Free Essay

Technology and Privacy

In:

Submitted By nikol2477
Words 1852
Pages 8
Running head: TECHNOLOGY AND PRIVACY 1

Technology and Privacy Shawna Greiner SOC 120 Jenna Soard April 22, 2012

Technology 2 There was not such a thing known of as technology back in the beginning of time, but now technology has become the biggest thing used; it is so powerful throughout the world, that it is the number one thing used for just about everything in our everyday life. People have to have technology at a majority of their jobs in order to complete their tasks, Hospitals have to have it in order to take care of people and most of all keep track of files and records of people, government offices are the biggest one to have the technology that keeps all or a majority of information about every single human being that has lived. Another big technology that is done, but has been taken out of proportion is the internet and privacy. People that want to steal, take advantage of another person’s personal information, whether their social security number, physical address, work and income information along with credit, and bank accounts, then it is used to the person stealing it for their own advantage which later destroys the victim a lot of times. Technology has advanced to our own freedom, but it has also caused an unparalleled invasion of people’s privacy. Cell phones are so handy for using calling, chatting, GPS, email, internet, and more, but they are most certainly used for the federal people to find you wherever you are. The law has yet to catch up to our expectations of and need for privacy, even the new government initiatives and laws have severely undermined our rights in recent years. It is like the invasion of different things has taken such power and control over our society that the government cannot even control nor keep up with what is happening, which is where more trouble comes into the picture year by year. Ever since the September 11 attack on the trade centers in New York, security has become so tight and stricken that in airports today you have to take your shoes and socks off along
Technology 3 everything that is metal along with things being taken out of your pockets, even going through those body scanners, which invades your body privacy for there has even been cases where workers were taking advantage of making someone go through the scanner over and over just to look at the woman’s body, which is wrong. In main city, government buildings, you have to go through scanners along with the similar processes at airports. Even more biometric technologies are being developed since the 9-11 terrorist attack, finger prints being used in databases for financial matters along with moving over to the government and law enforcement authorities. Facial recognition in computer systems has become a big biometric too, and drawings/sketches that are to track down a criminal can a lot of time track down the wrong person that is innocent. “Further, in an attempt to paint a big picture that would at least sketch the contours of the full set of interactions and tradeoffs, the charge called for these analyses to take into account changes in technology; business, government, and other organizational demand for and supply of personal information; and the increasing capabilities for individuals to collect and use, as well as disseminate, personal information. Within this big picture, and motivated by changes in the national security environment since the September 11, 2001, attacks on the World Trade Center and the Pentagon, the committee addressed issues related to law enforcement and national security somewhat more comprehensively than it did other areas in which privacy matters arise.” There has been plenty of cases were someone has been wrongly accused for sketches being miss drawn and/or a person guesses who and what they saw, but it is not actually the right person that did the crime, therefore the innocent is put into prison or executed and later on is when the law enforcement or investigators’ find out they had accused the wrong person and then their life
Technology 4 has been wasted. There was a case recently on the news where these two innocent blacks guys were released from prison after quit a couple a years, for it was facts later that pointed out they were not guilty of committing a crime and someone else that actually had done that crime was already in prison for another case, crime. It is sad because technology does not always prove to be truthful or a promising thing that people are pushed to believe in or about. Background checks on the internet, have been a big deal for awhile; “Previous sections describe what can happen if data files contain erroneous information. This situation is particularly harmful to job applicants when background checks uncover wrongful criminal records and other inaccurate data. Unless the employer notifies the job applicant of the contents of the investigation, that individual may not learn why he or she was rejected. Federal law requires such disclosure (Fair Credit Reporting Act). But the law contains loopholes that the employer can use to avoid notifying the applicant that negative information in the background investigation resulted in their not being hired.”(Sec 8) A lot of these web sites or brokers are scams and asked a onetime payment or different amount of payments for how much additional information you want. Some of these are not even actually updated to the current time it being search as well, therefore it is just a waste of your time and money. Very few of these sites are reliable and accurate, which will get used by employers and the government to check peoples background, but even the more reliable ones can be incorrect or misleading therefore it can interfere with the person trying to get a job, or other things a person is applying for or trying to get.

Technology 5 Chatting sites like Facebook, MySpace, Skye, Twitter, YouTube and more are used and looked at by employers, management, the government, law enforcement and of course people stealing other people information. A lot of time this is how the law tracks down a criminal by what they spew out on chats and messages of their own actions for some people like to brag about what they did even though it was wrong. Employers like to look at how much a person is on Facebook or the other similar sites and what they say on their page, how much information they put out about themselves. For some people do not even think nor care about putting their personal information of their whole date of birth, phone numbers, address, kids names, email address and more, which is where they can put their own selves into a disaster in the long run. It has been all over the news this last year how a lot of jobs now days and their bosses are wanting your user name, plus your password that is supposed to be your own privacy business for Facebook, MySpace, Twitter and more sites. In our society today, for it now being the last couple of years, maybe even a century by now has been becoming more and more of an invade to our own lives and privacy. It just keeps being one thing to another that is making this life more about control and less freedom. “In the past few decades, privacy has been the rallying cry against another family of technologies: computer based digital electronic technologies that have hugely magnified the power of human beings over information. We are able, individually and in groups (organizations, institutions, societies), to gather, store, communicate, analyze, play with, and use information in historically unprecedented ways.”

Technology 6 Your privacy is not private no matter where you are, you can be in your house, backyard, vehicle, at work, in a store or a restaurant, at an event and you will never have complete privacy. People can put devices on your car, put like wiretaps to your conversation whether by phone or telegraphing, even things on your home to try and listen to what you are saying; so no matter where you are, always be careful of what you say or write down and it being visible because there is someone that will being watching you and you do not even realize it! Our younger generation is so much more at risk of what is to happen that will destroy their future, for some of them and actually so many more than ever in history are doing the bad, dirty work onto others and some of them are being used to do the job as well. The generations of today are all about taking and destroying compared to the older generations’, which sad, but true and it just keeps getting worse. When it comes to trying to take care of your own personal business, a lot of times it is taken for granted due to you having to give out your full name and/or social security number just to do something or even getting a quote for something you are trying to do or get a better deal out of, which later that can interfere with your credit score. Privacy has remained exclusive as a concept and will most likely continue to be as well as liberty and freedom. “The United States, even though it is at the leading edge of privacy protection, belongs to an active, congregational tradition. The term ‘‘privacy’’ implies withdrawal, and any suggestion that withdrawal has intrinsic value falls on deaf ears in this tradition. Withdrawal may have had value in itself in other parts of the world at other times, but in America the value of a withdrawal is measured by

Technology 7 the usefulness of the return. As a result, many Americans resist the idea that privacy has intrinsic value. They are more open to the idea that it has instrumental value but remain uncertain about why this is so— even as they demand it.”(P 6) Privacy and freedom has been an issue throughout time and will continue to be a problem due to the government, politics and the laws that get passed to do business that is part of life along with the newer technology systems that get made and passed to use.

References
Waldo, J., Lin, H., Millett, L. (2007) Engaging Privacy and Information Technology in a Digital Age
Washington, DC. : National Academies Press, Retrieved from; http://site.ebrary.com/lib/ashford/Doc?id=10180651&ppg=40 Givens, B. (2001) Privacy Today: A Review of Current Issues
Privacy Rights Clearinghouse (PRC), San Diego, CA. (Revised April 2012) Retrieved from; http://www.privacyrights.org/ar/Privacy-IssuesList.htm Nissenbaum, H. (2009) Privacy in Context: Technology, Policy, and the Integrity of Social Life
Palo Alto, CA. Stanford University Press, Retrieved from; http://site.ebrary.com/lib/ashford/Doc?id=10364959&ppg=36 McLean, D. (1995) Privacy and Its Invasion
Westport, CT., Greenwood Press
http://site.ebrary.com/lib/ashford/Doc?id=10005646&ppg=16

Similar Documents

Free Essay

Technology and Privacy

...Technology and Privacy Jurgen Debooserie Accounting Information Systems 04/24/2015 Technology and Privacy Over the last few years, technology and privacy have been transformed in an encouraging and dangerous realm. Technology provides us with easy access to information anywhere, improves communication between entities, enhances efficiency and productivity, and introduces social networking. This whole new world opens a lot of opportunities for every industry, but it has also has its downfalls. Since entities are using technology to communicate with each other, we need to be aware of how private our conversations are. According to Oxford Dictionaries, privacy is the state or condition of being free from being observed or disturbed by other people or the state of being free from public attention. In today’s society, we have several social networking websites including Facebook, Twitter, and LinkedIn. The things we do and say online leave a trail behind of our personal information. Everyone can track us when users post pictures, click a hyperlink, send emails, turn on locations, and it gives companies the opportunity to public access and the ability to store it. Companies and the government collect information in ways that might could threaten our freedoms, because when corporations acquire our information they sell it back to the highest bidder, while the government introduces laws that allows them to monitor us like never before. It affects our freedom of speech, undermines...

Words: 3015 - Pages: 13

Free Essay

Privacy and Technology

...Privacy and Technology In 1965, co-founder of Intel Gordon Moore made a prediction about the rate at which computer chip technologies would continue to expand into the future years. His prediction proved to be accurate, and today the processing power of microchips is continuing to double every 18 months. In a society constantly striving to become bigger and more profitable, a new era of advanced technologies has been adopted to perpetuate itself ahead of the global race for expansion. However, the mass development of new innovations in technology has not gone without a noticeable impact across all domains of society. As the transition into the future rapidly ensues, social and economical impacts have become more and more prevalent. One question to be considered in the race to improve and expand the nation is whether or not there is an equal amount of attention and emphasis being put on preserving our social values versus the importance put on pursuing economical gain. Many argue that the introduction of technology into modern society has brought about a world of positive change through which has offered immense advancements in global connectivity, efficiency, and quality of life. While the majority of new technologies are individually worthy of being considered great accomplishments throughout the technological world, they have collaboratively worked together to create an abundance of distractions throughout school and the work place as well as contribute to diminishing traditional...

Words: 1543 - Pages: 7

Free Essay

Privacy Technology

...! ! Privacy Technology ! ! Team 7 Summer 2014 ! ! COPYRIGHT TEAM7 !1 Privacy Technology Executive Summary Introduction System Architectural Case1: Create a privacy policy. Case2: Save an unfinished privacy policy form Case3: Upload Json file and continue finishing questionnaire Why Struts? 1 3 4 5 5 6 6 6 Functionality Start. Modification. Submission. 9 9 9 9 Design Rationale Web-based. Easy to use. Model form regulation satisfied. Hyperlinks to relevant opt-out mechanisms. Logical consistency. Computer-readable version. Preview generated policy. HTML and CSS outputs. 11 11 11 11 11 12 13 13 13 COPYRIGHT TEAM7 !2 Executive Summary ! The objective of this project is to develop a web-based tool, Interactive Form Builder (IFB), required by United States Federal Trade Commission (FTC). The tool is designed and developed for financial institutions to generate web-based, interactive privacy notices that comply with the model form regulation published by eight federal regulators on December 1, 2009, under the Gramm-Leach-Bliley Act. The report discusses the system architecture for this project. It also covers how we address each requirement specifically for the Interactive Form Builder.
 COPYRIGHT TEAM7 !3 Introduction The current in use Online Form Builder enables the financial institutions to produce a PDF version of notice. However, the created PDF notice is reported containing errors and lack of consistency...

Words: 2198 - Pages: 9

Free Essay

Privacy with Technology

...0 Ms. K English J 101 July 7, 2014 Portfolio B Informative Synthesis In “Say Everything”, Emily Nussbaum concentrates on a new definition of privacy that Daniel J. Solove has noticed as well; but differs in the new definition. The lack of privacy as noted by both authors with examples of published shame such as the “star wars kid” and “Susie”(6 Nussbaum)(15 Solove). However, Nussbaum focuses on positive responds she has received toward exposure from her interviews. Xiyin Tang, a blogger, accepts the negative comments from her audience but admit she does not care, and her actions will not change for their comments. Additionally, another girl, Oppermann described privacy online as “You are getting what you’re being” (5 Nussbaum) with an evident high tolerance toward judgment. Nussbaum focusing on publishment an example for the lack of privacy concludes that the younger generation is capable of handling exposure. However, Solove describe the new privacy with accessibility of the publisher information supporting the idea with an example of Facebook’s News Feed feature (21 Solove). Facebook launched a new feature they called News Feet that release information of users online activity to other commercial websites in 2007(21 Solove). Surprisingly, the users of Facebook responded with outrage. From this response, Solove interprets the new problem is based on accessibility of information instead of the ability to publish information, insisting that although information is...

Words: 299 - Pages: 2

Premium Essay

Mobile Technology and Privacy

...Privacy and Culture: Comparative study of privacy issues with respect to mobile technology in India and America Sreeranjani K Pattabiraman Abstract The past decade has witnessed a huge shift in the development of mobile technology which has led to privacy issues, murmurings of which started surfacing only in recent years. A lot of research has been carried out by academicians on mobile technology and its impact on society. There have also been comparative studies on how privacy has changed for people over the years with the boom of social networking sites and smart phones. But, there has not been a substantial study or analysis conducted on how people's privacy has been directly affected by the ever-increasing population boom of mobile-phone users. This comparative study analyzes the concept of privacy with respect to mobile surveillance and draws upon prior work in the field of mobile surveillance, ranging from popular press on government surveillance in India and USA and case studies in these two countries related to people’s view on privacy, to the works of ACLU (American Civil Liberty Union) in USA and Stop CMS (Central Monitoring System) in India. The study is built around the analysis and comparison of the issue of mobile surveillance in both the countries, how people dealt with this, and the role of culture in determining people’s view on privacy. It also proposes suggestions for how future research can be carried out in the field of mobile surveillance. Keywords ...

Words: 7224 - Pages: 29

Premium Essay

Privacy and Computer Technology

...Privacy is a valuable interest and is now threatened more than ever by technological advances. Privacy is defined as the ability to control the collection, use, and dissemination of personal information (Fast Trac Course ). At one time people could once feel confident that what others may find out about them would be treated in a way that it would probably do any harm. Information technology has been beneficial for privacy. By having access to ATMs and online banking we rarely have to present ourselves to a teller. Online shopping offers similar benefits such as being able to shop without standing in long lines and being able to compare prices and research products before purchasing. However, since so much of what we do daily is done using a computer, it can pose a serious threat to privacy. This information can then be recreated to create detailed personal profiles that could not have transpired in pre-digital days. Furthermore, this information can be distributed far, wide, and immediately without our consent or even knowledge. Judicial remedies are unlikely to produce a satisfying or sensible balance between companies’ economic prerogatives and customers’ privacy interest. New technologies that has either unconsiously adopted or resourcefully applied privacy practices will continue to threaten personal privacy. Business will have to find ways to address this uneasiness. If companies remain complacent, underestimating the degree to which privacy matters to customers, harsh...

Words: 1944 - Pages: 8

Premium Essay

1984 Privacy Technology

...As technology continues to advance, people will continue to lose their sense of privacy until privacy ceases to exist. Technology seems very useful, which it is, as it helps us with things in everyday life, such as communicating, sharing and much more, which persuades people to purchase these cellular devices. With each technological advancement, especially in the field of cell phones and computers, the amount of privacy an individual has grows smaller and smaller. In the novel 1984, written by George Orwell, illustrates his prediction of a future dystopian society where every citizen is continuously watched by “Big Brother”; at work, in their homes, everywhere. Technology is taking us closer and closer to the world of Big Brother since American’s...

Words: 1158 - Pages: 5

Premium Essay

“Privacy and Health Information Technology”

...A Literature Review “Privacy and Health Information Technology” Deborah Jones Dr. Udoh Udom Health Information Systems HAS 520 12/06/10 Introduction The increased use of health information technology (Health IT) is a common element of privacy of medical information. Proponents hope that the increased use of health IT will improve health outcomes for individual patients by facilitating the delivery of evidence-based care and reducing medical errors. Additionally, proponents hope that increasing information sharing among providers will better coordinate care within and across health care settings. Health IT facilitates the creation of a comprehensive health record that can move with an individual over his or her lifetime, in contrast to the fragmented records that exist today. Further, health IT is promoted as a critical tool for improving population health by allowing for the more efficient gathering of data regarding the effectiveness of certain treatments. Finally, health IT is also expected to help decrease health costs by reducing the duplication of services and the delivery of unnecessary or inappropriate care. This paper examines some of the “gaps” in privacy protections that arise out of the current federal health privacy standard, the Health Insurance Portability and Accountability (HIPAA) Privacy Rule, the main federal law which governs the use and disclosure of health information. Additionally, it puts forth a range of possible solutions, accompanied by...

Words: 3190 - Pages: 13

Free Essay

Understand How Individuals and Organizations Make Decisions About the Protection and Usage of Individua

...present the evolution of the economic theory of privacy (Section 2), we examine current privacy-related trade-o s for data subjects and data holders (Section 3), and we highlight the current economic debate on privacy protection (Section 4). 1.1 The Boundaries of the Economics of Privacy Before commencing our analysis, we alert the reader of the boundaries inherent to an eco- nomic approach to the privacy debate. First of all, in the rest of the document our focus will be, primarily, on information privacy - that is, on the issues associated with the collection and usage of individuals' personal information (Westin, 1970). We take this approach be- cause, while privacy is a multi-faceted concept, most of the relevant contemporary economic research focuses on consumers' data . Our focus on informational privacy and consumer data, however, should not be construed as a denial of the existence of other dimensions to the pri- vacy debate, which may be more dicult to capture in economic terms (Solove (2006), for instance, distinguishes between privacy issues associated with the collection, processing, or dissemination of personal data, and privacy issues associated with personal invasions , such intrusion and decisional interference). Second, the existence of such trade-o s does not imply that the economic agents are always aware of them as they take decisions that will impact their privacy. Third, the analysis of trade-o s associated with...

Words: 3315 - Pages: 14

Free Essay

Ethics and It

...The advances made in information technologies are causing an increasing number of ethical problems. The power used to processing computers doubles about every two years. Organizations are more dependent than ever before on their information systems. The Ethical problems arising from the appropriate use of customer information, personal privacy, and the protection of intellectual property have lead to increased laws to regulate the way data is collected. There are also privacy issues involved collecting, storing, and disseminating information about individuals. Privacy is the right to be left alone and to be free of unreasonable personal intrusions. Information privacy is the right to determine when, and to what extent, information about yourself can be gathered and/or communicated to others. 1 Court decisions in many countries have followed two rules fairly closely: The right of privacy is not absolute. Privacy must be balanced against the needs of society. The public’s right to know supersedes the individual’s right of privacy. These two rules show why it is difficult in some cases to determine and enforce privacy regulations. National Do Not Call Registry The protection of privacy brought about the need for the National Do Not Call Registry. This registry is intended to give consumers an opportunity to limit the telemarketing calls they receive. The registry was set to begin in 2003, but a court challenge delayed its implementation until 2004. The law does provide exceptions...

Words: 633 - Pages: 3

Premium Essay

Data Security

...Data Security and Privacy Act Data security & privacy has varies of roles and responsibilities to prevent financial crimes. Financial crimes can include telemarketing scams, investment or pension fraud, credit card fraud, and insurance fraud. However, it is the company decision on how much personal protection is needed to secure its customers financial investments. Moreover as who is suppose to make this decision for financial protection falls under corporate security. These decisions are very important because businesses, as well as individuals, can be victims of financial crimes and face serious financial loss. In this recent ongoing decade because of the fear of big government and the fear of privacy intrusions through the internet and internet commerce, across all enforcement agencies, data security and privacy are high priorities. The Obama Administration has made enforcement of data security and privacy a top priority. In this modern day age, updating the Healthcare Insurance portability & Accountability Act is recently now highly recommended. The healthcare industry is already familiar with data security and privacy restrictions. We the people in the United States of America is living in an information technology era, with increasing automation of electronic medical records, clinical systems, and medical imaging, as well as growing regulatory pressures, it is a challenge for healthcare providers to protect the privacy of patient data and secure their IT...

Words: 601 - Pages: 3

Premium Essay

The Internet of Things

...See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/263893131 TruSMS: A trustworthy SMS spam control system based on trust management Article in Future Generation Computer Systems · July 2014 Impact Factor: 2.79 · DOI: 10.1016/j.future.2014.06.010 CITATIONS READS 4 2,022 4 authors, including: Zheng Yan Raimo Kantola Xidian University Aalto University 88 PUBLICATIONS 588 CITATIONS 91 PUBLICATIONS 298 CITATIONS SEE PROFILE All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. SEE PROFILE Available from: Zheng Yan Retrieved on: 12 April 2016 This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and sharing with colleagues. Other uses, including reproduction and distribution, or selling or licensing copies, or posting to personal, institutional or third party websites are prohibited. In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier’s archiving and manuscript policies are encouraged to visit: http://www.elsevier.com/authorsrights Author's personal copy ...

Words: 18072 - Pages: 73

Premium Essay

Data Class

...Data Classification and Privacy: A foundation for compliance Brian Markham, CISA University of Maryland at College Park Office of Information Technology Goals for today: Give you a solid understanding of both Data Classification and Data Privacy with respect to compliance; Link data classification and privacy to ongoing compliance issues; Discuss various best practices, methodologies, and approaches that you can take with you; Do my best to answer any questions you may have on audit related issues regarding these topics. So...who am I? IT Compliance Specialist @ the Office of Information Technology at UMCP Responsible for audit and compliance initiatives within OIT Formerly employed by KPMG LLP and Grant Thornton LLP as an IS Auditor Have worked with many federal, state, and local governments as well as public companies, hospitals, and not-for-profits. Why do we want to be in compliance? No one likes audit findings; Reduces organizational risk; Processes based on best practice and widely adopted standards are more effective than ad-hoc processes; Systems and data are more secure as a result of good internal control practices. What is Data Privacy? Data Privacy - the relationship between technology and the legal right to, or public expectation of privacy in the collection and sharing of data. The U.S. has trailed the E.U. and other countries in data privacy regulations and legislation; Passed Legislation: HIPAA, Gramm-Leach-Bliley, COPPA; Proposed Legislation: Data...

Words: 1305 - Pages: 6

Premium Essay

Ethics 301 Module 1 Business Ethics

...Trident University International Michael S. Hunter Module 1 Case Assignment ETH 301: Business Ethics Dr. Steven Gold and Dr. Joel Kostman August 8th, 2011 During the next few pages I will make an argument through utilitarian and deontological reasoning and explore the nature of privacy to answer the question; “Should Justin Ellsworth’s Parents have been given access to his email?” This is a very debatable question. It is my belief based upon my values and life experiences to take the position that his parents should not be given access to his e-mail. First, let us consider the utilitarian aspect of the question. Utilitarianism, as defined by the notes under the Module 1 home page, “the assessment of good versus bad consequences of an action and choosing the course of action that best serves the greatest good for the greatest number”. In the Ellsworth case there are many factors to consider. Positive factors include many interests by both parties. One example is the obligation for Yahoo as an Internet Service Provider (ISP) to honor their contractual agreement. Another positive factor for Justin’s parents is the ability to gain some additional insight into his personal life, something they may need for personal closure and the parental need to know more about their son’s life. A negative aspect of this case is the ultimate disclosure of communications that were private between Justin and another individual. If he meant for his parents to receive a copy...

Words: 1130 - Pages: 5

Premium Essay

Privacy, Exposure and Price Discrimination

...Privacy, Exposure and Price Discrimination Luc Wathieu1 Harvard Business School, Soldiers Field, Boston, MA 02163 (email) lwathieu@hbs.edu (Tel) 617-495-1016 Submitted for presentation at the first QME conference This paper explores the demand for privacy that arises from the loss of consumer surplus when firms gain the ability to treat different consumers differently. It is shown that firms in quest of a competitive advantage may have an incentive to acquire consumer information and use it to gain exclusive access to finer consumer segments, even when the costs of customized marketing are exceedingly high. When such is the case, the opportunity arises for an intermediary to coarsen market access in order to protect consumer surplus and to bar firms from exercising price discrimination. This intermediary could be a mass retailer, a mass media or a diverse community. Formally, the paper analyzes the situation of an intermediary who owns a finer market access system, i.e., the capability to separately access two types of consumers who previously remained undistinguishable. The system could be made available to one firm in exclusivity, or to several firms (two instances of “exposure”), or to no firm at all (“privacy”). The best-bidding agent (from among firms, marginal-type consumers, and mainstream-type consumers) is buying the right to command the equilibrium access allocation. The solution involves either privacy (commanded by mainstream consumers) or exclusive exposure (commanded...

Words: 3175 - Pages: 13