Free Essay

On-Line Privacy: Intrusion Between Children and Parents

In:

Submitted By SGL1974
Words 1564
Pages 7
Shawanda Lamb
Professor Morgan
REL 330 Christian Morality
21 October 2010
On-line Privacy: Intrusion Between Children and Parents In today’s society the technology is impeccably innovating and eye catching, especially when it comes to cell phones and computers. It seems like no-one does nothing but text, e-mail, and stay in chat rooms on MySpace, Twitter and Facebook cites. It is hardly imaginable to allow children on the computer without filters, monitors, and supervision. But when does it become a privacy issue between children and their parents? Teens are often exposed to potential privacy risks online due to marketing platforms like some of the names mentioned above. Another issue to deal with is on-line sexual predators and pedophiles that are on the loose, targeting children on the computer had and still is an issue in today’s modern society. When does it stop? Will it ever? Where are the moral values? Will parents take a stand for what is right for the children even if a teenager believes that they are being protected because they used false information in their profile? When we define the word intrusion it means: an illegal act of entering, seizing, or taking possession of another's property. I’m sorry, but as a parent I believe my children don’t own anything they don’t have the right to say I can take you to court mom for taking my computer, regardless if you earned it with allowance given by your parents. Some children seem to believe that their privacy is invaded when parents block certain websites from them or if their computer gets taken away from them even if they are on punishment. According to an on-line survey on business weeks website says: Three of four parents don't believe social networks are doing a good enough job of protecting the privacy of their children who use those networks, according to a new survey by Common Sense Media, a nonprofit group that focuses on how media and technology affect families. The study also found that 92 percent of parents are concerned their children share too much information about themselves online. A related survey of teenagers, meanwhile, found that 79 percent feel their friends share too much information about themselves, and 85 percent believe search engines and social networks should have to get their permission before they use personal information about them to market products to them via advertising. Now looking at these survey numbers they are very high but why do we blame the social networks. They can only do so much even with the children’s on-line privacy protection act in place. This is truly where parents must take responsibility for their children. I enjoyed reading a comment from a reader in response to this article that said: That is correct they don't PARENTS keep their kids safe. It's like allowing your child go to the mall to hangput with their friends and then expect the mall to take care of your child. Mall security will stop something if they see it happening other then that, it is up to the parent to police their own. People think that because these social gatherings occur online it's different then them going out, it's not. Parents need to be parents regardless the outlet in which their kids meet other kids (businessweek.com). This is where we as humanity must focus on being responsible for our own, because children will do what they want to do if rules are not enforced by their parents. Some children are nieve, gullible and feel that it is ok to give out information about them because they think that predators don’t know where they live or cannot tap into their computer to stalk them. There are so many cases alone that don’t always end up with a happy ending. As we all know the internet is a haven for sexual predators all they have to do is log on to a chat site and pretend to be a so called teenager. According to the Online Victimization Research carried out by NCMEC (2000), “one in five children who use chat rooms have been approached over the internet by pedophiles” (Ingram, Parents Say Social Networks Don’t Protect Children’s Privacy” ). Social networks are another target to get teens involved with . I personally do not have any of these social networks like MySpace; I only have an e-mail account. Now my spouse has just recently signed up and I was astonished to see how quickly how a network of people responded to his account, the snowball effect was outrageous so I can imagine the same with teenagers. When we look at these issues morally what we take in account is that we as humanity have a responsibility and we must be accountable for issues that may arise culturally. What seemed so unfamiliar decades ago is now just a click away, because then, we did not have the technology that we have today to occupy the fancy of children’s play or quite time. An article on-line from techliberations.com stated that: Concerns about the harmful effects of popular culture on children and young people have a very long history, dating back well before electronic technology. These concerns reflect much more general anxieties about the future direction of society; but, as several studies have shown, they can also be inflamed and manipulated by those with much broader political, moral or religious motivations. These concerns occasionally reach the level of a ‘moral panic’, in which particular social groups and practices are publicly demonised – often on the basis of what are ultimately found to be quite spurious accusations. Perhaps paradoxically, such stories also play well in the media themselves, often receiving extensive and highly sensational coverage. (p. 25).
If we were to understand ethics and morals on a spiritual level, I think that we would come to terms that these issues in today’s cultural society lack much responsibility when it comes to families. Is society responsible for what children do even if it is wrong or right? I believe society has influence on our children but not to the point where we totally blame them. When God created man he allowed a woman to bear children, so who has to protect and teach them values and morals of this unforgiving world we live in? With that said, in the passages of the Pastoral Constitution on the Church in the Modern World Gaudium Et Spes 49-60 speaks about the proper development in culture and in section 1 it talks about the circumstances of culture in the world today. What I found interesting was how it said in passage 55 that: ” we are witnesses of the birth of a new humanism, one in which man is defined first of all by this responsibility to his brothers and to history” (John XXIII, 1963). If we are to be responsible for our brother or neighbor than when it comes to our children there should never be an exception. Another passage asks: How is the dynamism and expansion of a new culture to be fostered without losing a living fidelity to the heritage of tradition. This question is of particular urgency when a culture which arises from the enormous progress of science and technology must be harmonized with a culture nourished by classical studies according to various traditions (John XXIII, 1963).
Now days people try to step away from the traditional way or methods in how we live accordingly to society and culturally but how can we be nourished by classical studies with the rise of innovating technology companies that is ever evolving for their own purpose? In conclusion of all this we, as humanity must understand that when it comes to responsibility and safety for our children no-matter what social issues we may encounter, we must take a stand in protecting them even if our children hate us for a day because the computer got taken away. As a parent I take this topic seriously due to the fact that I may have to deal with this in just a matter of time. But a solution to this is to not just limit internet access as a recess or play time session all the time but to get more involved physically with the children and find other ways to stimulate their mind. Because you will find kids communicating more on a social network than communicating with the one protector and that is… the parent.

References
Dictionary.com. 2010. 10 Oct. 2010. http://dictionary.reference.com/browse/intrusion
Ingram, Mathew. “Parents Say Social Networks Don’t Protect Children’s Privacy.” Business Week. 10 Oct. 2010. 12 Oct. 2010. Parents Say Social Networks Don't Protect Children's Privacy - BusinessWeek
John XXIII, Pacem in Terris (Peace on Earth) April 1963. http://www.vatican.va/archive/hist_councils/ii_vatican_council/documents/vat-ii_cons_19651207_gaudium-et-spes_en.html
Thierer, Adam . “Kids, Media, Commercialism & Moral Panic.” Technology Liberation. 7 June 2010. 10 Oct. 2010. http://techliberation.com/2010/06/07/kids-media-commercialism-moral-panic/.
Youn, Seounmi. “Parental Influence and Teens’ Attitude Toward Online Privacy Protection.” Technology News Red Orbit. 2 Oct. 2008. 10 Oct. 2010. Parental Influence and Teens' Attitude Toward Online Privacy Protection -Technology News - redOrbit

Similar Documents

Premium Essay

Privacy

...Are Law Enforcement Cameras an Invasion of Privacy? Are law enforcement and government cameras become a real threat to our privacy? In today's society, we've become accustomed to being tracked; complacent really. Many can't decide if this is a legitimate way to keep us secure, or just another move by the government to gain control. We are monitored with traffic cameras, police dashboard and body cameras, location services on our cell phones and store security cameras. How much is too much? Are we even aware of all the things that we encounter every day that are able to track our every move? Good questions. What will be your paper’s answer? The line is a thin one, that line between privacy and feeling as though we're in a fish bowl with people watching our every move. I think that TV shows such as "Person of Interest" that highlight a government system called "The Machine" which uses facial recognition and social security database information to warn the good guys of who is in danger based on a series of data information it compiled to determine their risk rating based on movements of both the target and the aggressor. While I believe this show only proves to ramp up the paranoid to believe that we live in a society where you're tracked and monitored every step of your day. Some people live with the belief that the police and government agencies truly are watching our every move, even in our own homes. And are they? What does the research say? While a little far fetched...

Words: 1169 - Pages: 5

Premium Essay

Impact of Alcohol Act

...Hospitality Industry The hospitality industry is a broad category of fields within the service industry that includes lodging, hotels, event planning, theme parks, transportation, cruise line, and additional fields within the tourism industry. In all these entertainment areas goes well with a drink both non-alcohol and alcohol. The hospitality industry has a variety of legislation which applies ranging from protection for employers, employees and customers to hygiene, safety and the environment. Legislation can either be State legislation (applicable only in the relevant state) or Commonwealth legislation (applicable globally to common wealth countries). Alcoholic Drinks Control Act 2010 The Act stipulates the interaction between alcoholic drinks and their producers, distributors, marketers, retailers, consumers and their significant others. The overriding theme throughout the Act is the desire to minimize the harm occasioned to individual Kenyans in the course of their interaction with alcohol. The Act has provided opportunity to discard the negative view associated with the alcohol industry – as responsible for the harmful effects of alcohol consumption ranging from failing health to diminished productivity, social disharmony, HIV and STI infections, traffic accidents, and death. For instance, between April and August 2010, more than 45 people lost their lives while many others were blinded following consumption of adulterated alcohol in various parts of the country. Provisions...

Words: 1216 - Pages: 5

Premium Essay

Ethics in Marketing Research

...some suppliers include abusing respondents, selling unnecessary research, and violating client include requesting bids when a supplier has been predetermined, requesting bids gain to free advice methodology, marketing false promises, and issuing unauthorized requests for proposals. Marketing research field services have used professional respondents, which I unethical. Respondents have certain rights, including the rights to choose whether to participate in a marketing research project, the right to safety from physical and psychological harm, and the right to be informed of all aspects of the research task. They should know what is involved, how long it will take, and what will be done with the data. Respondents also have the right to privacy. Research Suppliers Ethics Unethical research supplier practices range from low-ball pricing to violating client confidentiality Low-Ball Pricing a research supplier should quote a firm price based on a specific incidence rate (Percentage of the respondents in the sample that will qualify to complete the...

Words: 2541 - Pages: 11

Free Essay

Constitutional Distortion

...important and mostly left unanswered. The research shows a major dividing line between literal interpretation of the fourth amendment, and the government’s insistence on distorting the constitution, vital to ensureing our national security. Inland immigration checkpoints provide a vital role in ensuring the safety of the United States. Their existence although a minor inconvenience to many motorists, is crucial in stopping the trafficking of drugs and illegal immigration. The U.S. Border Patrol, a component of the U.S. Customs and Border Protection (CBP) agency, a part of the Department of Homeland Security (DHS), aims to apprehend persons who illegally enter the United States between official ports of entry, including potential terrorists, aliens, and contraband smugglers, thereby deterring or stopping illegal activity.(DHS 2012). The Supreme Court first approved of law enforcement roadblocks in a case involving the Border Patrol’s practice of stopping traffic on major highways to prevent the trafficking of illegal aliens. (U.S. v. Martinez-Fuerte). The Court also first introduced the idea of a balancing test for roadblocks here. The Court found that the federal government had a strong interest in securing the nation’s borders, that the roadblock was an effective way to determine whether vehicles contained illegal immigrants, and that the roadblock was neither excessively intrusive on privacy rights nor disruptive of traffic flows. Today the Border Patrol uses a set...

Words: 1213 - Pages: 5

Premium Essay

Adas

...abortion has always been a world-renowned issue that is highly debated among the government, the liberals and the conservatives. The battle between choosing order or freedom has been a question that many cannot answer as the pros and cons in this issue are at an equal balance. An individual’s moral and religious view are questioned when it comes to this issue as well as a women’s right to choose. The two groups that come into play in this issue is those who supports the pro-life movement and those who supports the pro-choice movement. The pro-life movement is against abortion because they believe that the unborn child has to right to choose whether to be born and the mother does not have the right to terminate a life. The pro-choice movement supports abortion because they believe that a mother should be given the right to choose whether or not to bring a life into this world. Whatever the reason it may be for an individual to choose between being against and supporting abortion, the decision to ban abortion is in the hands of the government. Following the Roe vs Wade case in 1973, a decision was made and the Supreme Court ruled that women are given the right for an abortion and this includes the right to privacy during her decision making period. Even though the court ruled to legalize abortion under certain circumstances, the debate between whether the US government should ban the abortion completely is still being...

Words: 2167 - Pages: 9

Premium Essay

Internet Security

...Internet Security. Abstract Online users today are faced with multitude of problems and issues. A typical online user is vulnerable to virus, worms, bugs, Trojan horses etc.; he/she is also exposed to sniffers, spoofing their private sessions; and they are also vulnerable to phishing of financial information. Not only this but users are also constantly subjected to invasion of privacy with the multitude of spy ware available for monitoring their surfing behaviours. If this is not all, users are also subjected to malwares that stop or totally destroy their machines render them helpless. These instances only indicate that the Internet is not a safe place for online users. Users are constantly vulnerable to hacked sessions, attacks and phishes that make them wary of going online. However, the trend does not stop at that. In fact corporations and government sector organizations are also faced with the same problems. Corporate information are being hacked; emails are read; government secret information are subject to security risks and banks are being hacked and millions stolen. Some of the reasons behind such attacks include the weaknesses inherent in the networks of the companies and government organizations; other reasons include carelessness of users. Whichever the case internet security issues have become one of the major concerns for technologists and users alike. There is a great need for understanding the nature of the attacks, the attackers, the networks, the loop holes...

Words: 10693 - Pages: 43

Premium Essay

The Stamp Act Crisis

...The Revolutionary Period was the political, social, and economic turmoil in the Atlantic world. The Revolutionary era was the catalyst for the birth of dissent ideologies, radical literature, protests and boycotts (Dennis Lecture Notes). The Seven Years war had a negative economic domino effect on the colonies. Debt from the war on American soil consisted of various increases on tariffs and taxes in order to pay the debt left by The Seven Years war (Dennis Lecture notes).Tensions brewed between the colonies and the British crown due to unpopular taxes such as the tea, sugar and stamp act (Dennis Lecture notes). The Stamp Act crisis inaugurated not only a struggle for colonial liberty in relation to Great Britain but also a multisided battle...

Words: 1351 - Pages: 6

Premium Essay

Internet Privacy Policy Violations and Regulations. Social Media Context.

...WARSAW SCHOOL OF ECONOMICS Internet privacy policy: violations and regulations. Social media context Natalia Wójcik Index number: 51149 1 TABLE OF CONTENT 1. Introduction………………………………………………………………………….3 2. Theoretical background…………………………………………………………...4 3. E-commerce and e-marketing influence on privacy violations…………….5 4. Social networking, Web 2.0……………………………………………………….7 5. Social media privacy policy………………………………………………………8 6. Privacy policy concerns based on a particular social media example….13 7. Process of implementation of social networking regulations…………….17 8. Conclusions and final remarks…………………………………………………22 9. Bibliography………………………………………………………………………..24 2 1.INTRODUCTION Throughout the last 20 years the role of the Internet has grown enormously is every individual’s life. The Internet has its roots in 1960, when the US government attempted to build robust, fault-tolerant and distributed computer networks. However, the beginning of the worldwide process of Internet expansion may be dated to 1980 and was triggered by the development of new networking technologies and mergers of many less significant networks with the financial support of the National Science Foundation and other private commercial funding. This led to further advancement in technological improvements and their incorporations as well as wider participation of ordinary users all over the world. The Web rapid expansion reaches back to the 90’. According to the Internet World Stats:...

Words: 6024 - Pages: 25

Free Essay

Risk Mitigation-Ymca

...Contents Introduction 1 Legal risks 1 Evaluation 1 Children/Members 2 Children 2 Camp Activities 2 Peer Assault 3 Staff / Operations 3 Workplace Violence and Harassment 3 Procurement and Operations 4 Privacy Breach 5 Injuries 5 Slips and falls 5 Equipment Injuries 6 Swimming Pools 6 Vandalism and Theft 7 Disease and Contraction of Illness 8 Financial Coverage 8 Conclusion 8 Appendix 9 Exhibit 1: Cooper Koo Family YMCA Under Construction 9 Exhibit 2: YMCA’s Purpose 10 Exhibit 3: 10 Exhibit 4: 11 Bibliography 13 Introduction The Greater Toronto Area (GTA) YMCA has approved plans to convert the Pan Am Athletes’ Village located on Front and Cherry Street into the largest YMCA centre following the games in 2015.The 82,000 square feet “Cooper Koo Family YMCA” is expected to attract a diverse neighbourhood with an expected population increase of 13.5% by 2020.The green facility currently under construction will be equipped with a full gymnasium including exercise and fitness studios, as well as a swimming pool (Exhibit 1).Cooper Koo is to continue to promote the YMCA’s vision to build healthier communities and commit to the association’s guiding principles to remain ethical, accountable and proactive (Exhibit 2). As Risk Management Consultants in reviewing this project, we are taking the proactive approach to identify and assess the facility’s operational legal risks and to mitigate the major risk areas prior to a breach (Exhibit...

Words: 4397 - Pages: 18

Premium Essay

This Paper Provides an Overview of the Growing Cybercrime Problem and Reviews Two Criminological Theories That Have Been Applied to the Study of Cybercrime and Cybercrime Victimization. Legislation Which Defines

...An Examination of Cybercrime and Cybercrime Research: Self-control and Routine Activity Theory Katherine M. Grzybowski Arizona State University 1 March 2012 Cybercrime 1 TABLE OF CONTENTS 1. ABSTRACT .....................................................................................................3 2. INTRODUCTION...........................................................................................4 3. A REVIEW OF CYBERCRIME ...................................................................6 3.1 Cybercrime Legislation ............................................................................7 3.1.1 3.1.2 Federal Laws .................................................................................7 State Laws ......................................................................................9 3.2 Cybercrime Law Enforcement Agencies ................................................11 3.3 Classifying Cybercrime ............................................................................16 3.4 National Levels of Cybercrime ................................................................19 3.4.1 3.4.2 Business Cyber Victimization ......................................................20 Individual Cyber Victimization ...................................................22 4. A REVIEW OF THEORIES..........................................................................26 4.1 Self-control Theory ...................................................................

Words: 13816 - Pages: 56

Free Essay

Surveillance in Schools

...Surveillance Surveillance in Schools: Safety vs. Personal Privacy A project created by Kathy Davis, John Kelsey, Dia Langellier, Misty Mapes, and Jeff Rosendahl Project Home Security Cameras Metal Detectors Locker Searches Internet Tracking “Surveillance…n. close observation, esp. of a suspected person” [emphasis added] --Reader’s Digest Oxford Complete Wordfinder, 1996 In 1995, “The total number of crimes committed per year in or near the 85,000 U.S. public schools has been estimated at around 3 million” (Volokh & Snell, 1998). Our educational system is evolving all the time, and one factor that is constantly changing is the aggressiveness within our schools. In 1940, a survey of teachers revealed that the biggest behavioral problems they had from students were “talking out of turn, chewing gum, making noise, running in the halls, cutting in line, [violating] the dress code, [and] littering” (Volokh & Snell, 1998). In 1990, the toprated problems were “drug abuse, alcohol abuse, pregnancy, suicide, rape, robbery, [and] assault” (Volokh & Snell, 1998). In 1940, we had little need for surveillance beyond a teacher’s observation and intervention. Today, however, we live in a much more diverse society with troubled youth and adults who have easy access to weapons, drugs, pornography, etc., which have enabled students and staff to bring their violent and/or inappropriate tendencies into the naïve schools. What worked in 1940 (teacher-student confrontation) is not as realistic...

Words: 17490 - Pages: 70

Premium Essay

Cyber Crime

...An Examination of Cybercrime and Cybercrime Research: Self-control and Routine Activity Theory Katherine M. Grzybowski Arizona State University 1 March 2012 Cybercrime 1 TABLE OF CONTENTS 1. ABSTRACT .....................................................................................................3 2. INTRODUCTION...........................................................................................4 3. A REVIEW OF CYBERCRIME ...................................................................6 3.1 Cybercrime Legislation ............................................................................7 3.1.1 Federal Laws .................................................................................7 3.1.2 State Laws ......................................................................................9 3.2 Cybercrime Law Enforcement Agencies ................................................11 3.3 Classifying Cybercrime ............................................................................16 3.4 National Levels of Cybercrime ................................................................19 3.4.1 Business Cyber Victimization ......................................................20 3.4.2 Individual Cyber Victimization ...................................................22 4. A REVIEW OF THEORIES..........................................................................26 4.1 Self-control Theory ....................................

Words: 13816 - Pages: 56

Premium Essay

Mavis Family

...“instant family”  Lack of information regarding relationship between Mavis with mother and siblings: assumed none  Lack of information regarding relationship between John with father: assumed none  Lack of information regarding relationship between April and biological father: assumed none PYC 4808 Assignment 03 Student 3350-133-5 August 2013 Fiure: Authors own Case Study: Bird Family Pg2 2. Eco map: Bird Family in ContextNotes on Map:  Size of Icon determined by significance of relationship/influence to client  Absence of arrows where direction of influence is uncertain  Spheres of influence outside of family is assumed  Lack of information regarding the interconnection between the two families of origin  Lack of information regarding relationship between April and biological father: assumed none PYC 4808 Assignment 03 Student 3350-133-5 August 2013 Figure: Authors own Case Study: Bird Family Pg3 3. Perspectives:a. Perspective of each family member: Mavis Bird: Mavis Bird grew up in what appears to have been an unstable home. Mavis has two older siblings that wereremoved from the family home and placed in foster care. It would appear that they were not kept in contact. Mavis’s younger broth er was also diagnosed as schizophrenic which would have added to the chaotic homeenvironment.After her parent divorce, when she was five, Mavis’ mother did not get custody of the children. It is unclearwhether...

Words: 3393 - Pages: 14

Premium Essay

Price Discrimination

...Privacy, Economics, and Price Discrimination on the Internet [Extended Abstract] Andrew Odlyzko Digital Technology Center, University of Minnesota 499 Walter Library, 117 Pleasant St. SE Minneapolis, MN 55455, USA odlyzko@umn.edu http://www.dtc.umn.edu/∼odlyzko Revised version, July 27, 2003 Abstract. The rapid erosion of privacy poses numerous puzzles. Why is it occurring, and why do people care about it? This paper proposes an explanation for many of these puzzles in terms of the increasing importance of price discrimination. Privacy appears to be declining largely in order to facilitate differential pricing, which offers greater social and economic gains than auctions or shopping agents. The thesis of this paper is that what really motivates commercial organizations (even though they often do not realize it clearly themselves) is the growing incentive to price discriminate, coupled with the increasing ability to price discriminate. It is the same incentive that has led to the airline yield management system, with a complex and constantly changing array of prices. It is also the same incentive that led railroads to invent a variety of price and quality differentiation schemes in the 19th century. Privacy intrusions serve to provide the information that allows sellers to determine buyers’ willingness to pay. They also allow monitoring of usage, to ensure that arbitrage is not used to bypass discriminatory pricing. Economically, price discrimination is usually regarded as desirable...

Words: 11710 - Pages: 47

Free Essay

Parents Negligence

.................................................................................................. 956 I. SCULPTING, SHAPING, AND SIZING CHILDREN: FOCUS CASES.............................. 959 A. WESTERNIZING ASIAN EYES..................................................................... 960 B. HORMONES FOR STATURE ........................................................................ 961 C. LIPOSUCTION ON A TWELVE YEAR OLD.................................................... 963 D. GROWTH STUNTING ................................................................................. 964 II. THE LAW, MEDICINE, PARENTAL RIGHTS, AND CHILDREN’S BODIES ................. 966 A. BACKGROUND LAW ................................................................................. 966 B. APPLICATION IN SHAPING CASES .............................................................. 969 C. ROOM FOR REGULATION .......................................................................... 971 III. WHAT IS REALLY WRONG WITH MEDICAL AND SURGICAL SHAPING OF CHILDREN? ............................................................................................................ 973 A. THE NONSUBORDINATION PRINCIPLE AS A LIMIT ON INDIVIDUAL RIGHTS 974 B. CHILDREN AS PERSONS, PARENTAL RIGHTS ............................................. 977 C. MEDICAL AND SURGICAL SHAPING OF CHILDREN IS DIFFERENT ............... 981 IV. CONCERNING THE CHILD: ANOTHER VIEW OF PARENTHOOD ........................... 985 A. ALTERNATIVE MODELS...

Words: 28185 - Pages: 113