Privacy Rights Clearinghouse,


http://www.privacyrights.org/FS/fs11-pub.htm


Internet Growth – Summary,


http://www.mit.edu/people/mkgray/net/internet-growth-summary.html


Global Internet Statistics,


http://www.euromktg.com/globstats/


Privacy International,


http://www.privacyinternational.org/survey/Overview.html#Heading2


Electronic Privacy Information Center,


http://www.epic.org/privacy/#hot


http://www.epic.org/privacy/wiretap/

Сохранить в соц. сетях:
Обсуждение:
comments powered by Disqus

Название реферата: Technology Or Privacy Essay Research Paper George

Слов:1364
Символов:9633
Размер:18.81 Кб.