Preview
Preview

Essay about Robbed By Technology

:: 6 Works Cited
Length: 1366 words (3.9 double-spaced pages)
Rating: Purple      
Open Document




- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

The idea of privacy has slowly been diminishing over these past few generations. In a time where cavemen existed, privacy was cherished. The Privacy Act of 1974 was created for individuals who were concerned about their privacy rights when computerized databases were developed. It restricted agencies from sharing individual’s information with third parties. However, the Act did not protect all databases due to the fact that “databases” does not have a set stone definition (“EPIC”). In fact, a good example of an exception to this Act would be the Prince George’s County Government website. Located under the “Criminal Division” of this website you will find a link that will direct you to a Maryland Judiciary Case Search. On the redirected link the website states “This website provides public access to the case records of the Maryland Judiciary. Information origination within the District Court system and the Circuit Court of Baltimore City is entered after the close of each court day, and is available online the following day” (“Maryland Judiciary Case Search”). This information can be accessed by anyone. We no longer have control over what is private; technology has access to it all.
Privacy was once referred to as being able to do things one considered private without anyone knowing except for those that were around to encounter it. Nowadays privacy has no set and stone definition, but one may see it as committing a private act and hoping no one finds out. However, things considered private can quickly become public thanks to the new high-tech equipment that has been introduced over the past decades. Social networks such as Facebook and Twitter have this feature “Check-In” that allows you to do just as it says, check-in. This fe...


... middle of paper ...


...www.time.com/time/business/article/0,8599,1964873,00.html>.
Hill, Kashmir. “Your Online Privacy Is Worth Less Than A Six Pack Of Marshmallow Fluff .” Forbes. N.p., 09 02 2012. Web. .
Maryland Courts . Maryland Judiciary Case Search. .
Read, Richard. “OnStar Committing 'Brazen' Invasion Of Privacy, Says Senator.” The Car Connection. N.p., 26 09 2011. Web. .
Smith, Charles. “Big Brother on Board: OnStar Bugging Your Car.” TonyRogers.com. N.p., n.d. Web. .
United States . Privacy Act of 1974 . 1974. .


Click the button above to view the complete essay, speech, term paper, or research paper

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »







This essay is 100% guaranteed.


Title Length Color Rating  
Innovative Technology: Google Glass Essay - ... The big issue is the privacy invasion, with the video recording feature in Glass has made insecurity to other human beings. There are people who wish not to be recorded in public. In recent news in San Francisco, A lady named Sarah Slocum, A local tech writer and marketing consultant was showing off her Google Glass at Haight Street bar Molotov's. Due to the show off, she was threatened and assaulted by a young man and was later robbed. She was “approached by a small group which appear to dislike her Glass”(Kurtis Alexander, SFGATE, Unfriendly Reaction) She described them that they were trying to shield themselves from the recordings and until one girl from the group went in anger to sto...   [tags: hardware, healthy and safety, wearing glass]
:: 11 Works Cited
1342 words
(3.8 pages)
Term Papers [preview]
Essay Loose Technology - Loose Technology What is a hacker one may ask. He doesn't wear a stocking mask over his face, nor does he break a window to get into your house. He doesn't hold a gun to your head, nor does he go through your personal possessions. Considering the situation, he recognized just the way a thief is recognized. But one strange thing about this thief is that you’ll never be able to see him, although you may not even realize right away that he's the one that robbed you. This thief is a computer hacker and he "enters" your home via your computer, which allows him to access your personal information....   [tags: science]
:: 6 Works Cited
1521 words
(4.3 pages)
Strong Essays [preview]
How to Stay Safe from Identity Theft and Fraud Essay - There are moments in life were we wonder if we are really safe. Safety should not only include being physically safe but also include being safe through your identity. Many people are victims of identity theft and do not even realize it. Have you ever stopped to think are you really safe from identity theft criminals. Identity theft can happen to anyone. No matter your age if you have personal information that they can take they will. Identity theft has highly inclined in the past decade. Suspects have found many new ways to ruin the personal lives of others....   [tags: misuse of technology]
:: 5 Works Cited
1199 words
(3.4 pages)
Strong Essays [preview]
Essay about The Evolution of Technlogy and Mass Media - For the past 50 years technology has evolved in a variety of different ways from bulky to sleek cellular devices, to the way people receive news and communicate. The changes of technology play a big part in the media and how it is used. The technological changes made throughout these time periods have made communication and the media widely spread. The 60s brought along many new changes in the way media is produced. The use of the television in the 60s played a very important role in the media for these times dealt with not only political changes but also social, cultural, and psychological changes....   [tags: Technology ]
:: 10 Works Cited
1902 words
(5.4 pages)
Term Papers [preview]
What World will We Leave Our Children? Essay - ... Television is not the sole culprit since most of programming is educational and can impact them positively the problem lays in some of the inappropriate programming that can negatively impact our easily impressionable children. Communication is great and the devices that allows us to do so are equally amazing. The tablets, the laptops and the cellular devices all enable us to stay in touch with the ever changing world. It is acceptable and greatly encouraged for business to promote their products to mature audiences....   [tags: consumerism, media, technology] 548 words
(1.6 pages)
Good Essays [preview]
The Internet: How Private is Your Privacy? Essay - The Internet: How Private is Your Privacy. Would you go up to a random stranger and hand them all of your personal information: home address, social security number, credit card number, etc…. This is exactly what people do every single day when they are on the internet signing up for online banking, social networks, and even online shopping. According to Internet World Stats, approximately 239,893,600 people in the United States alone account as internet users by 2010 (United States). Consequently, the Internet has infiltrated the lives of so many and has become the main source of dependency to get things accomplished....   [tags: information technology, social media]
:: 6 Works Cited
1137 words
(3.2 pages)
Strong Essays [preview]
Telecommunications Infrastructure Essays - Lack of adequate level of telecommunications infrastructure, human capacity building and capital are some of the challenges developing countries are facing in adopting mobile banking. However (Proenca and Rodrigues, 2011) posits that e-banking enable banks to scale borders, change strategic behaviour and create a lot of new opportunities that can significantly reduce the physical costs of the banking operations. However, for banks to scale border, they need an agent network which (Berger, 2009), argues that building an agent network is a challenge hindering the growth of mobile phone banking in Malawi....   [tags: Technology ]
:: 27 Works Cited
883 words
(2.5 pages)
Better Essays [preview]
Nicholas Carr Essay - Atlantic journalist Nicholas Carr confesses that he feels something has been “tinkering with his brain.” No, we’re not talking about alien abductions, rather something a little closer to home. The internet, he fears, may be messing with our minds. We have lost the ability to focus on a simple task, and memory is steadily declining. He is worried about the effect the internet has on the human brain, and where it may take us in the future. In response to this article, Jamais Cascio, also a journalist for the Atlantic, provides his stance on the issue....   [tags: Technology, Google, Solutions] 1531 words
(4.4 pages)
Powerful Essays [preview]
Reproductive and Therapeutic Cloning Essays - Reproductive and Therapeutic Cloning Cloning is defined as the “creation of an exact copy of a living matter, such as a cell or organism” according to Encarta encyclopedia. The copies produced through cloning have identical genetic makeup and are known as clones. Scientists use cloning techniques in the laboratory to create copies of cells or organisms with valuable traits. Cloning is a controversial topic because new areas of science often raise questions about safety. Early experiment performed on animals showed potential dangers....   [tags: Science Technology Genetics Essays] 1475 words
(4.2 pages)
Powerful Essays [preview]
Technology Essay - Technology is a broad concept that deals with a species' usage and knowledge of tools and crafts, and how it affects a species' ability to control and adapt to its environment. In human society, it is a consequence of science and engineering, although several technological advances predate the two concepts. Technology is a term with origins in the Greek "technologia", "τεχνολογία" — "techne", "τέχνη" ("craft") and "logia", "λογία" ("saying").[1] However, a strict definition is elusive; "technology" can refer to material objects of use to humanity, such as machines, hardware or utensils, but can also encompass broader themes, including systems, methods of organization, and techniques....   [tags: Technology Research] 1599 words
(4.6 pages)
Strong Essays [preview]