Thesis on "Privacy and Technology"

Thesis 6 pages (2213 words) Sources: 10 Style: MLA

[EXCERPT] . . . .

Privacy and Technology

Technology has experienced a constant advance ever since the beginning of time and mankind has certainly benefited from the occurrence, as the civilized world could not have existed without it. In spite of generally being regarded as being favorable for people, technology has also brought drawbacks in certain domains. The concept of privacy has changed a great deal in the last few decades due to the technological advancements that have appeared. Technology must be controlled so that it does not interfere with people's privacy.

"Computerization of record systems, wiretapping of telephone conversations, parabolic microphones, lie detector tests, personality tests, and miniaturized cameras presented an alarming potential for invading individual privacy" (Regan, Priscilla M.)

Technology has made it possible for people to own computers on which they can store a significant amount of data. However, because computers and internet are relatively new in the lives of people, people have not yet agreed on some specific laws to be given regarding the use of the new technologies.

New technologies set free large amounts of information which can be harmful it they fall in the hands of evil people. Privacy is something which can be directly affected by technology, as certain documents can be made public without the consent of their owners. In the present, there are numerous cases of personal information having been collected by anyone that wanted to.

Privacy is something that all people are entitled to, regardless of the new technologies which may appear with time. Having begun in the early 1960s, the
Continue scrolling to

download full paper
new era of technology is threatening the well-being of privacy worldwide. The few years that followed after the appearance of the computer made people tremble with fear after witnessing the stories being told in the media. Journalists, film directors, and writers had all started to relate their works to technology and to the image of what it could lead to in the future.

George Orwell's Nineteen Eighty-Four is one of the novels which have been written on the subject of people's privacy being broken by the government. In the novel, the government is being pictured as controlling its people and carefully watching their every move. Nineteen Eighty-Four has been inspirational for numerous movies and TV-programs which were later made.

The public quickly reacted to the respective stories and started an international campaign regarding the limits that computer will have. People feared that their privacy might be affected with their personal information being present on various databases. A mass paranoia has been triggered ever since, as people have become reluctant from accepting the fact that they had their personal data accessible to strangers. Also, people have begun to avoid talking certain things over the telephone from the fear that someone might listen to their conversations.

It is practically impossible for anyone today not to fear that their personal information might be stolen by someone. People have their private data present in several databases, and, most countries have implemented a law that permits all telephone conversations to be recorded. It would be naive for one to believe that it is irrational for people to fear that their privacy is in danger. Simple operations like that of a credit card being issued require people to have their information stored on a database.

There are no boundaries when concerning the violation of people's privacy, and, even public persons which are far more influent than simple people risk being monitored by various institutions in the state.

The advance of technology has spread so far and so fast that now even federal judges face routine mass-monitoring by the state. In March 2001, the judges of the Ninth Circuit Court of Appeals learned that their computers had been monitored by the Administrative Office of the United States Courts (Taslitz, Andrew E.)

One of the simplest examples of the system storing information regarding to people is the registering of their medical backgrounds. There are little people worldwide that can actually claim that they have not seen a doctor in their lives. Even though it seems that one's medical history doesn't count as personal information, it truly contains some of the most private data owned by people. The technological advancements in the present have permitted doctors to have internet databases in which they store the medical records of their patients. Medical records were being kept private in the past through simple means such as locking it up somewhere safe. However, today people can have criminals hacking into online medical databases and steal their medical history. Moreover, new laws have been given regarding the fact that doctors are no longer being allowed to conceal the medial history of their patients. Because of several episodes involving terrorists that have happened in the U.S. In the last few years, people are virtually being denied the right of having medical privacy.

Coming against the laws regarding the privacy of medical history is the American Constitution, as it grants people the right of being left alone. According to Willis, the United States Supreme Court had agreed on the fact that the Constitution grants people the right to privacy. In spite of that, the right to privacy is still unclear to most people, as it does not specify exactly what qualifies as being private and what does not.

Even if people have reluctantly accepted having their information stored in various databases, they have also been aware that the respective information is vital for the well-being of our society. However, when people are asked for their personal information, they have to pay great attention to the conditions specified in the documents that they sign. There have been several cases in which certain companies have provided their clients with little information concerning the use of their personal data. It frequently happens for companies and their clients to have different opinions in relation to the way that information is supposed to be collected and used.

The cases in which people are monitored by their superiors somewhat resemble the cases in which the people living in a totalitarian state were being closely watched by members of the state. Just as in those situations, employees might feel limited, as they cannot express themselves normally and they have to be careful to what they are saying.

When staying in his or her workplace, the employee requires a certain amount of privacy in order for them to develop their work accordingly. However, there are often cases in which the employee feels constraint by the working conditions which often invade his or her privacy. Any person has the right to respect his or her principles and to prohibit their employers from abusing them at the workplace. Also, one may feel that his or her fellow employees are interfering with their personal space in a case when they are working in the same room. The employees can consider the monitoring of their activities as a sign of distrust coming from the employer. Even when certain jobs require the supervising of the employees by the employer with the help of cameras and controlling of the internet activity, the employees can still feel stressed by the situation.

Computer users are facing a problem for a few years now, with programs existing that can register everything that is being done on a certain computer which has the program installed on it. With the help of such programs people can easily spy on other people, as they would be up-to-date with all of the actions performed on the computer that they are monitoring.

Employers have also made use of programs with which they can control their employees. There have been frequent cases of employers preventing their employees from performing actions other than working while they were at the work place. There are programs which block certain web pages and games from being opened, and, thus, employees can come across the problem of being unable to access their personal e-mail or play their favorite online game.

In the last few years technology has advanced amazingly, with the latest inventions being worthy of a science fiction movie. There is a lot of debate regarding a certain invention which is supposed to change life as people know it. The radio frequency identification (RFID) chip implants have appeared for some years now, and, ever since its official commercialization, numerous people have shown interest in having one. Apparently, the RFID chip implants are predicted to be adopted by people worldwide in the nearby future.

The implants are meant to assist people in performing basic activities such as paying without needing a credit card or money. In spite of the fact that chip implants seem to be relatively safe and useful, numerous people have condemned their use. Considering the fact that chips would have to be read with the help of a special reader, one can assume that it would not be hard for an ill intended person to get their hands on such a reader. Once in the possession of the special reader, that particular person would… READ MORE

Quoted Instructions for "Privacy and Technology" Assignment:

This is a position paper where you will be constructing a reasoned argument about a controversial issue which is "privacy and technology". You will be arguing for one side which is "Yes we need more privacy with technology". The goal of this paper is to convince your audience that your side is worthy of consideration. This paper depends upon well-thought-out claims, strong reasons, and solid examples. Also, you should anticipate opposing arguments and address them. The paper will involve a significant amount of research. You will need to research the issue and relevant facts surrounding it, as well as existing positions about the issue and their claims, reasons, and evidence.

This paper involves 2 parts:

-Annotated bibliography (2 pages)

1. Collect ten sources on the topic "privacy and technology" which should be scholarly/academic and reliable sources found through research databases.

2. Cite the source in MLA style

3. Write a concise annotation that does two things:

- Summarize the information the source covers (2 to 3 sentences)

- Evaluate and/or analyze the source in terms of its relation to the paper. (5 to 6 sentences)

-Paper (4 pages)

1. Present the issue. In other words, place the issue in a historical/cultural context, making the issue relevant, explaining its significance, and suggesting what things in particular you are bringing to the debate or your purpose joining the conversation. Develop a clear, arguable thesis that takes a side of the issue "Yes we need more privacy with technology".

2. Assert the position you took and make arguments directly for it. When making claims about the position, remember to support each one. Thus, try to make sound rhetorical choices that are going to address the prejudices and preconceptions of the audience.

3. Address counterarguments and opposing positions. The preliminary research will enable you to anticipate the primary objections to your positions. It is recommended if you could point out places where you agree with other viewpoints, but also demonstrate the flaws in reasoning and support.

4. Conclusion

In all of these aspects, you should be incorporating the outside research you have done, but don't just insert quotes or generally refer to the arguments of others, try to use sources to support your argument.

Overall:

- Demonstrate your knowledge

- Use a formal, respectful tone at all times.

* You don't have to use ten sources in the paper. Only use ten sources for the annotated bibliography. In the paper, you can use as many as you need.

* The paper (4 pages) should include a work cited page using MLA style.

* I would like the ***** with the Username "***** Brebenel" to write this paper if possible.

How to Reference "Privacy and Technology" Thesis in a Bibliography

Privacy and Technology.” A1-TermPaper.com, 2009, https://www.a1-termpaper.com/topics/essay/privacy-technology-experienced/26102. Accessed 5 Oct 2024.

Privacy and Technology (2009). Retrieved from https://www.a1-termpaper.com/topics/essay/privacy-technology-experienced/26102
A1-TermPaper.com. (2009). Privacy and Technology. [online] Available at: https://www.a1-termpaper.com/topics/essay/privacy-technology-experienced/26102 [Accessed 5 Oct, 2024].
”Privacy and Technology” 2009. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/privacy-technology-experienced/26102.
”Privacy and Technology” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/privacy-technology-experienced/26102.
[1] ”Privacy and Technology”, A1-TermPaper.com, 2009. [Online]. Available: https://www.a1-termpaper.com/topics/essay/privacy-technology-experienced/26102. [Accessed: 5-Oct-2024].
1. Privacy and Technology [Internet]. A1-TermPaper.com. 2009 [cited 5 October 2024]. Available from: https://www.a1-termpaper.com/topics/essay/privacy-technology-experienced/26102
1. Privacy and Technology. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/privacy-technology-experienced/26102. Published 2009. Accessed October 5, 2024.

Related Thesis Papers:

Privacy Laws Are a Big Research Paper

Paper Icon

Privacy laws are a big part of Business Administration in ensuring the business is in compliance with law and ensuring the privacy of sensitive information, both for customers and employees.… read more

Research Paper 6 pages (1816 words) Sources: 2 Topic: Business / Corporations / E-commerce


Technologies Impact on Healthcare Term Paper

Paper Icon

Technologies Impact on Healthcare Level of School

Technologies impact on healthcare

Technology and especially information technology has been in the forefront of making big impact in the delivery of healthcare… read more

Term Paper 5 pages (1489 words) Sources: 1+ Topic: Healthcare / Health / Obamacare


Technology and Privacy Duties and Laws Term Paper

Paper Icon

Technology and Privacy

Advancements in technology generally raise ethical concerns, simply because technology has the capacity to usher in social change. Often, the evolution of material culture - such as… read more

Term Paper 5 pages (1454 words) Sources: 0 Topic: Advertising / Marketing / Sales


What Privacy Do We Have in the Workplace Case Study

Paper Icon

Privacy do we have in the Workplace

Why do we have Privacy in the Workplace?

In this paper, we are going to be looking at how much privacy employees are… read more

Case Study 5 pages (1593 words) Sources: 0 Topic: Career / Labor / Human Resources


Privacy Rights Term Paper

Paper Icon

Privacy Rights

In the case of Wilson vs. Layne that was argued in March 24, 1999, and was decided in May 24, 1999, the privacy rights of the citizen, Charles… read more

Term Paper 15 pages (6316 words) Sources: 1+ Topic: Crime / Police / Criminal Justice


Sat, Oct 5, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!