SlideShare a Scribd company logo
1 of 30
Essay 2 Log: Type or write on this Log and email it to me by
Friday, March 13. (OPTIONAL: if you compete this log in your
notebook - and it is LEGGIBLE - you can take a picture of it to
email me.)
Remember that LOGS and OUTLINES account for 10% of your
FINAL GRADE.
Part 1: Read and annotate (underline, highlight, etc.) “Colleges
Are Turning Students’ Phones into Surveillance Machines,
Tracking the Locations of Hundreds of Thousands” by Drew
Harwell.
· Make two LISTS of the most important PROS and CONS of
this surveillance mentioned by the ARTICLE (They Say)?
· Freewrite your RESPONSE to these PROS and CONS (I Say).
PROS: IDEA + QUOTATION that illustrates this idea
CONS: IDEA + QUOTATION that illustrates this idea
MY RESPONSE TO THE PROS AND CONS: Answer this
question: Do you think, on balance, that tracking college
students is a good or bad thing? Of course, you can say that it is
BOTH GOOD AND BAD, but in that case, how can colleges
reduce the negative impacts and increase the helpful aspects?
Part 2: Read and annotate (underline, highlight, etc.) “Visible
Man: Ethics in a World without Secrets.” Fill in the chart
below. You are looking for IDEAS and EVIDENCE from this
article that 1) sums up SINGER’S MAIN POINTS and 2) you
can CONNECT to the question of college surveillance of
students.
QUOTATIONS form “Visible Man”
WHAT THE QUOTATION MEANS: In other words…..
HOW THIS IDEA COULD RELATE TO “Colleges Are Turning
Students…”
Democracy Dies in Darkness
Colleges are turning students’ phones into
surveillance machines, tracking the locations of
hundreds of thousands
By
Dec. 24, 2019 at 8:00 a.m. EST
When Syracuse University freshmen walk into professor Jeff
Rubin’s Introduction to
Information Technologies class, seven small Bluetooth beacons
hidden around the Grant
Auditorium lecture hall connect with an app on their
smartphones and boost their
“attendance points.”
And when they skip class? The SpotterEDU app sees that, too,
logging their absence into a
campus database that tracks them over time and can sink their
grade. It also alerts Rubin,
who later contacts students to ask where they’ve been. His 340-
person lecture has never
been so full.
“They want those points,” he said. “They know I’m watching
and acting on it. So,
behaviorally, they change.”
Drew Harwell
https://spotteredu.com/
https://www.washingtonpost.com/people/drew-harwell/
Short-range phone sensors and campuswide WiFi networks are
empowering colleges
across the United States to track hundreds of thousands of
students more precisely than
ever before. Dozens of schools now use such technology to
monitor students’ academic
performance, analyze their conduct or assess their mental
health.
But some professors and education advocates argue that the
systems represent a new low
in intrusive technology, breaching students’ privacy on a
massive scale. The tracking
systems, they worry, will infantilize students in the very place
where they’re expected to
grow into adults, further training them to see surveillance as a
normal part of living,
whether they like it or not.
“We’re adults. Do we really need to be tracked?” said Robby
Pfeifer, a sophomore at
Virginia Commonwealth University in Richmond, which
recently began logging the
attendance of students connected to the campus’ WiFi network.
“Why is this necessary?
How does this benefit us? … And is it just going to keep
progressing until we’re
micromanaged every second of the day?”
This style of surveillance has become just another fact of life
for many Americans. A flood
of cameras, sensors and microphones, wired to an online
backbone, now can measure
people’s activity and whereabouts with striking precision,
reducing the mess of everyday
living into trend lines that companies promise to help optimize.
Americans say in surveys they accept the technology’s
encroachment because it often feels
like something else: a trade-off of future worries for the
immediacy of convenience,
comfort and ease. If a tracking system can make students be
better, one college adviser
said, isn’t that a good thing?
But the perils of increasingly intimate supervision — and the
subtle way it can mold how
people act — have also led some to worry whether anyone will
truly know when all this
surveillance has gone too far. “Graduates will be well prepared
… to embrace 24/7
surveillance has gone too far. “Graduates will be well prepared
… to embrace 24/7
government tracking and social credit systems,” one commenter
on the Slashdot message
board said. “Building technology was a lot more fun before it
went all 1984.”
Instead of GPS coordinates, the schools rely on networks of
Bluetooth transmitters and
wireless access points to piece together students’ movements
from dorm to desk. One
company that uses school WiFi networks to monitor movements
says it gathers 6,000
location data points per student every day.
School and company officials call location monitoring a
powerful booster for student
success: If they know more about where students are going, they
argue, they can intervene
before problems arise. But some schools go even further, using
systems that calculate
personalized “risk scores” based on factors such as whether the
student is going to the
library enough.
The dream of some administrators is a university where every
student is a model student,
adhering to disciplined patterns of behavior that are intimately
quantified, surveilled and
analyzed.
But some educators say this move toward heightened
educational vigilance threatens to
undermine students’ independence and prevents them from
pursuing interests beyond the
classroom because they feel they might be watched.
“These administrators have made a justification for surveilling a
student population
because it serves their interests, in terms of the scholarships
that come out of their budget,
the reputation of their programs, the statistics for the school,”
said Kyle M. L. Jones, an
Indiana University assistant professor who researches student
privacy.
https://slashdot.org/
“What’s to say that the institution doesn’t change their eye of
surveillance and start
focusing on minority populations, or anyone else?” he added.
Students “should have all the
rights, responsibilities and privileges that an adult has. So why
do we treat them so
differently?”
Students disagree on whether the campus-tracking systems are a
breach of privacy, and
some argue they have nothing to hide. But one feeling is almost
universally shared,
according to interviews with more than a dozen students and
faculty members: that the
technology is becoming ubiquitous, and that the people being
monitored — their peers,
and themselves — can’t really do anything about it.
“It embodies a very cynical view of education — that it’s
something we need to enforce on
students, almost against their will,” said Erin Rose Glass, a
digital scholarship librarian at
the University of California San Diego. “We’re reinforcing this
sense of powerlessness …
when we could be asking harder questions, like: Why are we
creating institutions where
students don’t want to show up?”
SpotterEDU chief Rick Carter, a former college basketball
coach, said he founded the app
in 2015 as a way to watch over student athletes: Many schools
already pay “class checkers”
to make sure athletes remain eligible to play.
The company now works with nearly 40 schools, he said,
including such universities as
Auburn, Central Florida, Columbia, Indiana and Missouri, as
well as several smaller
colleges and a public high school. More than 1.5 million student
check-ins have been
logged this year nationwide, including in graduate seminars and
chapel services.
SpotterEDU uses Bluetooth beacons roughly the size of a deck
of cards to signal to a
student’s smartphone once a student steps within range.
Installers stick them on walls and
ceilings — the less visible, Carter said, the better. He declined
to allow The Washington
Post to photograph beacons in classrooms, saying “currently
students do not know what
Post to photograph beacons in classrooms, saying “currently
students do not know what
they look like.”
School officials give SpotterEDU the students’ full schedules,
and the system can email a
professor or adviser automatically if a student skips class or
walks in more than two
minutes late. The app records a full timeline of the students’
presence so advisers can see
whether they left early or stepped out for a break.
“Students today have so many distractions,” said Tami
Chievous, an associate athletic
director at the University of Missouri, where advisers text some
freshmen athletes if they
don’t show up within five minutes of class. “We have to make
sure they’re doing the right
thing.”
The Chicago-based company has experimented with ways to
make the surveillance fun,
gamifying students’ schedules with colorful Bitmoji or digital
multiday streaks. But the
real value may be for school officials, who Carter said can split
students into groups, such
as “students of color” or “out-of-state students,” for further
review. When asked why an
official would want to segregate out data on students of color,
Carter said many colleges
already do so, looking for patterns in academic retention and
performance, adding that it
“can provide important data for retention. Even the first few
months of recorded data on
class attendance and performance can help predict how likel y a
group of students is to”
stay enrolled.
Students’ attendance and tardiness are scored into a point
system that some professors
use for grading, Carter said, and schools can use the data to
“take action” against truant
students, such as grabbing back scholarship funds.
students, such as grabbing back scholarship funds.
The system’s national rollout could be made more complicated
by Carter’s history. He
agreed earlier this year to stay more than 2,500 feet from the
athletic offices of DePaul
University, where he was the associate head basketball coach
from 2015 to 2017, following
an order of protection filed against him and allegations that he
had threatened the school’s
athletic director and head basketball coach. The order, Carter
said, is related to NCAA
violations at the program during his time there and has nothing
to do with SpotterEDU.
Rubin, the Syracuse professor, said once-thin classes now boast
more than 90 percent
attendance. But the tracking has not been without its pitfalls:
Earlier versions of the app,
he said, included a button allowing students to instantly share
their exact GPS coordinates,
leading some to inadvertently send him their location while out
at night. The feature has
since been removed.
For even more data, schools can turn to the Austin-based start-
up Degree Analytics, which
uses WiFi check-ins to track the movements of roughly 200,000
students across 19 state
universities, private colleges and other schools.
Launched by the data scientist Aaron Benz in 2017, the
company says in promotional
materials that every student can graduate with “a proper
environment and perhaps a few
nudges along the way.”
Benz tells school administrators that his system can solve “a
real lack of understanding
about the student experience”: By analyzing campus WiFi data,
he said, 98 percent of their
students can be measured and analyzed.
But the company also claims to see much more than just
attendance. By logging the time a
student spends in different parts of the campus, Benz said, his
team has found a way to
identify signs of personal anguish: A student avoiding the
cafeteria might suffer from food
insecurity or an eating disorder; a student skipping class might
be grievously depressed.
The data isn’t conclusive, Benz said, but it can “shine a light on
where people can
investigate, so students don’t slip through the cracks.”
To help find these students, he said, his team designed
algorithms to look for patterns in a
student’s “behavioral state” and automatically flag when their
habits change. He calls it
scaffolding — a temporary support used to build up a student,
removed when they can
stand on their own.
At a Silicon Valley summit in April, Benz outlined a recent
real-life case: that of Student ID
106033, a depressed and “extremely isolated” student he called
Sasha whom the system
had flagged as “highly at-risk” because she only left her dorm
to eat. “At every school,
there are lots of Sashas,” he said. “And the bigger you are, the
more Sashas that you have.”
A classifier algorithm divides the student body into peer groups
— “full-time freshmen,”
say, or “commuter students” — and the system then compares
each student to “normal”
behavior, as defined by their peers. It also generates a “risk
score” for students based
around factors such as how much time they spent in community
centers or at the gym.
The students who deviate from those day-to-day campus
rhythms are flagged for
anomalies, and the company then alerts school officials in case
they want to pursue real-
world intervention. (In Sasha’s case, Benz said, the university
sent an adviser to knock on
her door.)
Some administrators love the avalanche of data these kinds of
WiFi-based systems bring.
“Forget that old ominous line, ‘We know where you live.’ These
days, it’s, ‘We know where
you are,’ ” Purdue University president Mitch Daniels wrote
last year about his school’s
https://www.washingtonpost.com/opinions/its-okay-to-be-
paranoid-someone-is-watching-you/2018/03/27/1a161d4c-2327-
11e8-86f6-
54bfff693d2b_story.html?noredirect=on&tid=lk_inline_manual_
61&itid=lk_inline_manual_61
you are,’ ” Purdue University president Mitch Daniels wrote
last year about his school’s
location-tracking software. “Isn’t technology wonderful?”
But technical experts said they doubted the advertised
capabilities of such systems, which
are mostly untested and unproven in their abilities to pinpoint
student harm. Some
students said most of their classmates also didn’t realize how
much data was being
gathered on their movements. They worried about anyone
knowing intimate details of
their daily walking patterns and whereabouts.
Several students said they didn’t mind a system designed to
keep them honest. But one of
them, a freshman athlete at Temple University who asked to
speak anonymously to avoid
team punishment, said the SpotterEDU app has become a
nightmare, marking him absent
when he’s sitting in class and marking him late when he’s on
time.
He said he squandered several of his early lectures trying to
convince the app he was
present, toggling his settings in desperation as professors
needled him to put the phone
away. He then had to defend himself to campus staff members,
who believed the data
more than him.
His teammates, he said, have suffered through their own
technical headaches, but they’ve
all been told they’ll get in trouble if they delete the app from
their phones.
“We can face repercussions with our coaches and academic
advisers if we don’t show 100
percent attendance,” he said. But “it takes away from my
learning because I’m literally
freaking out, tapping everything to try to get it to work.”
Campus staff, Carter said, can override data errors on a case -by-
case basis, and Rubin said
https://www.washingtonpost.com/opinions/its-okay-to-be-
paranoid-someone-is-watching-you/2018/03/27/1a161d4c-2327-
11e8-86f6-
54bfff693d2b_story.html?noredirect=on&tid=lk_inline_manual_
61&itid=lk_inline_manual_61
a teaching assistant works with students after class to triage
glitches and correct points.
SpotterEDU’s terms of use say its data is not guaranteed to be
“accurate, complete, correct,
adequate, useful, timely, reliable or otherwise.”
Carter said he doesn’t like to say the students are being
“tracked,” because of its potentially
negative connotations; he prefers the term “monitored” instead.
“It’s about building that
relationship,” he said, so students “know you care about them.”
But college leaders have framed the technology in exactly those
terms. In emails this year
between officials at the University of North Carolina, made
available through public-
records requests, a senior associate athletic director said
SpotterEDU would “improve our
ability to track more team members, in more places, more
accurately.”
The emails also revealed the challenge for a college attempting
to roll out student-tracking
systems en masse. In August, near the start of the fall semester,
nearly 150 SpotterEDU
beacons were installed in a blitz across the UNC campus, from
Chapman Hall to the
Woollen Gym. The launch was so sudden that some students
were alarmed to see an
unknown man enter their classroom, stick a small device near
their desks, and walk away.
The student newspaper, the Daily Tar Heel, reported on “an
individual” entering class to
install a “tracking device” and filed for school records related
to the SpotterEDU contract.
Unclear what was happening, the dean of UNC’s journalism
school, Susan King, had
someone yank a beacon off the wall after learning of a
commotion spreading on Facebook.
She told The Post she faulted “stupidity and a lack of
communication” for the panic.
Carter said the frenzy was due to the school’s need for a quick
turnaround and that most
https://www.dailytarheel.com/article/2019/09/student-athlete-
tracking
Carter said the frenzy was due to the school’s need for a quick
turnaround and that most
installations happen when students aren’t in class. (In an email
to UNC staff, Carter later
apologized for the mass installation’s “confusion and chaos.”)
A UNC spokeswoman declined to make anyone available for an
interview, saying only in a
statement that the university was evaluating “streamlined
attendance tracking” for a
“small group of student-athletes.”
But campuswide monitoring appears to be on its way, the emails
show. The school is
planning to shift to a check-in system designed by a UNC
professor, and an IT director
said in an email that the school could install beacons across all
general-purpose
classrooms in time for the spring semester. “Since students have
to download the app, that
is considered notification and opting-in,” one UNC official
wrote.
Chris Gilliard, a professor at Macomb Community College in
Michigan who testified before
Congress last month on privacy and digital rights, said he
worries about the expanding
reach of “surveillance creep”: If these systems work so well in
college, administrators
might argue, why not high school or anywhere else?
The systems, he added, are isolating for students who don’t own
smartphones, coercive for
students who do and unnecessary for professors, who can
accomplish the task with the
same pop quizzes and random checks they’ve used for decades.
“You’re forcing students
into a position,” he said: “Be tracked or be left out.”
Some parents, however, wish their children faced even closer
supervision. Wes Grandstaff,
who said his son, Austin, transformed from a struggling student
to college graduate with
SpotterEDU’s help, said the added surveillance was worth it:
“When you’re a college
SpotterEDU’s help, said the added surveillance was worth it:
“When you’re a college
athlete, they basically own you, so it didn’t matter what he felt:
You’re going to get watched
and babysat whether you like it or not.”
He now says he wishes schools would share the data with
parents, too. “I just cut you a
$30,000 check,” he said, “and I can’t find out if my kid’s going
to class or not?”
Students using Degree Analytics’ WiFi system can opt-out by
clicking “no” on a window
that asks whether they want to help “support student success,
operations and security.”
But Benz, the company’s chief, said very few do.
That is, until last month at VCU, which recently launched a
pilot program to monitor a set
of courses required of all freshmen. Students said they were
frustrated to first learn of the
system in a short email about a “new attendance tool” and were
given only two weeks
before the opt-out deadline passed.
Students quickly scattered the opt-out link across social media,
and the independent
student newspaper, the Commonwealth Times, sowed doubts
about the program’s secrecy
and stated mission, writing, “Student success my ass.” The
university declined to make an
official available for an interview.
One student who opted out, VCU senior Jacie Dannhardt, said
she was furious that the
college had launched first-year students into a tracking program
none of them had ever
heard of. “We’re all still adults. Have a basic respect for our
privacy,” she said. “We don’t
need hall passes anymore.”
The opt-out rate at VCU, Benz said, climbed to roughly half of
all eligible students. But he
blamed the exodus on misunderstanding and a “reactionary
‘cancel culture’ thing.” “We
could have done a much better job communicating, and the great
majority of those
https://commonwealthtimes.org/2019/11/19/tea-time-with-
tagwa-theyre-watching-you/
could have done a much better job communicating, and the great
majority of those
students who could opt out probably wouldn’t have,” he said.
Joanna Grama, an information-security consultant and higher-
education specialist who
has advised the Department of Homeland Security on data
privacy, said she doubted most
students knew they were signing up for long-term monitoring
when they clicked to
connect to the campus WiFi.
She said she worries about school-performance data being used
as part of a “cradle-to-
grave profile” trailing students as they graduate and pursue their
careers. She also
questions how all this digital nudging can affect students’ daily
lives.
“At what point in time do we start crippling a whole generation
of adults, human beings,
who have been so tracked and told what to do all the time that
they don’t know how to
fend for themselves?” she said. “Is that cruel? Or is that kind?”
Alice Crites contributed to this report.
Excerpt from “They Are Watching You—and Everything Else
on the Planet” by Robert Draper (from the February, 2018
edition of The National Geographic magazine – the complete
article with amazing photos is posted on Blackboard)
In 1949, amid the specter of European authoritarianism, the
British novelist George Orwell published his dystopian
masterpiece 1984, with its grim admonition: “Big Brother is
watching you.” As unsettling as this notion may have been,
“watching” was a quaintly circumscribed undertaking back then.
That very year, 1949, an American company released the first
commercially available CCTV system. Two years later, in 1951,
Kodak introduced its Brownie portable movie camera to an
awestruck public.
Today more than 2.5 trillion images are shared or stored on the
Internet annually—to say nothing of the billions more
photographs and videos people keep to themselves. By 2020,
one telecommunications company estimates, 6.1 billion people
will have phones with picture-taking capabilities. Meanwhile, in
a single year an estimated 106 million new surveillance cameras
are sold. More than three million ATMs around the planet stare
back at their customers. Tens of thousands of cameras known as
automatic number plate recognition devices, or ANPRs, hover
over roadways—to catch speeding motorists or parking violators
but also, in the case of the United Kingdom, to track the
comings and goings of suspected criminals. The untallied but
growing number of people wearing body cameras now includes
not just police but also hospital workers and others who aren’t
law enforcement officers. Proliferating as well are personal
monitoring devices—dash cams, cyclist helmet cameras to
record collisions, doorbells equipped with lenses to catch
package thieves—that are fast becoming a part of many a city
dweller’s everyday arsenal. Even less quantifiable, but far more
vexing, are the billions of images of unsuspecting citizens
captured and stored in law enforcement and private-sector
databases over which our control is practically nonexistent.
Those are merely the “watching” devices that we’re capable of
seeing. Presently the skies are cluttered with drones—2.5
million of which were purchased in 2016 by American hobbyists
and businesses. That figure doesn’t include the fleet of
unmanned aerial vehicles used by the U.S. government not only
to bomb terrorists in Yemen but also to help stop illegal
immigrants entering from Mexico, monitor hurricane flooding in
Texas, and catch cattle thieves in North Dakota. Nor does it
include the many thousands of airborne spying devices
employed by other countries—among them Russia, China, Iran,
and North Korea.
We’re being watched from the heavens as well. More than 1,700
satellites monitor our planet. From a distance of about 300
miles, some of them can discern a herd of buffalo or the stages
of a forest fire. From outer space, a camera clicks and a detailed
image of the block where we work can be acquired by a total
stranger.
Simultaneously, on that very same block, we may well be
photographed at unsettlingly close range perhaps dozens of
times daily, from lenses we may never see, our image stored in
databases for purposes we may never learn. Our smartphones,
our Internet accounts are giving away our secrets. Gus Hosein,
the executive director of Privacy International, notes that “if the
police wanted to know what was in your head in the 1800s, they
would have to torture you. Now they can just find it out from
your devices.”
This is—to lift the title from another British futurist, Aldous
Huxley— our brave new world. That we can see it coming is
cold comfort since, as Carnegie Mellon University professor of
information technology Alessandro Acquisti says, “in the cat-
and-mouse game of privacy protection, the data subject is
always the weaker side of the game.” Simply submitting to the
game is a dispiriting proposition. But to actively seek to protect
one’s privacy can be even more demoralizing. University of
Texas American studies professor Randolph Lewis writes in his
new book, Under Surveillance: Being Watched in Modern
America, “Surveillance is often exhausting to those who really
feel its undertow: it overwhelms with its constant badgering, its
omnipresent mysteries, its endless tabulations of movements,
purchases, potentialities.”
The desire for privacy, Acquisti says, “is a universal trait
among humans, across cultures and across time. You find
evidence of it in ancient Rome, ancient Greece, in the Bible, in
the Quran. What’s worrisome is that if all of us at an individual
level suffer from the loss of privacy, society as a whole may
realize its value only after we’ve lost it for good.”
Is a looming state of Orwellian bleakness already a fait
accompli? Or is there a more hopeful outlook, one in which a
world under watch in many ways might be better off? Consider
the 463 infrared camera traps the World Wildlife Fund uses in
China to monitor the movements of the threatened giant panda.
Or the thermal imaging devices that rangers deploy at night to
detect poachers in Kenya’s Masai Mara National Reserve. Or
the sound- activated underwater camera system developed by
UC San Diego researchers that tracks the nearly extinct vaquita
porpoise in the Sea of Cortez. Or the “forest watcher” cameras
installed to help protect the shrinking timberlands of Sri Lanka.
“If you want a picture of the future,” Orwell darkly warned in
his classic, “imagine a boot stamping on a huma n face—
forever.” This authoritarian vision discounts the possibility that
governments might use such tools to make the streets safer.
Recall, for example, the footage from security cameras that
cracked the cases of the 2005 London subway and 2013 Boston
Marathon bombings. Multitudes of more obscure episodes exist,
such as that of Euric Cain, caught unambiguously on camera
shooting a Tulane University medical student named Peter Gold
in 2015 after Gold prevented him from abducting a woman on
the streets of New Orleans. (Gold survived; Cain received a 54-
year prison sentence for a crime rampage that included rapes,
armed robbery, and attempted murder.)
At the Port of Boston, the Department of Homeland Security has
tested a cargo-visualizing method invented by two MIT
physicists, Robert Ledoux and William Bertozzi. Using a
technique known as nuclear resonance fluorescence —in which
elements become identifiable by exciting their nuclei —the
screening device can, without opening a freight container,
discern the elemental fingerprint of its contents. Unlike a
typical x-ray scan, which shows only shape and density, it can
tell the difference between soda and diet soda, natural and
manufactured diamonds, plastics and high-energy explosives,
and nonnuclear and nuclear material.
Does anyone doubt that a more closely inspected world over the
past 150 years would have been a safer one? We might know the
identity of Jack the Ripper, whether Lee Harvey Oswald acted
alone, and if O. J. Simpson acted at all. Of course, public safety
has been the pretext for surveillance before and since Orwell’s
time. But today such technology can be seen as a lifesaver in
more encompassing ways. Thanks to imagery provided by
satellite cameras, relief organizations have located refugees
near Mosul, encamped in the deserts of northern Iraq. And
thanks to numerous space probes, scientists have proof that the
world’s climate is dramatically changing.
Could the great Orwell’s imagination have failed? Could Big
Brother save humanity, rather than enslave it? Or might both
scenarios be true at the same time?
Essay 2 Works Cited
Draper, Robert. “They Are Watching You.” National
Geographic, Feb. 2018,
https://mccc.idm.oclc.org/login?url=https://search-proquest-
com.mccc.idm.oclc.org/docview/20269 58259?accountid=40611.
Accessed 25 March 2020.
Harwell, Drew. “Colleges Are Turning Students’ Phones into
Surveillance Machines, Tracking the Locations of Hundreds of
Thousands.” The Washington Post, 24 Dec. 2019,
www.washingtonpost.com/technology/2019/12/24/colleges-are-
turning-students-phones-into-surveillance-machines-tracking-
locations-hundreds-thousands/. Accessed 1 April 2020.
Singer, Peter. “Visible Man: Ethics in a World without Secrets.”
Emerging, edited by Barclay Barrios, Bedford/St. Martins,
2016, pp. 425-431.
ENG101 Essay 2 Vocabulary Sheet
ENG101-450 Essay 2 Vocabulary Sheet
www.onelook.com is a good site for finding definitions and
synonyms.
INSTRUCTIONS: For words from “Visible Man: Ethics in a
World without Secrets” by Peter Singer:
1. copy the sentence (or phrase) in which the word is used on
the line between quotation marks.
2. Then write the definition of the word in the space below BY
HAND. It is important to notice the way the word is used in the
sentence and to CHOOSE THE CORRECT DEFINITION. Also,
notice the part of speech (ADJ means “adjective”). The first
word is done for you.
disseminate VERB par. 2 “Technological breakthroughs have
made it easy to collect, store, and disseminate data on
individuals, corporations, and even the government”
Definition: to make something such as information or
knowledge available to a lot of people
troves NOUN par. 2
“____________________________________________________
_____________”
mug shots NOUN par. 3
“____________________________________________________
___________”
scrutiny NOUN par. 5
“____________________________________________________
_____________”
norms NOUN par. 8
“____________________________________________________
______________”
totalitarian ADJ par. 9
“____________________________________________________
_____________”
intrusion NOUN par. 9
“____________________________________________________
____________”
intercept VERB par 10
“____________________________________________________
____________”
malicious ADJ par. 10
“____________________________________________________
____________”
harass VERB par. 11
“____________________________________________________
____________”
vehemently ADVERB from vehement ADJ par. 13
“__________________________________________”
misleading ADJ par. 14
“____________________________________________________
___________”
woefully ADVERB from woeful ADJ par. 14
“________________________________________________”
leaks NOUN par. 14
“____________________________________________________
______________”
aftermath NOUN par. 16
“____________________________________________________
__________”
align VERB par. 20
“____________________________________________________
_______________”
scrupulous ADJ par.22
“____________________________________________________
____________”
reckless ADJ par. 22
“____________________________________________________
_____________”
callous ADJ par. 22
“____________________________________________________
______________”
altruistic ADJ par. 25
“________________________________________________ ____
_____________”
curtail VERB par. 25
“____________________________________________________
_____________”
Essay 2 Outline Template: Send your outline to my email on
Monday, MARCH 23, 10:30am.
BASIC STRUCTURE FOR ESSAY 2: Include these elements in
your outline. Type your outline in the right column
Use the BIG QUESTION andtopic sentences that I give you.
Then develop the paragraph following the structure in the left
column. List your main points. Type your quotations. Include
page numbers in parentheses after the quotations from Singer’s
article.
INTRODUCTORY PARAGRAPH
· GENERAL TOPIC of this essay: DIGITAL SURVEILLANCE
· SPECIFIC TOPIC of this essay: DIGITAL SURVEILLANCE
OF COLLEGE STUDENTS
· Briefly introduce your SOURCES with “Title” and full
authors’ names.
· Write the BIG QUESTION for this essay
· THESIS STATEMENT: Answer the BIG QUESTION in the
thesis statement.
USE A QUOTATION FROM: “They Are Watching You – and
Everything Else on the Planet” by Robert Draper as a “HOOK”
to catch your reader’s attention in the introductory paragraph.
BIG QUESTION: Taking into consideration Peter Singer’s
argument in “Visible Man: Ethics in a World without Secrets”
and the pros and cons in “Colleges Are Turning Students’
Phones into Surveillance Machines,” do you think that colleges
should track students using their phones?
BODY PARAGRAPH 1:
“Visible Man: Ethics in a World without Secrets”
· TOPIC SENTENCE
Summarize/QUOTE the key points in Singer’s article including:
· The Panopticon
· The BAD USES of digital surveillance
· The GOOD USES of digital surveillance
TOPIC SENTENCE: In “Visible Man: Ethics in a World without
Secrets,” Peter Singer considers several uses – good and bad –
of digital surveillance.
BODY PARAGRAPH 2:
“Colleges Are Turning Students’ Phones into Surveillance
Machines”
· TOPIC SENTENCE
· Summarize the PROS and CONS from the article (with
QUOTATIONS) of surveilling students through their phones.
TOPIC SENTENCE: “Colleges Are Turning Students’ Phones
into Surveillance Machines, Tracking the Locations of Hundreds
of Thousands” by Drew Harwell examines the pros and cons of
a specific use of digital surveillance.
BODY PARAGRAPH 3: Your position after reading and
thinking about all three sources.
· Answer THE BIG QUESTION in this paragraph
· Include IDEAS from Peter Singer’s article that could apply to
the PROS and CONS of tracking college students. Would he
think this is a good thing? A bad thing? Both?
· Evaluate the evidence and give YOUR OWN OPINION about
colleges’ tracking students through their phones.
TOPIC SENTENCE = THESIS STATEMENT: your answer the
BIG QUESTION.
CONCLUDING PARAGRAPH: Restate your thesis statement --
the answer to the BIG QUESTION -- with different words and
reflect on your essay.
ENG101-450 Essay 2 Overview
THE TOPIC FOR ESSAY 2: Digital Surveillance of Students on
College Campuses: Good or Bad?
Last day to turn in Essay 2: April 1, midnight.
SOURCES FOR ESSAY 2
“They Are Watching You – and Everything Else on the Planet”
by Robert Draper
“Colleges Are Turning Students’ Phones into Surveillance
Machines, Tracking the Locations of Hundreds of Thousands”
by Drew Harwell
“Visible Man: Ethics in a World without Secrets” by Peter
Singer
Essay 2 BIG QUESTION: BIG QUESTION: Taking into
consideration Peter Singer’s argumen t in “Visible Man: Ethics
in a World without Secrets” and the pros and cons in “Colleges
Are Turning Students’ Phones into Surveillance Machines,” do
you think that colleges should track students using their
phones?
Essay 2 is an exploration of a topic combining what other
people think about our topic (They Say) with your perspective
(I Say). In Essay 2, we focus on the PROS and CONS of
colleges’ using students’ phones as tracking devices for several
reasons. As you approach this essay, you should be fair to the
college administrators and professors: in other words, we should
ASSUME a priori (from the start) that their intentions are to
help students be successful and safe at the college. HOWEVER,
this does not mean that this surveillance is a good or ethical
practice: this is the question that you will tackle in this essay.
STEP 1 of writing this essay: Read and understand the articles.
· Complete the Vocabulary Sheet for Singer’s article.
· Annotate (write on, underline, highlight) your copies of the
articles.
· Look for evidence that could help you answer the BIG
QUESTION in your essay.
STEP 2 of writing this essay: Complete the Essay 2 Log. Email
me your LOG by Friday, March 13.
STEP 2: Fill out the Essay 2 Outline Template. This outline will
be similar to the outline for Essay 1. I will post it in the Essay 2
folder. It is important to type QUOTATIONS for key points in
your paragraphs. (Keep the quotations as short as possible.)
NEW DUE DATE: The outline is due on email by Monday,
March 23 at 10:30am. If you do not send me your outline on
time, I will not give you credit for it in your final grade. I
WILL RESPOND TO YOU WITH COMMENTS AND
SUGGESTIONS.
STEP 3: Follow your OUTLINE and write the FIRST DRAFT.
Email me your COMPLETE FIRST DRAFT by midnight
Wednesday, March 25. I WILL RESPOND TO YOU WITH MY
COMMENTS AND SUGGESTIONS on Thursday. If you do not
email me your first draft, I will deduct points from your essay
grade.
NEW: By Sunday, March 29 at noon, upload your ESSAY 2
DRAFT to the Discussion Forum. I will pair you with another
student to give each other feedback on your essays. Feedback is
due by midnight on March 30.
STEP 4: Complete the FINAL DRAFT. Email me your FINAL
DRAFT by midnight, April 1.

More Related Content

Similar to Essay 2 Log Type or write on this Log and email it to me by Frida

EducationColleges want freshmen to use mental health apps. B.docx
EducationColleges want freshmen to use mental health apps. B.docxEducationColleges want freshmen to use mental health apps. B.docx
EducationColleges want freshmen to use mental health apps. B.docxbudabrooks46239
 
assignment1_PatrickRiley.docx
assignment1_PatrickRiley.docxassignment1_PatrickRiley.docx
assignment1_PatrickRiley.docxPatRiley16
 
Module 1 b edu 650
Module 1 b edu 650Module 1 b edu 650
Module 1 b edu 650kareneckroth
 
Running head STUDENTS DEPENDENCE ON PERSONAL DIGITAL TECHNOLOGY 1.docx
Running head STUDENTS DEPENDENCE ON PERSONAL DIGITAL TECHNOLOGY 1.docxRunning head STUDENTS DEPENDENCE ON PERSONAL DIGITAL TECHNOLOGY 1.docx
Running head STUDENTS DEPENDENCE ON PERSONAL DIGITAL TECHNOLOGY 1.docxtoltonkendal
 
Effect of Gadget on student.pdf
Effect of Gadget on student.pdfEffect of Gadget on student.pdf
Effect of Gadget on student.pdfMandeepMehta7
 
This discovery of yours will create forgetfulness in the learners. They will ...
This discovery of yours will create forgetfulness in the learners. They will ...This discovery of yours will create forgetfulness in the learners. They will ...
This discovery of yours will create forgetfulness in the learners. They will ...alanwylie
 
THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...
THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...
THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...eraser Juan José Calderón
 
Classification of Student’s E-Learning Experiences’ in Social Media via Text ...
Classification of Student’s E-Learning Experiences’ in Social Media via Text ...Classification of Student’s E-Learning Experiences’ in Social Media via Text ...
Classification of Student’s E-Learning Experiences’ in Social Media via Text ...iosrjce
 
A TOUR OF THE STUDENT’S E-LEARNING PUDDLE
A TOUR OF THE STUDENT’S E-LEARNING PUDDLEA TOUR OF THE STUDENT’S E-LEARNING PUDDLE
A TOUR OF THE STUDENT’S E-LEARNING PUDDLEacijjournal
 
Digital Social Networking & Health Care Education
Digital  Social Networking & Health Care EducationDigital  Social Networking & Health Care Education
Digital Social Networking & Health Care EducationDominick Maino
 
Caribbean studies IA Dejon Harris
Caribbean studies IA Dejon HarrisCaribbean studies IA Dejon Harris
Caribbean studies IA Dejon HarrisDejon Harris
 
A Review of Big Data Analytics in Sector of Higher Education
A Review of Big Data Analytics in Sector of Higher EducationA Review of Big Data Analytics in Sector of Higher Education
A Review of Big Data Analytics in Sector of Higher EducationIJERA Editor
 
Virtual Reality: Using Technology to Increase Enrollment at Western Oregon Un...
Virtual Reality: Using Technology to Increase Enrollment at Western Oregon Un...Virtual Reality: Using Technology to Increase Enrollment at Western Oregon Un...
Virtual Reality: Using Technology to Increase Enrollment at Western Oregon Un...David Compton
 
"The Influence of Online Studies and Information using Learning Analytics"
"The Influence of Online Studies and Information using Learning Analytics""The Influence of Online Studies and Information using Learning Analytics"
"The Influence of Online Studies and Information using Learning Analytics"Fahmi Ahmed
 
Intelligent solution for automatic online exam monitoring
Intelligent solution for automatic online exam monitoring Intelligent solution for automatic online exam monitoring
Intelligent solution for automatic online exam monitoring IJECEIAES
 
Terra,When speaking about program evaluation, that is an essenti.docx
Terra,When speaking about program evaluation, that is an essenti.docxTerra,When speaking about program evaluation, that is an essenti.docx
Terra,When speaking about program evaluation, that is an essenti.docxbradburgess22840
 
insight-centre-galway-learning-analytics
insight-centre-galway-learning-analyticsinsight-centre-galway-learning-analytics
insight-centre-galway-learning-analyticsSimon Buckingham Shum
 

Similar to Essay 2 Log Type or write on this Log and email it to me by Frida (19)

EducationColleges want freshmen to use mental health apps. B.docx
EducationColleges want freshmen to use mental health apps. B.docxEducationColleges want freshmen to use mental health apps. B.docx
EducationColleges want freshmen to use mental health apps. B.docx
 
assignment1_PatrickRiley.docx
assignment1_PatrickRiley.docxassignment1_PatrickRiley.docx
assignment1_PatrickRiley.docx
 
Module 1 b edu 650
Module 1 b edu 650Module 1 b edu 650
Module 1 b edu 650
 
Learning and Educational Analytics
Learning and Educational AnalyticsLearning and Educational Analytics
Learning and Educational Analytics
 
Running head STUDENTS DEPENDENCE ON PERSONAL DIGITAL TECHNOLOGY 1.docx
Running head STUDENTS DEPENDENCE ON PERSONAL DIGITAL TECHNOLOGY 1.docxRunning head STUDENTS DEPENDENCE ON PERSONAL DIGITAL TECHNOLOGY 1.docx
Running head STUDENTS DEPENDENCE ON PERSONAL DIGITAL TECHNOLOGY 1.docx
 
Effect of Gadget on student.pdf
Effect of Gadget on student.pdfEffect of Gadget on student.pdf
Effect of Gadget on student.pdf
 
This discovery of yours will create forgetfulness in the learners. They will ...
This discovery of yours will create forgetfulness in the learners. They will ...This discovery of yours will create forgetfulness in the learners. They will ...
This discovery of yours will create forgetfulness in the learners. They will ...
 
THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...
THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...
THE EVOLUTION OF BIG DATA AND LEARNING ANALYTICS IN AMERICAN HIGHER EDUCATION...
 
Classification of Student’s E-Learning Experiences’ in Social Media via Text ...
Classification of Student’s E-Learning Experiences’ in Social Media via Text ...Classification of Student’s E-Learning Experiences’ in Social Media via Text ...
Classification of Student’s E-Learning Experiences’ in Social Media via Text ...
 
L017368189
L017368189L017368189
L017368189
 
A TOUR OF THE STUDENT’S E-LEARNING PUDDLE
A TOUR OF THE STUDENT’S E-LEARNING PUDDLEA TOUR OF THE STUDENT’S E-LEARNING PUDDLE
A TOUR OF THE STUDENT’S E-LEARNING PUDDLE
 
Digital Social Networking & Health Care Education
Digital  Social Networking & Health Care EducationDigital  Social Networking & Health Care Education
Digital Social Networking & Health Care Education
 
Caribbean studies IA Dejon Harris
Caribbean studies IA Dejon HarrisCaribbean studies IA Dejon Harris
Caribbean studies IA Dejon Harris
 
A Review of Big Data Analytics in Sector of Higher Education
A Review of Big Data Analytics in Sector of Higher EducationA Review of Big Data Analytics in Sector of Higher Education
A Review of Big Data Analytics in Sector of Higher Education
 
Virtual Reality: Using Technology to Increase Enrollment at Western Oregon Un...
Virtual Reality: Using Technology to Increase Enrollment at Western Oregon Un...Virtual Reality: Using Technology to Increase Enrollment at Western Oregon Un...
Virtual Reality: Using Technology to Increase Enrollment at Western Oregon Un...
 
"The Influence of Online Studies and Information using Learning Analytics"
"The Influence of Online Studies and Information using Learning Analytics""The Influence of Online Studies and Information using Learning Analytics"
"The Influence of Online Studies and Information using Learning Analytics"
 
Intelligent solution for automatic online exam monitoring
Intelligent solution for automatic online exam monitoring Intelligent solution for automatic online exam monitoring
Intelligent solution for automatic online exam monitoring
 
Terra,When speaking about program evaluation, that is an essenti.docx
Terra,When speaking about program evaluation, that is an essenti.docxTerra,When speaking about program evaluation, that is an essenti.docx
Terra,When speaking about program evaluation, that is an essenti.docx
 
insight-centre-galway-learning-analytics
insight-centre-galway-learning-analyticsinsight-centre-galway-learning-analytics
insight-centre-galway-learning-analytics
 

More from cullenrjzsme

Answer questions on the attached doc each answer must be minimum 250.docx
Answer questions on the attached doc each answer must be minimum 250.docxAnswer questions on the attached doc each answer must be minimum 250.docx
Answer questions on the attached doc each answer must be minimum 250.docxcullenrjzsme
 
Answer QuestionCompare and contrast the two types of totalitaria.docx
Answer QuestionCompare and contrast the two types of totalitaria.docxAnswer QuestionCompare and contrast the two types of totalitaria.docx
Answer QuestionCompare and contrast the two types of totalitaria.docxcullenrjzsme
 
Answer question in 8 or more sentences.1. In the colonial world,.docx
Answer question in 8 or more sentences.1. In the colonial world,.docxAnswer question in 8 or more sentences.1. In the colonial world,.docx
Answer question in 8 or more sentences.1. In the colonial world,.docxcullenrjzsme
 
Answer T for True or F for False (write clearly!)16._____.docx
Answer T for True or F for False (write clearly!)16._____.docxAnswer T for True or F for False (write clearly!)16._____.docx
Answer T for True or F for False (write clearly!)16._____.docxcullenrjzsme
 
answer must begin as follows and have 4 points and 4 sourcesI agr.docx
answer must begin as follows and have 4 points and 4 sourcesI agr.docxanswer must begin as follows and have 4 points and 4 sourcesI agr.docx
answer must begin as follows and have 4 points and 4 sourcesI agr.docxcullenrjzsme
 
answer must begin as follows and have 4 points and 4 sourcesI a.docx
answer must begin as follows and have 4 points and 4 sourcesI a.docxanswer must begin as follows and have 4 points and 4 sourcesI a.docx
answer must begin as follows and have 4 points and 4 sourcesI a.docxcullenrjzsme
 
answer must begin as follows and have 4 points and 4 sourcesI.docx
answer must begin as follows and have 4 points and 4 sourcesI.docxanswer must begin as follows and have 4 points and 4 sourcesI.docx
answer must begin as follows and have 4 points and 4 sourcesI.docxcullenrjzsme
 
Answer follow question1. Explain what sociologists mean by t.docx
Answer follow question1. Explain what sociologists mean by t.docxAnswer follow question1. Explain what sociologists mean by t.docx
Answer follow question1. Explain what sociologists mean by t.docxcullenrjzsme
 
Answer each question with a high quality response. Please provide an.docx
Answer each question with a high quality response. Please provide an.docxAnswer each question with a high quality response. Please provide an.docx
Answer each question with a high quality response. Please provide an.docxcullenrjzsme
 
Answer each question fully. The finance department of a large co.docx
Answer each question fully. The finance department of a large co.docxAnswer each question fully. The finance department of a large co.docx
Answer each question fully. The finance department of a large co.docxcullenrjzsme
 
Answer each part in essay format.Explain rights and procedures of .docx
Answer each part in essay format.Explain rights and procedures of .docxAnswer each part in essay format.Explain rights and procedures of .docx
Answer each part in essay format.Explain rights and procedures of .docxcullenrjzsme
 
ANSWER QUESTIONCompare and contrast the personalities and polici.docx
ANSWER QUESTIONCompare and contrast the personalities and polici.docxANSWER QUESTIONCompare and contrast the personalities and polici.docx
ANSWER QUESTIONCompare and contrast the personalities and polici.docxcullenrjzsme
 
answer questions attached.. 21). Give the name, date, location o.docx
answer questions attached.. 21). Give the name, date, location o.docxanswer questions attached.. 21). Give the name, date, location o.docx
answer questions attached.. 21). Give the name, date, location o.docxcullenrjzsme
 
Answer each of the following questions in regards to the two pieces .docx
Answer each of the following questions in regards to the two pieces .docxAnswer each of the following questions in regards to the two pieces .docx
Answer each of the following questions in regards to the two pieces .docxcullenrjzsme
 
answer each with at least 100 words.PromptTopic Anton grew u.docx
answer each with at least 100 words.PromptTopic Anton grew u.docxanswer each with at least 100 words.PromptTopic Anton grew u.docx
answer each with at least 100 words.PromptTopic Anton grew u.docxcullenrjzsme
 
Answer each of the following 4 questions with a 3-5 sentence.docx
Answer each of the following 4 questions with a 3-5 sentence.docxAnswer each of the following 4 questions with a 3-5 sentence.docx
Answer each of the following 4 questions with a 3-5 sentence.docxcullenrjzsme
 
Answer questions1. Describe various forms of internal and ext.docx
Answer questions1. Describe various forms of internal and ext.docxAnswer questions1. Describe various forms of internal and ext.docx
Answer questions1. Describe various forms of internal and ext.docxcullenrjzsme
 
Answer 5 question2 pagessingle space 12 font1.How do.docx
Answer 5 question2 pagessingle space 12 font1.How do.docxAnswer 5 question2 pagessingle space 12 font1.How do.docx
Answer 5 question2 pagessingle space 12 font1.How do.docxcullenrjzsme
 
Answer all three questions. Write 3 pages for each answer. 1.B.docx
Answer all three questions. Write 3 pages for each answer. 1.B.docxAnswer all three questions. Write 3 pages for each answer. 1.B.docx
Answer all three questions. Write 3 pages for each answer. 1.B.docxcullenrjzsme
 
Answer both of the questions below 1.Discuss two differences i.docx
Answer both of the questions below 1.Discuss two differences i.docxAnswer both of the questions below 1.Discuss two differences i.docx
Answer both of the questions below 1.Discuss two differences i.docxcullenrjzsme
 

More from cullenrjzsme (20)

Answer questions on the attached doc each answer must be minimum 250.docx
Answer questions on the attached doc each answer must be minimum 250.docxAnswer questions on the attached doc each answer must be minimum 250.docx
Answer questions on the attached doc each answer must be minimum 250.docx
 
Answer QuestionCompare and contrast the two types of totalitaria.docx
Answer QuestionCompare and contrast the two types of totalitaria.docxAnswer QuestionCompare and contrast the two types of totalitaria.docx
Answer QuestionCompare and contrast the two types of totalitaria.docx
 
Answer question in 8 or more sentences.1. In the colonial world,.docx
Answer question in 8 or more sentences.1. In the colonial world,.docxAnswer question in 8 or more sentences.1. In the colonial world,.docx
Answer question in 8 or more sentences.1. In the colonial world,.docx
 
Answer T for True or F for False (write clearly!)16._____.docx
Answer T for True or F for False (write clearly!)16._____.docxAnswer T for True or F for False (write clearly!)16._____.docx
Answer T for True or F for False (write clearly!)16._____.docx
 
answer must begin as follows and have 4 points and 4 sourcesI agr.docx
answer must begin as follows and have 4 points and 4 sourcesI agr.docxanswer must begin as follows and have 4 points and 4 sourcesI agr.docx
answer must begin as follows and have 4 points and 4 sourcesI agr.docx
 
answer must begin as follows and have 4 points and 4 sourcesI a.docx
answer must begin as follows and have 4 points and 4 sourcesI a.docxanswer must begin as follows and have 4 points and 4 sourcesI a.docx
answer must begin as follows and have 4 points and 4 sourcesI a.docx
 
answer must begin as follows and have 4 points and 4 sourcesI.docx
answer must begin as follows and have 4 points and 4 sourcesI.docxanswer must begin as follows and have 4 points and 4 sourcesI.docx
answer must begin as follows and have 4 points and 4 sourcesI.docx
 
Answer follow question1. Explain what sociologists mean by t.docx
Answer follow question1. Explain what sociologists mean by t.docxAnswer follow question1. Explain what sociologists mean by t.docx
Answer follow question1. Explain what sociologists mean by t.docx
 
Answer each question with a high quality response. Please provide an.docx
Answer each question with a high quality response. Please provide an.docxAnswer each question with a high quality response. Please provide an.docx
Answer each question with a high quality response. Please provide an.docx
 
Answer each question fully. The finance department of a large co.docx
Answer each question fully. The finance department of a large co.docxAnswer each question fully. The finance department of a large co.docx
Answer each question fully. The finance department of a large co.docx
 
Answer each part in essay format.Explain rights and procedures of .docx
Answer each part in essay format.Explain rights and procedures of .docxAnswer each part in essay format.Explain rights and procedures of .docx
Answer each part in essay format.Explain rights and procedures of .docx
 
ANSWER QUESTIONCompare and contrast the personalities and polici.docx
ANSWER QUESTIONCompare and contrast the personalities and polici.docxANSWER QUESTIONCompare and contrast the personalities and polici.docx
ANSWER QUESTIONCompare and contrast the personalities and polici.docx
 
answer questions attached.. 21). Give the name, date, location o.docx
answer questions attached.. 21). Give the name, date, location o.docxanswer questions attached.. 21). Give the name, date, location o.docx
answer questions attached.. 21). Give the name, date, location o.docx
 
Answer each of the following questions in regards to the two pieces .docx
Answer each of the following questions in regards to the two pieces .docxAnswer each of the following questions in regards to the two pieces .docx
Answer each of the following questions in regards to the two pieces .docx
 
answer each with at least 100 words.PromptTopic Anton grew u.docx
answer each with at least 100 words.PromptTopic Anton grew u.docxanswer each with at least 100 words.PromptTopic Anton grew u.docx
answer each with at least 100 words.PromptTopic Anton grew u.docx
 
Answer each of the following 4 questions with a 3-5 sentence.docx
Answer each of the following 4 questions with a 3-5 sentence.docxAnswer each of the following 4 questions with a 3-5 sentence.docx
Answer each of the following 4 questions with a 3-5 sentence.docx
 
Answer questions1. Describe various forms of internal and ext.docx
Answer questions1. Describe various forms of internal and ext.docxAnswer questions1. Describe various forms of internal and ext.docx
Answer questions1. Describe various forms of internal and ext.docx
 
Answer 5 question2 pagessingle space 12 font1.How do.docx
Answer 5 question2 pagessingle space 12 font1.How do.docxAnswer 5 question2 pagessingle space 12 font1.How do.docx
Answer 5 question2 pagessingle space 12 font1.How do.docx
 
Answer all three questions. Write 3 pages for each answer. 1.B.docx
Answer all three questions. Write 3 pages for each answer. 1.B.docxAnswer all three questions. Write 3 pages for each answer. 1.B.docx
Answer all three questions. Write 3 pages for each answer. 1.B.docx
 
Answer both of the questions below 1.Discuss two differences i.docx
Answer both of the questions below 1.Discuss two differences i.docxAnswer both of the questions below 1.Discuss two differences i.docx
Answer both of the questions below 1.Discuss two differences i.docx
 

Recently uploaded

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 

Recently uploaded (20)

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 

Essay 2 Log Type or write on this Log and email it to me by Frida

  • 1. Essay 2 Log: Type or write on this Log and email it to me by Friday, March 13. (OPTIONAL: if you compete this log in your notebook - and it is LEGGIBLE - you can take a picture of it to email me.) Remember that LOGS and OUTLINES account for 10% of your FINAL GRADE. Part 1: Read and annotate (underline, highlight, etc.) “Colleges Are Turning Students’ Phones into Surveillance Machines, Tracking the Locations of Hundreds of Thousands” by Drew Harwell. · Make two LISTS of the most important PROS and CONS of this surveillance mentioned by the ARTICLE (They Say)? · Freewrite your RESPONSE to these PROS and CONS (I Say). PROS: IDEA + QUOTATION that illustrates this idea CONS: IDEA + QUOTATION that illustrates this idea
  • 2. MY RESPONSE TO THE PROS AND CONS: Answer this question: Do you think, on balance, that tracking college students is a good or bad thing? Of course, you can say that it is BOTH GOOD AND BAD, but in that case, how can colleges reduce the negative impacts and increase the helpful aspects? Part 2: Read and annotate (underline, highlight, etc.) “Visible Man: Ethics in a World without Secrets.” Fill in the chart below. You are looking for IDEAS and EVIDENCE from this article that 1) sums up SINGER’S MAIN POINTS and 2) you can CONNECT to the question of college surveillance of students. QUOTATIONS form “Visible Man” WHAT THE QUOTATION MEANS: In other words….. HOW THIS IDEA COULD RELATE TO “Colleges Are Turning Students…”
  • 3. Democracy Dies in Darkness Colleges are turning students’ phones into surveillance machines, tracking the locations of hundreds of thousands By Dec. 24, 2019 at 8:00 a.m. EST When Syracuse University freshmen walk into professor Jeff Rubin’s Introduction to Information Technologies class, seven small Bluetooth beacons hidden around the Grant Auditorium lecture hall connect with an app on their smartphones and boost their “attendance points.”
  • 4. And when they skip class? The SpotterEDU app sees that, too, logging their absence into a campus database that tracks them over time and can sink their grade. It also alerts Rubin, who later contacts students to ask where they’ve been. His 340- person lecture has never been so full. “They want those points,” he said. “They know I’m watching and acting on it. So, behaviorally, they change.” Drew Harwell https://spotteredu.com/ https://www.washingtonpost.com/people/drew-harwell/ Short-range phone sensors and campuswide WiFi networks are empowering colleges across the United States to track hundreds of thousands of students more precisely than ever before. Dozens of schools now use such technology to monitor students’ academic performance, analyze their conduct or assess their mental health. But some professors and education advocates argue that the systems represent a new low in intrusive technology, breaching students’ privacy on a massive scale. The tracking systems, they worry, will infantilize students in the very place where they’re expected to grow into adults, further training them to see surveillance as a normal part of living, whether they like it or not.
  • 5. “We’re adults. Do we really need to be tracked?” said Robby Pfeifer, a sophomore at Virginia Commonwealth University in Richmond, which recently began logging the attendance of students connected to the campus’ WiFi network. “Why is this necessary? How does this benefit us? … And is it just going to keep progressing until we’re micromanaged every second of the day?” This style of surveillance has become just another fact of life for many Americans. A flood of cameras, sensors and microphones, wired to an online backbone, now can measure people’s activity and whereabouts with striking precision, reducing the mess of everyday living into trend lines that companies promise to help optimize. Americans say in surveys they accept the technology’s encroachment because it often feels like something else: a trade-off of future worries for the immediacy of convenience, comfort and ease. If a tracking system can make students be better, one college adviser said, isn’t that a good thing? But the perils of increasingly intimate supervision — and the subtle way it can mold how people act — have also led some to worry whether anyone will truly know when all this surveillance has gone too far. “Graduates will be well prepared … to embrace 24/7
  • 6. surveillance has gone too far. “Graduates will be well prepared … to embrace 24/7 government tracking and social credit systems,” one commenter on the Slashdot message board said. “Building technology was a lot more fun before it went all 1984.” Instead of GPS coordinates, the schools rely on networks of Bluetooth transmitters and wireless access points to piece together students’ movements from dorm to desk. One company that uses school WiFi networks to monitor movements says it gathers 6,000 location data points per student every day. School and company officials call location monitoring a powerful booster for student success: If they know more about where students are going, they argue, they can intervene before problems arise. But some schools go even further, using systems that calculate personalized “risk scores” based on factors such as whether the student is going to the library enough. The dream of some administrators is a university where every student is a model student, adhering to disciplined patterns of behavior that are intimately quantified, surveilled and analyzed. But some educators say this move toward heightened educational vigilance threatens to undermine students’ independence and prevents them from pursuing interests beyond the classroom because they feel they might be watched.
  • 7. “These administrators have made a justification for surveilling a student population because it serves their interests, in terms of the scholarships that come out of their budget, the reputation of their programs, the statistics for the school,” said Kyle M. L. Jones, an Indiana University assistant professor who researches student privacy. https://slashdot.org/ “What’s to say that the institution doesn’t change their eye of surveillance and start focusing on minority populations, or anyone else?” he added. Students “should have all the rights, responsibilities and privileges that an adult has. So why do we treat them so differently?” Students disagree on whether the campus-tracking systems are a breach of privacy, and some argue they have nothing to hide. But one feeling is almost universally shared, according to interviews with more than a dozen students and faculty members: that the technology is becoming ubiquitous, and that the people being monitored — their peers, and themselves — can’t really do anything about it. “It embodies a very cynical view of education — that it’s something we need to enforce on students, almost against their will,” said Erin Rose Glass, a digital scholarship librarian at the University of California San Diego. “We’re reinforcing this
  • 8. sense of powerlessness … when we could be asking harder questions, like: Why are we creating institutions where students don’t want to show up?” SpotterEDU chief Rick Carter, a former college basketball coach, said he founded the app in 2015 as a way to watch over student athletes: Many schools already pay “class checkers” to make sure athletes remain eligible to play. The company now works with nearly 40 schools, he said, including such universities as Auburn, Central Florida, Columbia, Indiana and Missouri, as well as several smaller colleges and a public high school. More than 1.5 million student check-ins have been logged this year nationwide, including in graduate seminars and chapel services. SpotterEDU uses Bluetooth beacons roughly the size of a deck of cards to signal to a student’s smartphone once a student steps within range. Installers stick them on walls and ceilings — the less visible, Carter said, the better. He declined to allow The Washington Post to photograph beacons in classrooms, saying “currently students do not know what Post to photograph beacons in classrooms, saying “currently students do not know what they look like.” School officials give SpotterEDU the students’ full schedules,
  • 9. and the system can email a professor or adviser automatically if a student skips class or walks in more than two minutes late. The app records a full timeline of the students’ presence so advisers can see whether they left early or stepped out for a break. “Students today have so many distractions,” said Tami Chievous, an associate athletic director at the University of Missouri, where advisers text some freshmen athletes if they don’t show up within five minutes of class. “We have to make sure they’re doing the right thing.” The Chicago-based company has experimented with ways to make the surveillance fun, gamifying students’ schedules with colorful Bitmoji or digital multiday streaks. But the real value may be for school officials, who Carter said can split students into groups, such as “students of color” or “out-of-state students,” for further review. When asked why an official would want to segregate out data on students of color, Carter said many colleges already do so, looking for patterns in academic retention and performance, adding that it “can provide important data for retention. Even the first few months of recorded data on class attendance and performance can help predict how likel y a group of students is to” stay enrolled. Students’ attendance and tardiness are scored into a point system that some professors use for grading, Carter said, and schools can use the data to
  • 10. “take action” against truant students, such as grabbing back scholarship funds. students, such as grabbing back scholarship funds. The system’s national rollout could be made more complicated by Carter’s history. He agreed earlier this year to stay more than 2,500 feet from the athletic offices of DePaul University, where he was the associate head basketball coach from 2015 to 2017, following an order of protection filed against him and allegations that he had threatened the school’s athletic director and head basketball coach. The order, Carter said, is related to NCAA violations at the program during his time there and has nothing to do with SpotterEDU. Rubin, the Syracuse professor, said once-thin classes now boast more than 90 percent attendance. But the tracking has not been without its pitfalls: Earlier versions of the app, he said, included a button allowing students to instantly share their exact GPS coordinates, leading some to inadvertently send him their location while out at night. The feature has since been removed. For even more data, schools can turn to the Austin-based start- up Degree Analytics, which uses WiFi check-ins to track the movements of roughly 200,000 students across 19 state universities, private colleges and other schools.
  • 11. Launched by the data scientist Aaron Benz in 2017, the company says in promotional materials that every student can graduate with “a proper environment and perhaps a few nudges along the way.” Benz tells school administrators that his system can solve “a real lack of understanding about the student experience”: By analyzing campus WiFi data, he said, 98 percent of their students can be measured and analyzed. But the company also claims to see much more than just attendance. By logging the time a student spends in different parts of the campus, Benz said, his team has found a way to identify signs of personal anguish: A student avoiding the cafeteria might suffer from food insecurity or an eating disorder; a student skipping class might be grievously depressed. The data isn’t conclusive, Benz said, but it can “shine a light on where people can investigate, so students don’t slip through the cracks.” To help find these students, he said, his team designed algorithms to look for patterns in a student’s “behavioral state” and automatically flag when their habits change. He calls it scaffolding — a temporary support used to build up a student, removed when they can stand on their own. At a Silicon Valley summit in April, Benz outlined a recent
  • 12. real-life case: that of Student ID 106033, a depressed and “extremely isolated” student he called Sasha whom the system had flagged as “highly at-risk” because she only left her dorm to eat. “At every school, there are lots of Sashas,” he said. “And the bigger you are, the more Sashas that you have.” A classifier algorithm divides the student body into peer groups — “full-time freshmen,” say, or “commuter students” — and the system then compares each student to “normal” behavior, as defined by their peers. It also generates a “risk score” for students based around factors such as how much time they spent in community centers or at the gym. The students who deviate from those day-to-day campus rhythms are flagged for anomalies, and the company then alerts school officials in case they want to pursue real- world intervention. (In Sasha’s case, Benz said, the university sent an adviser to knock on her door.) Some administrators love the avalanche of data these kinds of WiFi-based systems bring. “Forget that old ominous line, ‘We know where you live.’ These days, it’s, ‘We know where you are,’ ” Purdue University president Mitch Daniels wrote last year about his school’s https://www.washingtonpost.com/opinions/its-okay-to-be- paranoid-someone-is-watching-you/2018/03/27/1a161d4c-2327- 11e8-86f6- 54bfff693d2b_story.html?noredirect=on&tid=lk_inline_manual_
  • 13. 61&itid=lk_inline_manual_61 you are,’ ” Purdue University president Mitch Daniels wrote last year about his school’s location-tracking software. “Isn’t technology wonderful?” But technical experts said they doubted the advertised capabilities of such systems, which are mostly untested and unproven in their abilities to pinpoint student harm. Some students said most of their classmates also didn’t realize how much data was being gathered on their movements. They worried about anyone knowing intimate details of their daily walking patterns and whereabouts. Several students said they didn’t mind a system designed to keep them honest. But one of them, a freshman athlete at Temple University who asked to speak anonymously to avoid team punishment, said the SpotterEDU app has become a nightmare, marking him absent when he’s sitting in class and marking him late when he’s on time. He said he squandered several of his early lectures trying to convince the app he was present, toggling his settings in desperation as professors needled him to put the phone away. He then had to defend himself to campus staff members, who believed the data more than him. His teammates, he said, have suffered through their own technical headaches, but they’ve
  • 14. all been told they’ll get in trouble if they delete the app from their phones. “We can face repercussions with our coaches and academic advisers if we don’t show 100 percent attendance,” he said. But “it takes away from my learning because I’m literally freaking out, tapping everything to try to get it to work.” Campus staff, Carter said, can override data errors on a case -by- case basis, and Rubin said https://www.washingtonpost.com/opinions/its-okay-to-be- paranoid-someone-is-watching-you/2018/03/27/1a161d4c-2327- 11e8-86f6- 54bfff693d2b_story.html?noredirect=on&tid=lk_inline_manual_ 61&itid=lk_inline_manual_61 a teaching assistant works with students after class to triage glitches and correct points. SpotterEDU’s terms of use say its data is not guaranteed to be “accurate, complete, correct, adequate, useful, timely, reliable or otherwise.” Carter said he doesn’t like to say the students are being “tracked,” because of its potentially negative connotations; he prefers the term “monitored” instead. “It’s about building that relationship,” he said, so students “know you care about them.” But college leaders have framed the technology in exactly those terms. In emails this year between officials at the University of North Carolina, made available through public- records requests, a senior associate athletic director said
  • 15. SpotterEDU would “improve our ability to track more team members, in more places, more accurately.” The emails also revealed the challenge for a college attempting to roll out student-tracking systems en masse. In August, near the start of the fall semester, nearly 150 SpotterEDU beacons were installed in a blitz across the UNC campus, from Chapman Hall to the Woollen Gym. The launch was so sudden that some students were alarmed to see an unknown man enter their classroom, stick a small device near their desks, and walk away. The student newspaper, the Daily Tar Heel, reported on “an individual” entering class to install a “tracking device” and filed for school records related to the SpotterEDU contract. Unclear what was happening, the dean of UNC’s journalism school, Susan King, had someone yank a beacon off the wall after learning of a commotion spreading on Facebook. She told The Post she faulted “stupidity and a lack of communication” for the panic. Carter said the frenzy was due to the school’s need for a quick turnaround and that most https://www.dailytarheel.com/article/2019/09/student-athlete- tracking Carter said the frenzy was due to the school’s need for a quick turnaround and that most installations happen when students aren’t in class. (In an email
  • 16. to UNC staff, Carter later apologized for the mass installation’s “confusion and chaos.”) A UNC spokeswoman declined to make anyone available for an interview, saying only in a statement that the university was evaluating “streamlined attendance tracking” for a “small group of student-athletes.” But campuswide monitoring appears to be on its way, the emails show. The school is planning to shift to a check-in system designed by a UNC professor, and an IT director said in an email that the school could install beacons across all general-purpose classrooms in time for the spring semester. “Since students have to download the app, that is considered notification and opting-in,” one UNC official wrote. Chris Gilliard, a professor at Macomb Community College in Michigan who testified before Congress last month on privacy and digital rights, said he worries about the expanding reach of “surveillance creep”: If these systems work so well in college, administrators might argue, why not high school or anywhere else? The systems, he added, are isolating for students who don’t own smartphones, coercive for students who do and unnecessary for professors, who can accomplish the task with the same pop quizzes and random checks they’ve used for decades. “You’re forcing students into a position,” he said: “Be tracked or be left out.”
  • 17. Some parents, however, wish their children faced even closer supervision. Wes Grandstaff, who said his son, Austin, transformed from a struggling student to college graduate with SpotterEDU’s help, said the added surveillance was worth it: “When you’re a college SpotterEDU’s help, said the added surveillance was worth it: “When you’re a college athlete, they basically own you, so it didn’t matter what he felt: You’re going to get watched and babysat whether you like it or not.” He now says he wishes schools would share the data with parents, too. “I just cut you a $30,000 check,” he said, “and I can’t find out if my kid’s going to class or not?” Students using Degree Analytics’ WiFi system can opt-out by clicking “no” on a window that asks whether they want to help “support student success, operations and security.” But Benz, the company’s chief, said very few do. That is, until last month at VCU, which recently launched a pilot program to monitor a set of courses required of all freshmen. Students said they were frustrated to first learn of the system in a short email about a “new attendance tool” and were given only two weeks before the opt-out deadline passed. Students quickly scattered the opt-out link across social media, and the independent
  • 18. student newspaper, the Commonwealth Times, sowed doubts about the program’s secrecy and stated mission, writing, “Student success my ass.” The university declined to make an official available for an interview. One student who opted out, VCU senior Jacie Dannhardt, said she was furious that the college had launched first-year students into a tracking program none of them had ever heard of. “We’re all still adults. Have a basic respect for our privacy,” she said. “We don’t need hall passes anymore.” The opt-out rate at VCU, Benz said, climbed to roughly half of all eligible students. But he blamed the exodus on misunderstanding and a “reactionary ‘cancel culture’ thing.” “We could have done a much better job communicating, and the great majority of those https://commonwealthtimes.org/2019/11/19/tea-time-with- tagwa-theyre-watching-you/ could have done a much better job communicating, and the great majority of those students who could opt out probably wouldn’t have,” he said. Joanna Grama, an information-security consultant and higher- education specialist who has advised the Department of Homeland Security on data privacy, said she doubted most students knew they were signing up for long-term monitoring when they clicked to connect to the campus WiFi.
  • 19. She said she worries about school-performance data being used as part of a “cradle-to- grave profile” trailing students as they graduate and pursue their careers. She also questions how all this digital nudging can affect students’ daily lives. “At what point in time do we start crippling a whole generation of adults, human beings, who have been so tracked and told what to do all the time that they don’t know how to fend for themselves?” she said. “Is that cruel? Or is that kind?” Alice Crites contributed to this report. Excerpt from “They Are Watching You—and Everything Else on the Planet” by Robert Draper (from the February, 2018 edition of The National Geographic magazine – the complete article with amazing photos is posted on Blackboard) In 1949, amid the specter of European authoritarianism, the British novelist George Orwell published his dystopian masterpiece 1984, with its grim admonition: “Big Brother is watching you.” As unsettling as this notion may have been, “watching” was a quaintly circumscribed undertaking back then. That very year, 1949, an American company released the first commercially available CCTV system. Two years later, in 1951, Kodak introduced its Brownie portable movie camera to an awestruck public.
  • 20. Today more than 2.5 trillion images are shared or stored on the Internet annually—to say nothing of the billions more photographs and videos people keep to themselves. By 2020, one telecommunications company estimates, 6.1 billion people will have phones with picture-taking capabilities. Meanwhile, in a single year an estimated 106 million new surveillance cameras are sold. More than three million ATMs around the planet stare back at their customers. Tens of thousands of cameras known as automatic number plate recognition devices, or ANPRs, hover over roadways—to catch speeding motorists or parking violators but also, in the case of the United Kingdom, to track the comings and goings of suspected criminals. The untallied but growing number of people wearing body cameras now includes not just police but also hospital workers and others who aren’t law enforcement officers. Proliferating as well are personal monitoring devices—dash cams, cyclist helmet cameras to record collisions, doorbells equipped with lenses to catch package thieves—that are fast becoming a part of many a city dweller’s everyday arsenal. Even less quantifiable, but far more vexing, are the billions of images of unsuspecting citizens captured and stored in law enforcement and private-sector databases over which our control is practically nonexistent. Those are merely the “watching” devices that we’re capable of seeing. Presently the skies are cluttered with drones—2.5 million of which were purchased in 2016 by American hobbyists and businesses. That figure doesn’t include the fleet of unmanned aerial vehicles used by the U.S. government not only to bomb terrorists in Yemen but also to help stop illegal immigrants entering from Mexico, monitor hurricane flooding in Texas, and catch cattle thieves in North Dakota. Nor does it include the many thousands of airborne spying devices employed by other countries—among them Russia, China, Iran, and North Korea. We’re being watched from the heavens as well. More than 1,700 satellites monitor our planet. From a distance of about 300 miles, some of them can discern a herd of buffalo or the stages
  • 21. of a forest fire. From outer space, a camera clicks and a detailed image of the block where we work can be acquired by a total stranger. Simultaneously, on that very same block, we may well be photographed at unsettlingly close range perhaps dozens of times daily, from lenses we may never see, our image stored in databases for purposes we may never learn. Our smartphones, our Internet accounts are giving away our secrets. Gus Hosein, the executive director of Privacy International, notes that “if the police wanted to know what was in your head in the 1800s, they would have to torture you. Now they can just find it out from your devices.” This is—to lift the title from another British futurist, Aldous Huxley— our brave new world. That we can see it coming is cold comfort since, as Carnegie Mellon University professor of information technology Alessandro Acquisti says, “in the cat- and-mouse game of privacy protection, the data subject is always the weaker side of the game.” Simply submitting to the game is a dispiriting proposition. But to actively seek to protect one’s privacy can be even more demoralizing. University of Texas American studies professor Randolph Lewis writes in his new book, Under Surveillance: Being Watched in Modern America, “Surveillance is often exhausting to those who really feel its undertow: it overwhelms with its constant badgering, its omnipresent mysteries, its endless tabulations of movements, purchases, potentialities.” The desire for privacy, Acquisti says, “is a universal trait among humans, across cultures and across time. You find evidence of it in ancient Rome, ancient Greece, in the Bible, in the Quran. What’s worrisome is that if all of us at an individual level suffer from the loss of privacy, society as a whole may realize its value only after we’ve lost it for good.” Is a looming state of Orwellian bleakness already a fait accompli? Or is there a more hopeful outlook, one in which a world under watch in many ways might be better off? Consider the 463 infrared camera traps the World Wildlife Fund uses in
  • 22. China to monitor the movements of the threatened giant panda. Or the thermal imaging devices that rangers deploy at night to detect poachers in Kenya’s Masai Mara National Reserve. Or the sound- activated underwater camera system developed by UC San Diego researchers that tracks the nearly extinct vaquita porpoise in the Sea of Cortez. Or the “forest watcher” cameras installed to help protect the shrinking timberlands of Sri Lanka. “If you want a picture of the future,” Orwell darkly warned in his classic, “imagine a boot stamping on a huma n face— forever.” This authoritarian vision discounts the possibility that governments might use such tools to make the streets safer. Recall, for example, the footage from security cameras that cracked the cases of the 2005 London subway and 2013 Boston Marathon bombings. Multitudes of more obscure episodes exist, such as that of Euric Cain, caught unambiguously on camera shooting a Tulane University medical student named Peter Gold in 2015 after Gold prevented him from abducting a woman on the streets of New Orleans. (Gold survived; Cain received a 54- year prison sentence for a crime rampage that included rapes, armed robbery, and attempted murder.) At the Port of Boston, the Department of Homeland Security has tested a cargo-visualizing method invented by two MIT physicists, Robert Ledoux and William Bertozzi. Using a technique known as nuclear resonance fluorescence —in which elements become identifiable by exciting their nuclei —the screening device can, without opening a freight container, discern the elemental fingerprint of its contents. Unlike a typical x-ray scan, which shows only shape and density, it can tell the difference between soda and diet soda, natural and manufactured diamonds, plastics and high-energy explosives, and nonnuclear and nuclear material. Does anyone doubt that a more closely inspected world over the past 150 years would have been a safer one? We might know the identity of Jack the Ripper, whether Lee Harvey Oswald acted alone, and if O. J. Simpson acted at all. Of course, public safety has been the pretext for surveillance before and since Orwell’s
  • 23. time. But today such technology can be seen as a lifesaver in more encompassing ways. Thanks to imagery provided by satellite cameras, relief organizations have located refugees near Mosul, encamped in the deserts of northern Iraq. And thanks to numerous space probes, scientists have proof that the world’s climate is dramatically changing. Could the great Orwell’s imagination have failed? Could Big Brother save humanity, rather than enslave it? Or might both scenarios be true at the same time? Essay 2 Works Cited Draper, Robert. “They Are Watching You.” National Geographic, Feb. 2018, https://mccc.idm.oclc.org/login?url=https://search-proquest- com.mccc.idm.oclc.org/docview/20269 58259?accountid=40611. Accessed 25 March 2020. Harwell, Drew. “Colleges Are Turning Students’ Phones into Surveillance Machines, Tracking the Locations of Hundreds of Thousands.” The Washington Post, 24 Dec. 2019, www.washingtonpost.com/technology/2019/12/24/colleges-are- turning-students-phones-into-surveillance-machines-tracking- locations-hundreds-thousands/. Accessed 1 April 2020. Singer, Peter. “Visible Man: Ethics in a World without Secrets.” Emerging, edited by Barclay Barrios, Bedford/St. Martins, 2016, pp. 425-431.
  • 24. ENG101 Essay 2 Vocabulary Sheet ENG101-450 Essay 2 Vocabulary Sheet www.onelook.com is a good site for finding definitions and synonyms. INSTRUCTIONS: For words from “Visible Man: Ethics in a World without Secrets” by Peter Singer: 1. copy the sentence (or phrase) in which the word is used on the line between quotation marks. 2. Then write the definition of the word in the space below BY HAND. It is important to notice the way the word is used in the sentence and to CHOOSE THE CORRECT DEFINITION. Also, notice the part of speech (ADJ means “adjective”). The first word is done for you. disseminate VERB par. 2 “Technological breakthroughs have made it easy to collect, store, and disseminate data on individuals, corporations, and even the government” Definition: to make something such as information or knowledge available to a lot of people troves NOUN par. 2 “____________________________________________________ _____________” mug shots NOUN par. 3 “____________________________________________________ ___________” scrutiny NOUN par. 5 “____________________________________________________ _____________” norms NOUN par. 8 “____________________________________________________ ______________”
  • 25. totalitarian ADJ par. 9 “____________________________________________________ _____________” intrusion NOUN par. 9 “____________________________________________________ ____________” intercept VERB par 10 “____________________________________________________ ____________” malicious ADJ par. 10 “____________________________________________________ ____________” harass VERB par. 11 “____________________________________________________ ____________” vehemently ADVERB from vehement ADJ par. 13 “__________________________________________” misleading ADJ par. 14 “____________________________________________________ ___________” woefully ADVERB from woeful ADJ par. 14 “________________________________________________” leaks NOUN par. 14 “____________________________________________________ ______________” aftermath NOUN par. 16 “____________________________________________________
  • 26. __________” align VERB par. 20 “____________________________________________________ _______________” scrupulous ADJ par.22 “____________________________________________________ ____________” reckless ADJ par. 22 “____________________________________________________ _____________” callous ADJ par. 22 “____________________________________________________ ______________” altruistic ADJ par. 25 “________________________________________________ ____ _____________” curtail VERB par. 25 “____________________________________________________ _____________” Essay 2 Outline Template: Send your outline to my email on Monday, MARCH 23, 10:30am. BASIC STRUCTURE FOR ESSAY 2: Include these elements in your outline. Type your outline in the right column Use the BIG QUESTION andtopic sentences that I give you. Then develop the paragraph following the structure in the left column. List your main points. Type your quotations. Include page numbers in parentheses after the quotations from Singer’s
  • 27. article. INTRODUCTORY PARAGRAPH · GENERAL TOPIC of this essay: DIGITAL SURVEILLANCE · SPECIFIC TOPIC of this essay: DIGITAL SURVEILLANCE OF COLLEGE STUDENTS · Briefly introduce your SOURCES with “Title” and full authors’ names. · Write the BIG QUESTION for this essay · THESIS STATEMENT: Answer the BIG QUESTION in the thesis statement. USE A QUOTATION FROM: “They Are Watching You – and Everything Else on the Planet” by Robert Draper as a “HOOK” to catch your reader’s attention in the introductory paragraph. BIG QUESTION: Taking into consideration Peter Singer’s argument in “Visible Man: Ethics in a World without Secrets” and the pros and cons in “Colleges Are Turning Students’ Phones into Surveillance Machines,” do you think that colleges should track students using their phones? BODY PARAGRAPH 1: “Visible Man: Ethics in a World without Secrets” · TOPIC SENTENCE Summarize/QUOTE the key points in Singer’s article including: · The Panopticon · The BAD USES of digital surveillance · The GOOD USES of digital surveillance TOPIC SENTENCE: In “Visible Man: Ethics in a World without Secrets,” Peter Singer considers several uses – good and bad – of digital surveillance.
  • 28. BODY PARAGRAPH 2: “Colleges Are Turning Students’ Phones into Surveillance Machines” · TOPIC SENTENCE · Summarize the PROS and CONS from the article (with QUOTATIONS) of surveilling students through their phones. TOPIC SENTENCE: “Colleges Are Turning Students’ Phones into Surveillance Machines, Tracking the Locations of Hundreds of Thousands” by Drew Harwell examines the pros and cons of a specific use of digital surveillance. BODY PARAGRAPH 3: Your position after reading and thinking about all three sources. · Answer THE BIG QUESTION in this paragraph · Include IDEAS from Peter Singer’s article that could apply to the PROS and CONS of tracking college students. Would he think this is a good thing? A bad thing? Both? · Evaluate the evidence and give YOUR OWN OPINION about colleges’ tracking students through their phones. TOPIC SENTENCE = THESIS STATEMENT: your answer the BIG QUESTION. CONCLUDING PARAGRAPH: Restate your thesis statement -- the answer to the BIG QUESTION -- with different words and reflect on your essay. ENG101-450 Essay 2 Overview THE TOPIC FOR ESSAY 2: Digital Surveillance of Students on College Campuses: Good or Bad? Last day to turn in Essay 2: April 1, midnight. SOURCES FOR ESSAY 2 “They Are Watching You – and Everything Else on the Planet” by Robert Draper
  • 29. “Colleges Are Turning Students’ Phones into Surveillance Machines, Tracking the Locations of Hundreds of Thousands” by Drew Harwell “Visible Man: Ethics in a World without Secrets” by Peter Singer Essay 2 BIG QUESTION: BIG QUESTION: Taking into consideration Peter Singer’s argumen t in “Visible Man: Ethics in a World without Secrets” and the pros and cons in “Colleges Are Turning Students’ Phones into Surveillance Machines,” do you think that colleges should track students using their phones? Essay 2 is an exploration of a topic combining what other people think about our topic (They Say) with your perspective (I Say). In Essay 2, we focus on the PROS and CONS of colleges’ using students’ phones as tracking devices for several reasons. As you approach this essay, you should be fair to the college administrators and professors: in other words, we should ASSUME a priori (from the start) that their intentions are to help students be successful and safe at the college. HOWEVER, this does not mean that this surveillance is a good or ethical practice: this is the question that you will tackle in this essay. STEP 1 of writing this essay: Read and understand the articles. · Complete the Vocabulary Sheet for Singer’s article. · Annotate (write on, underline, highlight) your copies of the articles. · Look for evidence that could help you answer the BIG QUESTION in your essay. STEP 2 of writing this essay: Complete the Essay 2 Log. Email me your LOG by Friday, March 13. STEP 2: Fill out the Essay 2 Outline Template. This outline will be similar to the outline for Essay 1. I will post it in the Essay 2
  • 30. folder. It is important to type QUOTATIONS for key points in your paragraphs. (Keep the quotations as short as possible.) NEW DUE DATE: The outline is due on email by Monday, March 23 at 10:30am. If you do not send me your outline on time, I will not give you credit for it in your final grade. I WILL RESPOND TO YOU WITH COMMENTS AND SUGGESTIONS. STEP 3: Follow your OUTLINE and write the FIRST DRAFT. Email me your COMPLETE FIRST DRAFT by midnight Wednesday, March 25. I WILL RESPOND TO YOU WITH MY COMMENTS AND SUGGESTIONS on Thursday. If you do not email me your first draft, I will deduct points from your essay grade. NEW: By Sunday, March 29 at noon, upload your ESSAY 2 DRAFT to the Discussion Forum. I will pair you with another student to give each other feedback on your essays. Feedback is due by midnight on March 30. STEP 4: Complete the FINAL DRAFT. Email me your FINAL DRAFT by midnight, April 1.