Premium Essay

What Is More Important: Our Privacy or National Security?

In:

Submitted By Yosselin
Words 1676
Pages 7
Yosselin Gonzalez
Professor Gautam
25 April 2016
Unfair Punishments
In “The Lottery” Shirley Jackson speaks about a game that is played every year that ends in death. Over the years this small town got accustomed to playing the lottery. It is a game of fun to the women, the men, and the children even if it ends in death. “The Lottery takes the classic theme of man’s inhumanity to man and gives it an additional twist: the randomness inherent in brutality. It anticipates the way we would come to understand the twentieth century’s unique lessons about the capacity of ordinary citizens to do evil” (Franklin). “The Lottery is definitely compared to the twentieth century due to the fact that they have a tradition to play a tragic game every year. Also their is no upper hand to stop this game everyone plays it and feels no remorse. “Trifles” is a play about a woman who gets accused of murdering her husband. “Though the play is celebrated as an early feminist drama, it stands on its own as an engrossing story. In the tale, two women, Mrs. Peters and Mrs. Hale, gradually uncover the motive for a murder, while their male counterparts are blinded by ignorance and insensitivity” (Jaworowski). The Attorney, Sheriff, a neighbor, and two of the men’s wives accompanied them to searched Mrs. Wrights house to see if they can find clues on why she would have murdered John Wright. The men enter the house with eyes of legal investigators while the two women enter the house with trying to understand why Mrs. Wright would do this to her husband. In “The Lottery” and “Trifles” both women in the text get punished for committing no crime.
“The Lottery” by Shirley Jackson is a story about a town who has a ritual to play a game every year. Every year they gather around for a couple of hours and finish in time for noon dinner. The village people begin to gather in the square between the

Similar Documents

Premium Essay

Individual Privacy vs National Security

...Individual Privacy vs. National Security Anthony Sifuentes ENG 122 English Composition II Instructor vonFrohling February 13, 2012 Individual Privacy vs. National Security The need to protect National Security is far more important than individual privacy. The greatest part of living in the United States of America is the freedom that we have. That freedom and the right to live freely is protected by various government agencies. From time to time, the privacy a person has may have to be invaded to guarantee the security of the country and other citizens. Everyone has the right to not have their life controlled by the government, but it has the right to make sure that citizens are not doing anything to threaten the security of the country. Our freedom also comes at a price; that price is the need of the government to monitor some of the things we do so ensure that the United States is not in danger of a terrorist attack or an attempted overthrow of the government. The most glaring example of how National Security is more important than the privacy of an individual is September 11, 2001. The terrorist attacks that day have changed how Americans see our National Security and it must take precedence over anything else. One definition found for national security is: “The measures taken by the state to ensure the security of itself, or its citizens or subjects.” (Thomas, 2007) He goes on to explain that is both a right and a responsibility for a state to protect its...

Words: 2496 - Pages: 10

Premium Essay

Essay On Fourth Amendment

...Over the past two decades the United States has been more and more involved in combatting the ‘War on Terrorism’, both on a global scale and within the United States. Within the United States the idea of achieving National Security, in some cases, often comes with the sacrifice of certain civil liberties in order to afford safety for its citizens, preserving the ability for each person to achieve life, liberty, and the pursuit of happiness. Some of the laws that have been enacted and that have been highly debated of wearing down American civil liberties, are that of those laws that have illegally invaded our right to privacy. There are two distinct laws that provide the American government with power for covert surveillance and that of...

Words: 1064 - Pages: 5

Premium Essay

Argumentative Essay On Security Vs Freedom

...Security versus Freedom For years the controversial topic of security versus freedom has divided our nation. For centuries the United States has prided itself on being a free country where people are allowed to do things like vote, voice their opinions, peacefully protest, and much more. While freedom vs security has always been an issue, only recently has it become a such a complex and important debate. After September 11th, 2001 happened, the government made drastic security changes in hopes of making America safer for its citizens. Some of those changes had citizens wondering if they were giving up some of their rights in exchange for national security. Security has also been brought up more recently with the rise of technology. Adding technology to the...

Words: 938 - Pages: 4

Premium Essay

Annotated Bibliography

...Information Control: Practice versus Ethics. Journal of Business Ethics Vol. 16, pgs.1175-1184 This entry examines the ethical practices of leaders in a business and their employees involving information control within a business. Specifically it examines whether these executives know if control is being performed and if they deem it ethical. The statement “…executives are generally drawn to those command activities they deem to be "proper and right." but shy away from those that are iniquitous.” R. Dulek has authored six books and publishes more than forty journal articles. He is currently a professor at John R. Miller School of Business at the University of Alabama. W. Motes is a Marketing professor at the same university and has had articles appear in twelve business journals. C. Hilton is an Associate Professor of Management at the same university and has been published in five journals. From this study it was determined that executives will do what is right when adverse...

Words: 1878 - Pages: 8

Free Essay

Privacy

...Privacy and Security in America According to the Merriam Webster dictionary, the word privacy is defined as, “the quality or state of being apart from company or observation,” and the word security is defined as, “the state of being protected or safe from harm.” Now the question is, how do these words correlate? The answer is simple. If we did not have security, the idea of privacy would cease to exist. In the United States, we have the freedom to communicate freely, but if we wish to keep that freedom we must accept that the government may watch over us more closely from time to time. Regardless, I believe that the government respects us when it comes to our privacy. In an article posted on The Los Angeles Times website, columnist Andrew Liepman writes about the Snowden scandal and where he believes the government should draw the line between privacy and security. In May 2013, a former CIA (Central Intelligence Agency) and NSA (National Security Agency) employee named Edward Snowden deliberately disclosed classified information involving the top-secret United States and British government surveillance programs to the media. Liepman, a former CIA officer and deputy director of the National Counterterrorism Center, makes it clear that anyone following the Snowden, “saga,” should be made aware of two very important things. One being that, “many things need to be kept secret in today’s dangerous world, the line between “secret” and “not secret” is fuzzy rather than stark, and...

Words: 1307 - Pages: 6

Premium Essay

Supreme Court Case Study

...Spyalot, Director of National Security Agency JUSTICE ALITO delivered the opinion of the court Shortly after September 11, 2001, at the request of the National Security Agency, several of the major phone companies were asked to provide phone records for all calls made within the United States, and all calls made to the United States from other countries. The data the NSA received, provided information on the phone number the call was made to and from, the call’s duration, the date of the call, and the time of day. No Financial data, nor content of the calls, were ever obtained by NSA. This action proceeded without a warrant for any of the information provided. In addition, there was no individual suspicion since this was considered “meta-data” or “bulk data collection” of phone records. The vast majority of the data was analyzed by computer programs and never looked at by NSA personnel. Before we delve into an analysis of the court’s decision in this case, it is prudent we first address an important point. Prior to the September 11, 2001 terror attacks, few American’s contemplated a threat to homeland security. Today, the fear of terrorism is ingrained in our daily thoughts. Following the events of 9/11, American’s sense of safety nearly vanished, and the direction, and scope of national security were forever changed. The National Security Administration (NSA), a key governmental counterterrorism agency, is responsible for ensuring national security. With this in mind,...

Words: 2770 - Pages: 12

Premium Essay

The Importance Of Internet Privacy

...In the modern world, our privacy is constantly being violated without our consent. This is due to information that is easily available. Whether you’re walking down the street, taking the subway, purchasing online items or in a store, chatting online, we are constantly under someone’s watch. Hacking, picture leaks and theft of private information are becoming recurrent issues in the 21st century. Some believe this may not be an issue but others are concerned with the impact it could have on our lives. The twentieth century was particularly marked by the growth of the Internet and the rise of social media programs. This has raised the population’s awareness about their privacy rights. A lot of information can be found online including credit...

Words: 1336 - Pages: 6

Free Essay

Nsa Spy Programs

...intelligence-gathering organizations have been developing and using eavesdropping techniques to intercept and review wireless communications. Initially, these capabilities were solely used to spy on hostile nations, and particularly for military purposes. Human operators had to manually review each transmission, and cryptanalysts pored over military ciphers in an attempt to decode important messages. As wireless communication has become an integral part of commercial and individual existence, and potential threats to security are increasingly found in peacetime and on home ground, the scope of this intelligence gathering has likewise broadened. One of the most controversial eavesdropping systems in existence is a classified project known as ‘Echelon.’ Its use of computer hardware and software to filter communications from all over the world brings up many ethical issues related to the impact of computers on privacy. Overview of Echelon Most of the evidence for Echelon is circumstantial, though a few facts have been established. The participating organizations (notably the US Central Intelligence Agency and National Security Agency) have neither confirmed nor denied its existence. In lieu of a discussion of the ethical issues, a brief summary of the current knowledge follows. How it Works Echelon is the product of Cold War efforts to monitor wireless communications in the USSR. It traces its roots back to the clandestine UKUSA alliance, a communications intelligence agreement...

Words: 5284 - Pages: 22

Premium Essay

Mobile Technology and Privacy

...Privacy and Culture: Comparative study of privacy issues with respect to mobile technology in India and America Sreeranjani K Pattabiraman Abstract The past decade has witnessed a huge shift in the development of mobile technology which has led to privacy issues, murmurings of which started surfacing only in recent years. A lot of research has been carried out by academicians on mobile technology and its impact on society. There have also been comparative studies on how privacy has changed for people over the years with the boom of social networking sites and smart phones. But, there has not been a substantial study or analysis conducted on how people's privacy has been directly affected by the ever-increasing population boom of mobile-phone users. This comparative study analyzes the concept of privacy with respect to mobile surveillance and draws upon prior work in the field of mobile surveillance, ranging from popular press on government surveillance in India and USA and case studies in these two countries related to people’s view on privacy, to the works of ACLU (American Civil Liberty Union) in USA and Stop CMS (Central Monitoring System) in India. The study is built around the analysis and comparison of the issue of mobile surveillance in both the countries, how people dealt with this, and the role of culture in determining people’s view on privacy. It also proposes suggestions for how future research can be carried out in the field of mobile surveillance. Keywords ...

Words: 7224 - Pages: 29

Premium Essay

Healthcare I T

...EMERGING ROLES IN HIM National EHR Database Security Synthia Ross ITT Tech Online OLA 1- Managing Business Information Systems Professor Mikal Wilkerson July 27, 2013 Abstract In 2009, President Barack Obama declared that by 2014, all American health records would exist in an electronic format. As part of this undertaking, the federal government has budgeted $19.2 billion in incentives for medical institutions to invest in EHRs via the American Reinvestment and Recovery Act (ARRA). By making health records completely digital, we are entrusting our most private information to “cyber-space” and opening ourselves up to potential violations of privacy. It is imperative that everyone consider the new security issues faced when approaching data storage, transmission and retrieval from various electronic devices. HIPAA’s agenda was to establish privacy, security, and electronic standards for health care providers that handle different types of patient information. The accountability part of the act includes the penalties for breaches in medical privacy, disclosures of patient records by e-mail, or un-authorized network access. How will this mesh into the emerging National Electronics Health Records Database managed by the US Government? National EHR Database Privacy Since 1996, the U.S. government has been forcing the health care industry to take responsibility for the security and control of your personal health information (PHI) by requiring the protection...

Words: 2017 - Pages: 9

Premium Essay

Privacy In Health Care

...things such as confidentiality, privacy and security pertaining to patient information. Not only is it against the law to link information of a patient outside the workplace, but there is a slang term called “HIPPA” (Health Insurance Portability and Accountability Act). HIPPA was put into play in 1996 for healthcare fields and facilities. This act allows patients personal healthcare information to be protected from being used or shared with anyone unless the patient writes a hand consent saying otherwise. Each patient’s healthcare information is kept in medical records, billing records, and health insurance computer systems. Patient’s information must always be protected....

Words: 1168 - Pages: 5

Premium Essay

Civil Liberties and the Book Matched

...Pamela Garrett How important is the right to privacy? The right to privacy is not listed in the U.S Constitution, “but the Supreme Court has said that several of the amendments create this right. One of the amendments is the Fourth Amendment, which stops the police and other government agents from searching us or our property without "probable cause" to believe that we have committed a crime. Other amendments protect our freedom to make certain decisions about our bodies and our private lives without interference from the government - which includes the public schools.” These rights are very important to citizens in society. Without these rights, each citizen will be suppressed and violated. The rights of the individual should always be upheld. We obviously have far more rights to privacy than the citizens in the book "Matched" by Allie Condie. In the book Matched by Allie Condie, the citizens are forced to contend with a lack of privacy in their society. This lack of privacy is dangerous to society because of certain violations that this can bring; such as inference of the government in our daily lives and restriction of the fundamental rights that we are entitled to. In the book Matched, the government keeps an eye on every citizen. This constant surveillance is evidence of the lack of privacy going on in their society. The issue of lack of privacy is a major one in the story, and it was an issue that America has had to deal with. I cite the Patriot Act as an example. The...

Words: 1055 - Pages: 5

Premium Essay

Should Government Be Allowed To Monitor People

...a warrant or probable cause. In today’s day and age, we use the Internet daily and it is embedded into our daily lives, even so much that when we first wake up we go to check our phones. With new technological innovations, the Internet is expanding more and more every day, but with these new expansions, how can we be sure that our privacy is protected as well? The U.S government currently monitors our internet usage to protect the citizens of the United States, however, I believe that state and local governments should not be allowed to monitor people unless there is a dire circumstance....

Words: 656 - Pages: 3

Free Essay

Full Body Scanners

...The Transportation Security Administration (TSA) today announced the start of TSA Pre✓™ operations at LaGuardia Airport (LGA). TSA Pre✓™ is a passenger pre-screening initiative that allows qualified passengers to go through an expedited security process, which among other benefits, allows them to keep their shoes and light-weight jackets on while going through the checkpoint. At LGA, select Delta Air Lines frequent flyers are now eligible to participate and may receive expedited screening benefits when traveling domestically. TSA Pre✓™ is part of the agency’s larger effort to implement risk-based security concepts that enhance security by focusing efforts on travelers about whom the agency knows less. To date, more than 640,000 passengers have experienced TSA Pre✓™. TSA Pre✓™ is now available in 12 airports for both American Airlines’ and Delta Air Lines’ frequent flyers. “It is important to understand that TSA Pre✓™, and risk-based security in general, does not mean less security – it means more focused security,” said TSA Deputy Administrator Gale Rossides. “Every passenger will still be screened, and TSA officers will still be looking for prohibited items, including in the TSA Pre✓™ lane. With risk-based security initiatives, we’re adjusting the screening procedures for those passengers that we know more about so that we can focus on finding that small fraction who may pose a threat. By doing so, we hope that everyone will have a better security experience.” Eligible passengers...

Words: 1933 - Pages: 8

Free Essay

Cyber Law

... TITLE OF THE PAPER: CYBER SPACE MASS SURVEILLANCE PROGRAMS,INFRINGEMENT OF PRIVACY OF INDIVIDUALS, BY STATE IN THE NAME OF NATIONAL SECURITY. ABSTRACT: In this present era of cyber revolution and globalization, citizens have turned into “Netizens”. The advancements in the field of technology is also accompanied with the development of various methods of surveillance and intervention by the State into individuals’ private information. Governments are keeping an eagle eye by monitoring individual's movements, businesses transactions and also the means of communication, which includes cyberspace. It is alleged that the United States of America’s National Security Agency runs a program known as PRISM, which enables the US government to gain access to e- mails , conversations, pictures, voice calls and even sign in details of people using websites and applications associated with 1|Page Facebook, Yahoo, Microsoft, to name a few. Failure of cyber law mechanisms and national authorities to advance legislation and frameworks along with the technological developments and the increasing trends on States’ surveillance practices has created an environment in which citizen’s right to privacy is easily violated, leading to human rights violations also and lack of accountability, which raises questions on the legitimacy of such act of state. This research paper will mainly be focusing on this issue of privacy...

Words: 6245 - Pages: 25