That the CEO of iPhone should aloud the FBI to have access to the terrorist (Yed Farook) user iPhone. The CEO of iPhone says no to letting the FBI have access, because of hackers and cyber thieves. They are afraid of people’s accounts being stolen and hacked. The FBI are trying to find out why he kill those 14 people but they have to get into his account on his iPhone. Tim Cook is being stubborn by not letting the FBI have access to the software to get information from the terrorist’s user accounts. The FBI is trying to prevent terrorist’s attacks from happening in the future. I do not understand why Tim Cook is being so stubborn, about letting the FBI use the software to have access into terrorist’s accounts. Tim does not understand,
In doing so, they used 3 different logical structures in their arguments: precedent, degree, and analogies. Tim Cook debated with a constructive argument, “to guarantee such a powerful tool isn’t abused and don’t fall into the wrong hands is to never create it” (The Guardian, 2016). This is an example of degree argument, as the audience will automatically agree with any arguments with less of bad things because it is good. Apple knows there are no other cases like this one, so there’s nothing to compare to. Letting the government into the iPhone only this one time can set a dangerous precedent that can potentially force Apple to force open every iPhone in the future at government request. This became a heated legal battle, granting the access in their products for law enforcement was compared to “a political question” by Apple with an analogy (Yadron,
In David Brook’s, “One Nation Slightly Divisible” and Jonathan Rauch’s, “In Defense Of Prejudice, both writers make valid points. Both authors also have a common technique; Brook’s and Rauch seem to have biased viewpoints towards the subject matter. But although these two authors share this similarity, one author stands out in how he uses the bias to his advantage or even to the advantage of the audience to better understand and be convinced by his ideology. Although both authors seem to have biased viewpoints, their bias fuels their arguments in efforts to successfully fulfill their purpose. David Brook’s appears to structure his biased viewpoint in a way that exhibits a more pervasive bias than Jonathan Rauch in how he uses the bias to incorporate
This investigation analysed the results of 28 year 12 students in a persuasion research program, displaying the change in attitudes through the conduction of anti-smoking messages in advertisements to persuade people not to smoke.
"The Triumph of Technique – The Logic of the NSA." LibrarianShipwreck. WordPress.com, 22 June 2013. Web. 08 Feb. 2014.
According to John W. Whitehead, “The fact that the government can now, at any time, access entire phone conversations, e-mail exchanges, and other communications from months or years past should frighten every American.” (Whitehead). The NSA
"NSA Surveillance Programs." Issues & Controversies. Facts On File News Services, 14 Oct. 2013. Web. 20 Nov. 2013. .
...d. The creation of the new operating system will also create a dangerous precedent for future companies that will affect everyone negatively. The risk that will arise from this conflict could possibly allow the FBI and hackers to all Apple customers privacy. Though making the backdoor system would help the FBI obtain all necessary information regarding the San Bernardino Terrorists, this create a domino effect that will ultimately affect all people. The FBI claims that they will only use the operating system once if they receive it but prior evident proves that it will not be true. Apple has the legal right to refuse creating a new IOS software to get suspected terrorists IPhone because it will invade all privacy of all Apple customers, it will set a precedent for future companies, and the FBI will mislead Apple into believing they will not use the IOS system again.
Edward Snowden, the famous “whistleblower”, shocked the world with his revelations about the NSA’s database and the programs which allow the organization to access personal information not only of citizens of other nations, but also of citizens of the U.S. The most shocking revelation of all was not the existence of these programs, but the fact that the Obama administration allowed those programs to exist in direct violation of every U.S. citizen’s right to privacy.
The recent leaks, disclosures, and actions of government agencies – namely the National Security Administration (NSA) – have caught the public’s attention and focused it on the protection of privacy and civil liberties. The NSA participates in a bulk data collection program that has accumulated phone data over the past five years in order to track persons suspected of threat to the nation. This collection of mass data without issued warrants violates the Fourth Amendment and brings the potential abuses with this program into view. Not to mention possible cyber security threats: if a subcontractor was able to commandeer this information and leak it, what is stopping hackers from doing the same, or worse.
"NSA Skirted Phone Snooping Question Because the Answer Is..." Fox News Insider. N.p., n.d. Web. 13 Nov. 2013.
On 6th of June 2013, breaking news appeared on ‘The Guardian’ newspaper where in the report; it revealed that the National Surveillance Agency (NSA) of the United States was collecting telephone record under top-secret court order. The next day, ‘The Guardian’ and ‘Washington Post’ reported that NSA has been assessing information and data in the system of Internet giants such as Facebook and Google under a surveillance program. Edward Snowden, on 9th of June 2013 was named to be the one who leaked the information to the newspaper when he made a debut interview from Hong Kong.
According to the text , Social Psychology, “social psychology is the scientific study of how people think about, influence, and relate to one another”(pg. 4) this is viewed in a variety of social topics incorporating group behaviors, attitudes, conformity, obedience to authority, stereotypes and peer pressure. Outside factors can have a positive or negative affect our view of ourselves and each other. These outside factors are used to persuade and influence group behavior. Persuasion is defined as “the process by which a message induces change in beliefs, attitudes, or behaviors” (Myers, 2010, pg. 230). The principles of this process of persuasion according to researchers, Robert Cialdini and Thomas Davidson, are attractiveness and likeability, reciprocity, social proof, consistency, authority, and scarcity (Davidson, 2008)(Myers, 2010, pg. 237). These principles of persuasion impact our self-perception, our attitudes and behaviors, and our culture.
Finally, the liking principle is one that will often be used in the art of persuasion. This can be used effectively, where a product can be seen as “likable” if for example it has been endorsed by someone perceived to be physically attractive or perhaps someone that demonstratives the behaviors of a friend, such as showing similar traits or someone that can be related to.
In the management process, leadership is the first and can be the most influential part of the process. Both Steve Jobs and Tim Cook have very similar approaches to leadership styles in regards to the vision for Apple. Steve’s is more on a vision for the future charismatic side where as Cook’s vision is tied into social and ethical responsibilities. While they have differences in the approach to the direction of the company, they use their position of power to influence decisions and visions.
Digital privacy concerns, which have been a major issue in our country since 2001, increasingly violate our basic human rights as global citizens. The growing amount of government surveillance has manifested in the enactment of acts such as SOPA and CISPA. Although their intent on stopping digital piracy and attacks were clear, both were immediately met with harsh criticism; they allowed big corporations to violate our privacy rights by sharing our personal information with both other companies and the government. Our President, although publicly expressing his acknowledgement of the issue, failed to discuss an array of other pressing dilemmas regulated by the recently exposed National Security Agency (NSA), especially those involving the mass data stockpiles and the rights of foreigners against immoderate and disproportionate surveillance by the US. Furthermore, the intentions of the NSA still remain unclear; why is the collection and the extended retention of this data useful? Those in power believe that the collection of this information allows them to preempt terrorist attacks; a very difficult claim to prove. Our lack of clear answers demonstrate the need for a larger audience who support government transparency. The NSA’s misconduct has dealt multiple blows to the rights of millions both at home and abroad, and the amount of secrecy involving this agency shrouds it in obscurity, inhibiting public debate about these crucial matters.