Premium Essay

Facebook Surveillance

In: Computers and Technology

Submitted By foss521
Words 285
Pages 2
Elizabeth Foss
“The Internet is a surveillance state”
Introduction to information systems security
March 28, 2013

With all the technology we have nowadays it’s hard not to become a part of the newest trends or the newest apps etc. This article is letting us know that no matter how careful we are, companies and even people that are involved with the law can see and track everything we do and search for. It’s hard to believe that people can have that much control into technology to literally see what everyone is doing. Whether your simply looking up clothing or doing something more private, its viewable and accessible. The author is trying to get the point across that even if you take the most extreme precautions with what you do on the internet, nothing is a secret anymore. Imagine going into a job interview and the person brings up something seen on your Facebook from 8 years ago, and it prevents you from getting the job. The author is trying to say exactly that. What you do on the internet whether its on your own personal device or on a public domain, can affect your life. People have lost their careers due to slip ups on the internet. How did technology become so advanced to where there is basically no privacy anymore? This article warns you that you are being tracked at all times. Smart phones have devices where you can be pinpointed to your exact location, which is a scary thought. Not only does it make people not feel safe, it makes you wonder how many companies and people have looked at your own personal information and tracked your every move on the

Similar Documents

Premium Essay

Big Brother Privacy

...Big Brother is Real and Active in Our Lives George Orwell’s novel, 1984, speaks of a world where an all-powerful dictator named Big Brother eliminates personal freedom and thought. There is much argument about whether or not the world in his novel ties in with our own world. Do we have enough privacy or are we constantly under surveillance? The argument on personal privacy is far from a new debate. Some people argue that the government has too much access to what we do, while others say that the government’s intrusion is fine. In our age, the digital age, everything is online and private information is available to the government. The so called “Big Brother”, or, our government and algorithms, is watching over US citizens in illegal and inappropriate ways. Private companies like Facebook or Google have access to what one searches on those sites, but the video “What Google and Facebook Are Hiding” demonstrates how those sites save and...

Words: 740 - Pages: 3

Premium Essay

Persuasive Essay On The Fourth Amendment

...Your phone can be watched at all times, even when it’s not turned on, and they can take anything that they want off of it (Schlesinger.) This issue is why the fourth amendment was created in the first place and clearly states that all personal information cannot be accessed without a warrant. The way the government gets away with this is through, “Section 702 of the Foreign Intelligence Surveillance Act.” This act makes it to where the government can spy on us without our knowledge unless it involves legal reasons like the case of a criminal. Then, once people are found guilty of something and taken to trial, it is almost impossible to win the case without evidence that you were spied on by the government (Diakun). Also, nine out of ten accounts in around 160,000 communications using section 702 were found to not be of the main goal which was targeting surveillance, therefore meaning that random and innocent people’s information was breached (Greene). Perhaps if we were informed of these invasions, and if it wasn’t kept hidden from us then maybe their reasons for it could be more...

Words: 915 - Pages: 4

Premium Essay

Corporate Surveillance

...Surveillance, of one form or another, has always been an active part of society. Surveillance is regarded as a way to monitor social activity of a virtual or physical nature with the aims of ensuring safety and stability for those who can be directly or indirectly impacted by what is occurring. The emergence of the Internet and other technologies has made surveillance more of an asset rather than just a vehicle of ensuring safety and protection. Media and internet companies have created platforms that maximize the exploitation endured by the user, with the objective of successfully capitalizing on the information being obtained. More many companies, the primary objective of social exploitation and surveillance is to increase their bottom line...

Words: 732 - Pages: 3

Premium Essay

Hmls

...identification of terrorist suspects must be debated and understood before going forwarded to ensure due process for privacy concerns. They may have to be an understanding or “give-and-take. (Jenkins, 2012) Many of our security vs. privacy concerns stem from processes implemented after 9/11 for ensuring the United States was more prepared to detect and combat terrorist activities. Of course immediately after, many disagreed and argued that a balance between states security and civil liberty has to be maintained. Additionally, there was (and still is) a considerable requirement for the United States government to collect, process, and understand large amounts of video surveillance, biometrics, and Private Personal Information (PPI) in our efforts in combating terrorist activities. With respect to video surveillance (specifically in public areas), in the last 15 years, security/video cameras have been installed in major cities with the...

Words: 1231 - Pages: 5

Premium Essay

Mcluhan Tetrad

...and limits political messages. Using McLuhan’s tetrad, this study examines how the internet is problematic for cop-watching groups. In particular, the internet is said to yield consequences through how it (1) enhances or intensifies how the viewer experiences political messages through speed, (2) retrieves the importance of the narrator, (3) renders previous media increasingly obsolete, yet opens up new avenues for commercial dominance, and (4) creates additional reversals or other problems for video activism, such as the mass proliferation of surveillance and formatting discussion in counter-productive ways. Introduction Take a look at the lawman, beating up the wrong guy, Oh man! Wonder if he’ll ever know, He’s in the bestselling show. —David Bowie, Life on Mars Accelerated technological growth and the proliferation of surveillance equipment has allowed for a significant increase in the breadth and power of surveillance assemblages. Despite authorities seeking to maintain control over...

Words: 9922 - Pages: 40

Free Essay

Is the Government Justified in Involving Itself in the Private Lives of Citizens?

...that government should not spy on its own citizens and make decisions for them. This was actually the philosophy that the nation was based off, the Americans were tired of the British government controlling their lives, so they broke free and found the United States of America. But in today’s technologically advancing information age, the question is severely complicated with inventions like the Global Positions System, the World Wide Web, computer chips, the cellular telephone, etc. Of course, there are laws to regulate surveillance on these devices, but the invention of new technologies is passing these laws. As complicated as the question gets, I believe that the government is justified to immerse itself into the private lives and decisions of its citizens for a multitude of reasons. First, government surveillance practices can save lives, put criminals behind bars, or even find missing people, which definitely warrants the need for cellular surveillance. Another example of this justification is that measures like pat downs, body scanners, luggage scanners, and security guards at airports may be inconvenient for the passengers seeking to get on the plane, but will greatly increase the preservation of live on commercial aircraft. The last example to support this argument is in Ender’s Game. Ender had finally realized that the administrators and staff at Battle School controlled...

Words: 1737 - Pages: 7

Premium Essay

Information Age & Information Privacy

...INFORMATION AGE AND INFORMATION PRIVACY UNIVERISTY OF MARYLAND UNIVERSITY COLLEGE 5 AUGUST 2011 | An estimated 35 million people use e-mail – either via their company’s computers or on paid networks. Unlike telephone calls, which by law are private because the phone lines are considered common carriers, a company owns its computer network and all the data in it. Seemingly, private email has been used against employees in everything from sexual harassment cases to charge of trade secret theft. Even employees who carefully delete their email cannot escape cyber-investigators who can hunt through a computer’s backup system to find just about anything ever stored in a computer. That is to say, the use of email is like having a video camera consistently running. Information Privacy can be defined as the relationship between collection and dissemination of the information. There is no doubt that there is a public expectation of privacy, however, the term itself has legal and political issues surrounding it. Information Privacy affects our personal and professional life. With the invention of the personal computer in 1970 and the internet reaching a critical mass in 1990, and the adoption of this technology three decades later, we society catapulted into what is known as the “Information Age”. The “Information Age” has allowed global network communication and shaped our modern society. With so many advancements in technology and the reliability of computers in our...

Words: 1364 - Pages: 6

Premium Essay

Leg500

...Electronic Surveillance of Employees Flor Leticia Rivera-Michel Strayer University LEG 500 Law, Ethics, and Corporate Governance Niki Wilson January 25, 2011 1. - Explain Where an Employee Can Reasonably Expect to have Privacy in the Workplace. In this modern world is difficult to determine where our private life begins and ends and where our work life start, through the years we have seen how employees sometimes take advantage of the resources available to them in their workplace and use them for personal gain, this has led the company to have better control of the activities performed during employee work hours, such as phone calls and internet use. Employees are accustomed to using the technology made available in the workplace for purposes other than job duties. Although generally discouraged by employers, checking news headlines, doing some on on-line shopping, sending personal e-mails, or socializing on Facebook while at work are everyday occurrences. Many still feel as though these actions go unnoticed by employers and assume, incorrectly, that their activities remain private. (Communications of the IIMA, 2005) In my point of view our personal life had to be limited during of work hours, its notorious that some personal calls are necessaries, but we have to avoid abuses, “If you have nothing to hide, you have nothing to fear”, if we are no abusing the companies resources available for us, we won’t be afraid of being monitored. The privacy employee...

Words: 1248 - Pages: 5

Premium Essay

Privacy Actions

... | Executive Summary According to a 2009 survey conducted by American Management Association (AMA), the top two reasons employers provided for monitoring their employees were performance evaluation and quality control. Workplace monitoring may sound wrong, but it provides many benefits to an organization and its staff members, such as lower operating costs and high production rates. However, in the process of monitoring employees, employees’ privacy rights are violated mainly through computer monitoring, telephone monitoring and background checks. Productivity is one of the main reasons cited by employers for introducing electronic surveillance and employee testing to the workplace. Employers believe that corporate survival demands continuous improvements in employee productivity. Errors, poor products, and slow service hurt business. Therefore, monitoring and testing to identify and correct these problems are considered to be sound management practices (Wright). However, the following will analyze privacy in the workplace from an ethical point of view using three workable theories: Kantianism, Act Utilitarianism, and Social Contract Theory. Privacy...

Words: 3902 - Pages: 16

Premium Essay

Apple Inc

...Apple Inc.’s Security Risks and Protections Provided to Their Customer’s Privacy Apple Inc.’s Security Risks and Protections Provided to Their Customer’s Privacy Apple Inc. is one of the leading innovators in today’s technology market. They have 424 stores across the globe, with 255 of those store being in the United States. Apple is expanding globally, as they announced plans to triple the number of stores in China within the next two years (Cheng, 2014). With Apple’s most popular products being the iPhone, iPad, and personal computers, one of Apple’s major concerns is the adequate protection of their customer’s private information. With major security breaches at large companies such as Target and Home Depot that have occurred within the last year, many companies are trying to strengthen their security measures to make sure they are not vulnerable to a security breach. In the last couple of years Apple Inc. has worked hard to provide the best possible protection to their customers, as they are continuously working to keep their security at a high level. Discussion Apple is not a stranger to security threats and infectious malware. Apple’s first major malware infection occurred just two years ago, in 2012, when over 600,000 Macs were infected with the Flashback botnet trojan malware. Flashback is a type of malware that targets flaws in Java. About half of the computers that were infected were in the United States, while there was also a large number in Canada, the United...

Words: 1230 - Pages: 5

Premium Essay

Privacy Endangerment with the Use of Data Mining

...identifiable information provided by individuals through the use of Internet services such as: social media networks, email, and other networks that contain data bases full of personal information. If such data retrieval if not done careful, it can cause ethical issues for the companies that are involved. The ethical issues related to data mining are violation of privacy, confidentiality, and respect of persons’ rights. Issues that required the immediate attention regarding data mining are: What stops corporations from sharing personal identifiable information with other companies?; How effectively and ethically data mining is use by the government?; Is our privacy and confidentiality truly protected? Social network companies such as Facebook, Twitter, and Google provide users agreements upon joining their services. These agreements underline how the information provided by the user will be utilize by the company and it allows the user to understand how to protect their personal identifiable information while utilizing these social network sites. These companies pride themselves in protecting users’ personal information. However, what happens when the company or an unethical company employee violates these agreements? Personal identifiable information is then released to use as it pleases by the company or the individual that obtains access to this personal information illegally. On “January 19, 2006, when the Department of Justice subpoenaed Google, Microsoft, Yahoo...

Words: 1027 - Pages: 5

Premium Essay

E-Cigarette

...negative influences can potentially plague your children. You can safeguard your family from unseemly and damaging connections by using computer monitoring software. Most monitoring applications offer a multiplicity of protections and a variety of tools. Our researchers tested and ranked monitoring tools to bring you an objective comparison of the best computer tracking software. Our top three products are SpyAgent, WebWatcher and PC Pandora. Read our articles on monitoring software to learn more about computer monitoring tools. Monitoring Good monitoring software includes tools to record all website visits and online searches. The software should have the ability to detect when a computer user accesses social networking websites such as Facebook and Twitter or views online pornography. Some monitoring applications can capture blog posts, usernames and even passwords. Recording the transcripts of conversations that occur via chat and instant messaging clients is a frequently sought-after feature. Additional elements to consider are tracking file downloads, sent and received emails, web-based email and email attachments Tracking features may include recording the applications users launch as well as the duration and frequency of use. These components can...

Words: 5031 - Pages: 21

Free Essay

Privacy and Technolgy

...People’s pace of life is increasingly fast. Numerous people depend on modern technology for work and entertainment because it is more efficient. For instance, Facebook is the most popular social network website in the world, but use of Facebook is becoming a controversial issue as it has potential hazards that threaten users’ privacy. Facebook is a great innovation since it makes people easily contact friends and families, but when users upload their personal information on profile pages, their privacy may be confirmed by strangers. Nevertheless, some people believe that users’ privacy can be protected with technological tools. Although some technology experts claim that companies can protect users’ personal information, modern technology is an invasion of privacy. Using modern technology allows other people to track users’ movements, so it invades people’s privacy. GPS devices can reveal users’ physical location information to others. Leah Yamshon, the author of “Mobile Apps Can Compromise Your Privacy” suggests that if people use GPS technology without sufficient understanding of the system, their movements may be easily tracked by other people (par. 1). Using GPS devices without controlling data transition processes may let other people easily know users’ location, yet most consumers do not know how to control data transition processes. Dishonest people can also steal users’ location information though smart phone applications. Patrick Leahy, the chairman of Senate Judiciary...

Words: 1368 - Pages: 6

Premium Essay

Persuasive Essay: The Right To Privacy?

...Currently, Britain is thought to be a ‘surveillance society’ by using technology to monitor the actions of the population by using more than 6 million CCTV cameras (Daily Mail, 2016). In support of mass surveillance, the ‘if you have nothing to hide, then you have nothing to fear’ argument is used commonly against privacy advocates. However, there are those that have discredited this claim and argue against it. In this essay, arguments will be made to explain why I disagree with the statement ‘if you have nothing to hide, then you have nothing to fear from surveillance’. This will be done by exploring the right to privacy, the problem with not knowing...

Words: 1130 - Pages: 5

Premium Essay

Has the Increased Proliferation of It in Our Society Changed the Way We View and Value Our Perceptions of Privacy

...to the common good and the erosion of individual privacy is further accelerated” (Caloyannides, M 2003, Privacy vs. Information Technology, p. 100). Privacy concerns are not only a recent issue however with the ever increasing amount of information technology in our lives the topic has exploded and mutated into an ongoing debate between governments, social networking giants, corporations and privates individuals. With a slowdown of Information technology not looking likely in the foreseeable future will it be a case of “in 20 years’ time, will there be any privacy to protect?” (The surveillance society 1999, p.21). This essay will argue the point that while information technology in our society has created a more productive and social one, it has certainly altered our perception of privacy. I have focused on three areas (Social Network and online communities, E-Commerce and Video surveillance or CCTV) of information technology where I believe privacy is overlooked due to inundation and social acceptance. I believe in the informational world we currently live in there is an enormous ‘privacy importance’ gap between generations “What matters in the realm of privacy may be generationally coloured” (McCreary, L, What was Privacy 2008, p. 128). For the purpose of this essay I...

Words: 1886 - Pages: 8