Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Is technology a threat to our privacy
Importance of privacy
Importance of privacy
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Is technology a threat to our privacy
The Master Key to Iphones is Unethical
The San Bernardino vs Government case has been in the news for the last months since the terrorist attack last December. It has reminded the world the importance of encryption which is essential for our lives and privacy in this new era of technology. After the attack, the FBI asked Apple for help to access an iphone that belonged to Syed Rizwan Farook one of the perpetrators of the attack, Because the FBI could not access it due to the modern encryption and security features new iphones have. Apple was not completely oppose to help the FBI. The company helped with everything could without violating the privacy of its customers. Apple gave access to the backup data stored in iCloud from Farook’s iphone, but the data obtained was six weeks prior to attack. The FBI still needed more private information from the iphone such as, texts, phone calls and GPS locations after the attack. Apple is now being forced by the federal court to create a software to bypass the security features of the iphone to completely access its data. Apple is refusing to create this software because the company says this would put in danger the privacy of every Apple customer. The company says that once they create this backdoor to the iphone, they cannot guarantee to keep it safe. Because once created it can be modified to open infinite amount of iphones and access their data. Many people are concern about this issue and most experts agree that if the program is created more security issues will arise, not only within individuals, but national and possibly international security issues since technology is now all over the word.
Encryption, the language of computers and smartphones is essential. Most people take for gr...
... middle of paper ...
...h this device that can be disabled because it contain its own key to be encrypted. After great opposing and more complex encryption methods the government lost interest in the chip.
If apple loses the battle in court and is forced to create the backdoor to that one iphone, the U. S government can possibly then access private information from anyone that owns an iphone. Because no one is guaranteeing this will not happen. Another main problem then would be protect the key from hackers which apple said already they cannot do. In this era, if one person really wants to send encrypted data to another person there are applications that can do this easily. So they government have to then go after those companies creating those applications, some of those companies are not even in American soil, not to mentioned terrorist can use this application to plan another attack.
In doing so, they used 3 different logical structures in their arguments: precedent, degree, and analogies. Tim Cook debated with a constructive argument, “to guarantee such a powerful tool isn’t abused and don’t fall into the wrong hands is to never create it” (The Guardian, 2016). This is an example of degree argument, as the audience will automatically agree with any arguments with less of bad things because it is good. Apple knows there are no other cases like this one, so there’s nothing to compare to. Letting the government into the iPhone only this one time can set a dangerous precedent that can potentially force Apple to force open every iPhone in the future at government request. This became a heated legal battle, granting the access in their products for law enforcement was compared to “a political question” by Apple with an analogy (Yadron,
Doctor Jean Twenge is an American psychologist who published an article for The Atlantic titled “Has the Smartphone Destroyed a Generation?” in September 2017. The purpose of Twenge’s article is to emphasize the growing burden of smartphones in our current society. She argues that teenagers are completely relying on smartphones in order to have a social life which in return is crippling their generation. Twenge effectively uses rhetorical devices in order to draw attention to the impact of smartphones on a specific generation.
Thesis: Twenge affectively uses emotional appeals to persuade her readers into believing that the excessive use of smartphone has ruined a generation.
A common theme is taking place where as people feel that cell phones are starting to take over others daily lives. Many people go through their day to day lives not even relizing how often they are on their cell phones. In the article, “Our Cell Phones, Ourselves” the author Christine Rosen talks about how cell phones are starting to become a necessity in every way towards peoples lives. Rosen talks about both the good and bad effects of cell phones and how they have changed the way in which we work our daily life. Although I think cell phones can be necissary, the constant need for use could be the beginning of how cell phones will take over our every day lives.
Should Apple be forced to unlock an iPhone or not? It becomes a controversial topic during these years. Most people are concerned with their privacy and security. Darrell Issa is a congressman and has served the government since 2001. Recently, he published “Forcing Apple to Hack That iPhone Sets a Dangerous Precedent” in Wired Magazine, to persuade those governors worked in the Congress. It is easier to catch administrators’ attention because some of them want to force Apple to unlock the iPhone. Darrel Issa focuses on governors because he thinks they can support the law to make sure that everyone has privacy. He addresses the truth that even some of the governors force Apple to hack iPhones when they need people’s information. He considers maintaining people’s privacy as the primary purpose. He also insists that Apple should not be forced to use their information which could lead people’s safety. In “Forcing Apple to Hack That iPhone Sets a Dangerous Precedent,” Darrell Issa uses statistics and historical evidence to effectively persuade his audience of governors that they need to consider whether or not Apple should be forced to hack or not because it could bring people to a dangerous situation and forget the purpose of keeping people’s privacy.
In today's society with the increased use of computers, internet, and wireless communications, the need for safety and security has risen dramatically. The internet has become the number one communication medium and is more accessible than ever. Through the internet, vast amount of information is being transmitted between computers. At times, some of the information transmitted can be intercepted illegally, such as personal information and private messages. The percentage of information that is illegally intercepted has been dramatically reduced due to the use of encryption software technology, which was once used by the United States military and government. This technology has given businesses and private users the sense of security in transmitting information through the internet as well as to maintain national security. The use of encryption has been a topic of discussion for the past 20 years. The U.S government has attempted several times to regulate encryption because they felt that it was a matter of national security that they should have control of the technology and protect us from vulnerability if software is shared or sold to other countries. The effort of encryption regulation by the U.S. was unsuccessful and today there are least restrictions on the use and export of encryption technology. The introduction of encryption regulation in the United States has made a global impact. Other countries, such as China, Russia, and others around the world, have implemented encryption regulations to due to the influence of the U.S. but have restrictions that are far more stringent and harsh. The strong regulations by these countries are creating conflict among private users and foreign companies that export encryption software to these countries. This argument and debate continues between the government, businesses, and encryption companies. The question is should the government have the right to monitor and regulate encryption and what ethical questions does it raise?
Nicholas Carr wrote ‘How Smartphones Hijack Our Minds’ published in the Wall Street Journal in 2017. Carr believes that as the brain becomes reliant on smartphones the intellect diminishes.
In “ How Smartphones Hijack Our Minds,” Nicholas Carr is persuading his audience to refrain from and shorten their amount of smartphone usage, and he reveals his perspective on how he believes that smartphones are hijacking our minds, and causing issues in our society. Carr cleverly uses several devices to persuade his audience and to drive his point home. Among these devices are statistics, comprehensive language, and reasoning. Nicholas Carr uses statistics to involve the data he has found to support his claim that numbers don’t lie. “In both tests, the students whose phones were in view posted the worst scores.
In today 's generation many adults and teenagers keep everything from contacts numbers to their social security numbers on their smartphones. When customers, including criminals and terrorists purchase their smartphones, they are buying it with the assurance that not some, but all of their information and privacy will be safeguarded. The issue occurring today deals with the suspected terrorist of the San Bernardino, California on December 2, 2015 shooting involving over 30 injured people. Syed Farook, the suspected terrorist Apple IPhone is locked with a 4 code password and the government wants Apple to create a backdoor operating systems that allows them to computerize as many passcodes they can to unlocks the terrorists IPhone. Apple strongly believes that creating this necessary backdoor system will create a negative chain of effects that will affect everyone from smartphone users to social media companies and their privacy. The FBI recently has taken Apple to court to create the necessary backdoor operating systems to get around the security features created on the Apple IPhones. Apple has the legal right to refuse creating a “backdoor” software to get into suspected terrorists iphone because it invades the privacy of Apple 's customers, it will set a precedent for other companies, and the FBI will mislead Apple.
In the article entitled, “Our Cell Phones Ourselves”, Christine Rosen describes how cell phones have changed the way we communicate. Rosen tells the readers the main purpose for cell phone use in the past, versus present day. Her purpose is to make society aware of how cell phones have influenced our lives in order to inspire change as to how we view our cell phones. Rosen directs her writing to everyone in the present day by describing the negative results of cell phone use and how it impacts our lives and those around us. Without a doubt, cell phones are going to be a part of our world, but it is the responsibility of every cell phone owner to exercise self control and understand that a cell phone is nothing more than a device.
In this case it’s I think important to understand that Apple would happily open this one phone and give the FBI the info they needed. But this isn’t what the government really wants. The government wants a backdoor key into the operating system itself. This means that government will have total right of entry into your iPhone. This has to be regulated to protect
The Social Construction of Technology (or SCOT) is a new research tradition rooted in the sociology of technology. SCOT provides a multi-directional model based on the property of interpretative flexibility, and emphasizes on social influences on the technology design and development. This paper will apply SCOT principles to explore the development of cell phone, define the development of cell phone into three different stages historically, and analyze the interpretative flexibility of the cell phone accordingly in the three different stages. Based on SCOT theory, this paper will discuss how the original huge cell phones are shaped and developed by social influences to the smartphones in today’s life.
Technology and the Invasion of Privacy As citizens of America we are all entitled to our rights of privacy. When something threatens this guaranteed privacy we tend to take extra precautions to prohibit prolonged violation. As the advancing world of technology continues to grow and expand, so do the amount of cases involving privacy invasion. Technology drives these privacy-invading crimes; however, crime also drives technology, creating a vicious cycle.
In this mindset, privacy is a very miniscule price to pay for the “greater good”. The average American citizen should have no fear of anything happening to them with this relinquishing of privacy. They are protected from both the government and any perceived threat, because an average American has no tendency to criminality and because the government may now be able to locate any threats before they become a problem, respectively. If a person has nothing to hide, they should not have any problem with letting the government take possession of mass amounts, if not all, of their personal information.
In the early years of computers and computerized technology, computer engineers had to believe that their contribution to the development of computer technology would produce positive impacts on the people that would use it. During the infancy of computer technology, ethical issues concerning computer technology were almost nonexistent because computers back then were not as multifaceted as they are today. However, ethical issues relating to computer technology and cyber technology is undeniable in today’s society. Computer technology plays a crucial role in all aspects of our daily lives. Different forms of computer technology provide unique functionalities that allow people to perform daily activities effectively and efficiently. In modern society, we use computer and cyber technology to communicate with friends and family via social networking sites, participate in business transactions, and get current news. Different tasks require unique technological feature in computer technology to function properly. Although, unique technological features increase people’s proficiency in accomplishing various tasks, unique technological features in computer and cyber technology increase security vulnerabilities. In many cases, the security vulnerabilities in computer technology are exploited by cybercriminals to invade people’s privacy, and steal people’s identity. We know that computers have no moral compass; they cannot make moral decisions for themselves. Essentially, people make moral decisions that affect others positively or negatively depending on how they use computer technology. Some of the biggest ethical issues facing people in the computing environment include privacy concerns on the web and identity theft. Privacy concerns...