SlideShare a Scribd company logo
1 of 9
1) With Modern Surveillance technologies the government has
the option to know its people by using the latest technology.
The data relating to activities and interests of people is gathered
from Information and Communication Technology, which has
become the closest partner of people, including the use of the
internet. It further explains how the government can keep a
check on its people, while maintaining their privacy level, along
with contextual integrity. The government makes satellite
monitoring to get locational data. This information can be used
in the Police department for the investigation of crimes. the
application of data in this modern era, where behavioral data
can become a source of revenue, and humans are considered
part of this process and not the endpoint of revenue making
process. It first explains the fact that Google which is
considered a safe and secure website also holds user’s data and
this data can be handed over to authorities if needed. The source
explains how Google is violating the privacy of millions of
people for the collection of big data, like they retain browsing
histories, and takes photos of people’s houses without even
asking permission.
Annotated Bibliography
Source #1
Giroux, H. A. (2015). Totalitarian paranoia in the post-
Orwellian surveillance state.
Cultural Studies
,
29
(2), 108-140.
The source “Totalitarian paranoia in the past-Orwellian
surveillance state” (Giroux, 2015) objects to discover the public
privacy threats arise by government spying. The source then
explains the impacts of surveillance and says that people are
deprived of their freedom of thinking and speech because of the
institution of being tracked. It says that the latest information
and communication technology devices like microphones,
internet, videos, cameras, and text messages provide more
facility to surveillance organizations than customers. Private
and public space is easily violated and even a third party keeps
records of a person’s shopping choices and personal messages
from social media. Finally it says that we are leading a
surveillance culture by a surveillance state.
This source changed my research approach and provided me
multiple valid points which I further used in my paper. For
instance, the use of biometric bracelets that tells the attention of
students sitting in the hall. It cleared my position by saying that
this surveillance is against freedom and democracy which gave
people the right to keep their things private. It helped me
explain the fact the NSA is a threat to privacy and freedom.
Companies can spy any customer or individual because they run
their own data-mining setup.
Source #2
Schaefer, A. T., & Claridge-Chang, A. (2012). The surveillance
state of behavioral automation.
Current opinion in neurobiology
,
22
(1), 170-176.
The source “The surveillance state of behavioral automation”
aims to explain the latest use of behavioral data. It says that
even complex behaviors can be analyzed and observed. The
behaviors include comprehensive observation of animals and
humans behavior. In a behavioral study, psychology is also
attached, and the techniques include a blend of these domains.
The tracking, sorting, and motion capture methods help in
automation, which is the physiology of animal transformation.
I found this source during my research, and it helped me in
explaining my argument clearly about behavioral automation.
The method and approach used in the source to describe the
surveillance state changed my approach to research. I found this
source when I was searching for the reasons for the huge
significance of behavioral data. It helped me in understanding
the current atomization in behavioral studies. It also identified
the latest techniques that can improve observation and
experimentation in various neuroscience aspects.
Source #3
Sorell, T., & Draper, H. (2012). Telecare, surveillance, and the
welfare state.
The American Journal of Bioethics
,
12
(9), 36-44.
The source “Telecare, surveillance, and the welfare state”
(Sorell & Draper, 2012) explains how surveillance and telecare
are being provided to people and their role in the welfare of the
country. It explains in detail these terminologies and the
processes they use. The major argument supported in this source
is that people do not like being tracked by a party. The concept
of the surveillance state is becoming ubiquitous in America, and
telecare is playing an important part in it. Telecare is promoting
the freedom and independence of customers, by providing those
services at their desired locations.
I found this source during my research process, and it helped
me in explaining my point clear to those who exclude telecare
from the surveillance state. Surveillance states can support
independence, where people are tech-savvy, and technology is
solving their problems. The source also explains how
surveillance can intervene in an emergency. This source directs
me in the research approach and guided me in explaining my
argument, in a highly cohesive and comprehensive way. I used
this source to explain telecare benefits for independence and its
contribution to making a surveillance state.
Source #4
Taylor, J. A., Lips, M., & Organ, J. (2008). Identification
practices in government: citizen surveillance and the quest for
public service improvement.
Identity in the Information Society
,
1
(1), 135.
The source “Identification practices in government: citizen
surveillance and the quest for public service improvement”
(Taylor et al., 2008) aims to explain the concept of the
surveillance state. It says that the government has the option to
know its people by using the latest technology. The data
relating to activities and interests of people is gathered from
Information and Communication Technology, which has become
the closest partner of people, including the use of the internet.
It further explains how the government can keep a check on its
people, while maintaining their privacy level, along with
contextual integrity. The government makes satellite monitoring
to get locational data. This information can be used in the
Police department for the investigation of crimes. We can
summarize that the information collected is used in the public
sector ranging from license making to pensioner records.
I found this source at the beginning of my research, and it
strengthens my position by supporting my argument. At the start
of my research I was completely biased about information
capitalism and I was only seeing one side of the picture which
argues companies are breaching the privacy of people, and they
have no right to collect information without the permission of
its users. This source clearly depicts the positive aspects and
applications of information collected by users. With the help of
this source, I was able to explain the point that this information
is shared with the government, where it is distributed to other
departments like police, etc.
Source #5:
Zuboff, S. (2015). Big other: surveillance capitalism and the
prospects of an information civilization.
Journal of Information Technology
,
30
(1), 75-89.
The source “Big other: surveillance capitalism and the prospects
of an information civilization” (Zuboff, 2015) aims to inform
readers about the application of data in this modern era, where
behavioral data can become a source of revenue, and humans
are considered part of this process and not the endpoint of
revenue making process. It first explains the fact that Google
which is considered a safe and secure website also holds user’s
data and this data can be handed over to authorities if needed.
The source explains how Google is violating the privacy of
millions of people for the collection of big data, like they retain
browsing histories, and takes photos of people’s houses without
even asking permission. The high use of Google gave it the
benefit of a high amount of data, which assists Google to design
predictive products first hand. In the end it explains the
agreements, communication, and personalization of Google, and
says that many of the users are unaware of the fact that they
have lost control of their personal data, which is further used
for their digital benefits and services.
I found this source during my research and it helped me in
explaining my arguments. I was unsure about how enterprises
use institutional logic, and this source cleared my position
regarding behavioral data and personal data, which companies
collect based on using their institutional logic which allows
them to hack and violate the privacy of customers. This source
helped me to understand how companies and businesses control
behaviors of customers now, which was opposite in the past.
This big data, although it is providing large facilities, on the
other side it is intervening in customer’s own matters, which is
not liked by many people. This source changed my research
approach by providing the argument that surveillance capitalism
should not be considered completely evolved, and many aspects
of it needed to be carefully examined.
2)
In the present enhanced technological scenario, surveillance
tasks are being done using state-of-art Information Technology
techniques and tools and these are used to extend and augment
traditional surveillance systems. In addition to this
augmentation, latest Information and Communication
Technologies (ICT) are being used in digital domain under the
name ‘surveillance capitalism’. Government is predominantly
using surveillance techniques either by intelligence services or
law enforcement and these are normally justified with an appeal
to the “greater good” and protecting citizens but their use is
always controversial. Majority of citizens are upset with these
mass surveillance actions as their privacy is lost and feel their
fundamental rights are denied. Government is sometimes harsh
on citizens to implement security activities to protect nations.
Now the basic the argument of the public is a trade-off between
privacy and security of citizens and nation is not inevitable but
is shaped by surveillance employed as a technology-supported
security practice, reinforced by securitization under Federal and
State security laws.
In view of the above the Agenda or Topic of the project is to
study and discuss the ethical implications which surveillance,
privacy and security call upon us to pay more attention to are
those of our own choices, both individual and collective, and
choices of government to protect ourselves, information data
security and nation’s security without diluting the spirit of these
three by adhering to prevailing Federal and State Laws.
Related Quotes & Bibliography:
“Government classifies far too much information, frequently in
violation of applicable laws governing what information may
and may not be classified.”
Barry Eisler, author, and former CIA officer spoke at the
Association of Former Intelligence Officers opposite ex-CIA
and NSA director Michael Hayden. Barry Eisler has served
under active positions in the CIA’s Directorate of operations
and now live in San Francisco Bay Area.
https://boingboing.net/2016/03/01/on-whistleblowers-and-
secrecy.html
“Free speech has occupied an exalted position because of the
high service it has given our society. Its protection is essential
to the very existence of a democracy. . . . It has been the
safeguard of every religious, political, philosophical, economic,
and racial group amongst us. . . . [Free speech] has been the one
single outstanding tenet that has made our institutions the
symbol of freedom and equality.”
William O. Douglas, the longest-serving justice in the history of
the Supreme Court as he served from (1939-75), and he also
wrote books on this experience and observation from his travel
diaries as well
https://www.mtsu.edu/first-amendment/article/1328/william-
douglas
“Today we are at a crossroads. The technology is available for
two great options: The massive surveillance state or the
renewed freedom of a deeply-involved citizenry thinking
independently and holding the government to the highest
standards”
Oliver DeMille is an American author, educator, and public
speaker. He is the founder of an educational model known as
TJEd and the co-author of Leader Shift. His work mostly is
related to education and Orrin Woodward is also considered as a
co-author for this.
https://www.azquotes.com/quotes/topics/surveillance-state.html
“There currently are and always have been real and material
consequences of state surveillance that place the physical well
being of individuals at risk”
Jonathan Hofer is a senior studying political science at the
University of California, Berkeley.
https://www.dailycal.org/2019/04/23/california-needs-to-better-
regulate-surveillance/
“Do we want to live in a society where we live totally naked in
front of the government, and they are totally opaque to us”
Edward Joseph Snowden is an American whistleblower
https://www.amnesty.ca/our-work/issues/survelliance-security-
and-human-rights/mass-surveillance
“You have an always expanding, omnipresent surveillance state
that's constantly chipping away at the liberties and freedoms of
law-abiding Americans.”
Ronald Lee Wyden is an American politician who is currently
serving as the senior United States Senator for Oregon
https://www.azquotes.com/quote/1341720

More Related Content

Similar to Government Surveillance and Privacy in the Digital Age

Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01Harsh Tripathi
 
Digital Authoritarianism: Implications, Ethics, and Safegaurds
Digital Authoritarianism: Implications, Ethics, and SafegaurdsDigital Authoritarianism: Implications, Ethics, and Safegaurds
Digital Authoritarianism: Implications, Ethics, and SafegaurdsAndy Aukerman
 
Running head surveillance state research1 page 2running
Running head surveillance state research1 page  2runningRunning head surveillance state research1 page  2running
Running head surveillance state research1 page 2runningSHIVA101531
 
AnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTraffickingAnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTraffickingTurner Sparks
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadwaiforchi Wagiteerhh
 
What Data Can Do: A Typology of Mechanisms . Angèle Christin
What Data Can Do: A Typology of Mechanisms . Angèle Christin What Data Can Do: A Typology of Mechanisms . Angèle Christin
What Data Can Do: A Typology of Mechanisms . Angèle Christin eraser Juan José Calderón
 
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Arab Federation for Digital Economy
 
NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive EssayJill Lyons
 
What does “BIG DATA” mean for official statistics?
What does “BIG DATA” mean for official statistics?What does “BIG DATA” mean for official statistics?
What does “BIG DATA” mean for official statistics?Vincenzo Patruno
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docxhealdkathaleen
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docxtodd271
 
Question BIn other classes you will have met the HTPHPI metho.docx
Question BIn other classes you will have met the HTPHPI metho.docxQuestion BIn other classes you will have met the HTPHPI metho.docx
Question BIn other classes you will have met the HTPHPI metho.docxmakdul
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984Christy Davis
 
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...AIRCC Publishing Corporation
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaKelly Ratkovic
 
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Turner Sparks
 
Using a Mobile Based Web Service to Search for Missing People – A Case Study ...
Using a Mobile Based Web Service to Search for Missing People – A Case Study ...Using a Mobile Based Web Service to Search for Missing People – A Case Study ...
Using a Mobile Based Web Service to Search for Missing People – A Case Study ...Editor IJCATR
 

Similar to Government Surveillance and Privacy in the Digital Age (20)

Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01
 
Digital Authoritarianism: Implications, Ethics, and Safegaurds
Digital Authoritarianism: Implications, Ethics, and SafegaurdsDigital Authoritarianism: Implications, Ethics, and Safegaurds
Digital Authoritarianism: Implications, Ethics, and Safegaurds
 
Running head surveillance state research1 page 2running
Running head surveillance state research1 page  2runningRunning head surveillance state research1 page  2running
Running head surveillance state research1 page 2running
 
AnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTraffickingAnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTrafficking
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
What Data Can Do: A Typology of Mechanisms . Angèle Christin
What Data Can Do: A Typology of Mechanisms . Angèle Christin What Data Can Do: A Typology of Mechanisms . Angèle Christin
What Data Can Do: A Typology of Mechanisms . Angèle Christin
 
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
 
NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive Essay
 
What does “BIG DATA” mean for official statistics?
What does “BIG DATA” mean for official statistics?What does “BIG DATA” mean for official statistics?
What does “BIG DATA” mean for official statistics?
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docx
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docx
 
2053951715611145
20539517156111452053951715611145
2053951715611145
 
Question BIn other classes you will have met the HTPHPI metho.docx
Question BIn other classes you will have met the HTPHPI metho.docxQuestion BIn other classes you will have met the HTPHPI metho.docx
Question BIn other classes you will have met the HTPHPI metho.docx
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984
 
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
 
Sub1555
Sub1555Sub1555
Sub1555
 
Ijcatr04071004
Ijcatr04071004Ijcatr04071004
Ijcatr04071004
 
Using a Mobile Based Web Service to Search for Missing People – A Case Study ...
Using a Mobile Based Web Service to Search for Missing People – A Case Study ...Using a Mobile Based Web Service to Search for Missing People – A Case Study ...
Using a Mobile Based Web Service to Search for Missing People – A Case Study ...
 

More from aulasnilda

1. Analyze the case and determine the factors that have made KFC a s.docx
1. Analyze the case and determine the factors that have made KFC a s.docx1. Analyze the case and determine the factors that have made KFC a s.docx
1. Analyze the case and determine the factors that have made KFC a s.docxaulasnilda
 
1. A.Discuss how the concept of health has changed over time. B.Di.docx
1. A.Discuss how the concept of health has changed over time. B.Di.docx1. A.Discuss how the concept of health has changed over time. B.Di.docx
1. A.Discuss how the concept of health has changed over time. B.Di.docxaulasnilda
 
1. Abstract2. Introduction to Bitcoin and Ethereum3..docx
1. Abstract2. Introduction to Bitcoin and Ethereum3..docx1. Abstract2. Introduction to Bitcoin and Ethereum3..docx
1. Abstract2. Introduction to Bitcoin and Ethereum3..docxaulasnilda
 
1. A. Compare vulnerable populations. B. Describe an example of one .docx
1. A. Compare vulnerable populations. B. Describe an example of one .docx1. A. Compare vulnerable populations. B. Describe an example of one .docx
1. A. Compare vulnerable populations. B. Describe an example of one .docxaulasnilda
 
1. A highly capable brick and mortar electronics retailer with a l.docx
1. A highly capable brick and mortar electronics retailer with a l.docx1. A highly capable brick and mortar electronics retailer with a l.docx
1. A highly capable brick and mortar electronics retailer with a l.docxaulasnilda
 
1. A. Research the delivery, finance, management, and sustainabili.docx
1. A. Research the delivery, finance, management, and sustainabili.docx1. A. Research the delivery, finance, management, and sustainabili.docx
1. A. Research the delivery, finance, management, and sustainabili.docxaulasnilda
 
1. All of the following artists except for ONE used nudity as part.docx
1. All of the following artists except for ONE used nudity as part.docx1. All of the following artists except for ONE used nudity as part.docx
1. All of the following artists except for ONE used nudity as part.docxaulasnilda
 
1. According to the article, what is myth and how does it functi.docx
1. According to the article, what is myth and how does it functi.docx1. According to the article, what is myth and how does it functi.docx
1. According to the article, what is myth and how does it functi.docxaulasnilda
 
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docxaulasnilda
 
1. A.Compare independent variables, B.dependent variables, and C.ext.docx
1. A.Compare independent variables, B.dependent variables, and C.ext.docx1. A.Compare independent variables, B.dependent variables, and C.ext.docx
1. A.Compare independent variables, B.dependent variables, and C.ext.docxaulasnilda
 
1. According to the Court, why is death a proportionate penalty for .docx
1. According to the Court, why is death a proportionate penalty for .docx1. According to the Court, why is death a proportionate penalty for .docx
1. According to the Court, why is death a proportionate penalty for .docxaulasnilda
 
1- Prisonization  What if  . . . you were sentenced to prison .docx
1- Prisonization  What if  . . . you were sentenced to prison .docx1- Prisonization  What if  . . . you were sentenced to prison .docx
1- Prisonization  What if  . . . you were sentenced to prison .docxaulasnilda
 
1. 250+ word count What is cultural and linguistic competence H.docx
1. 250+ word count What is cultural and linguistic competence H.docx1. 250+ word count What is cultural and linguistic competence H.docx
1. 250+ word count What is cultural and linguistic competence H.docxaulasnilda
 
1. 200 words How valuable is a having a LinkedIn profile Provid.docx
1. 200 words How valuable is a having a LinkedIn profile Provid.docx1. 200 words How valuable is a having a LinkedIn profile Provid.docx
1. 200 words How valuable is a having a LinkedIn profile Provid.docxaulasnilda
 
1. According to recent surveys, China, India, and the Philippines ar.docx
1. According to recent surveys, China, India, and the Philippines ar.docx1. According to recent surveys, China, India, and the Philippines ar.docx
1. According to recent surveys, China, India, and the Philippines ar.docxaulasnilda
 
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docxaulasnilda
 
1. A vulnerability refers to a known weakness of an asset (resou.docx
1. A vulnerability refers to a known weakness of an asset (resou.docx1. A vulnerability refers to a known weakness of an asset (resou.docx
1. A vulnerability refers to a known weakness of an asset (resou.docxaulasnilda
 
1. According to the readings, philosophy began in ancient Egypt an.docx
1. According to the readings, philosophy began in ancient Egypt an.docx1. According to the readings, philosophy began in ancient Egypt an.docx
1. According to the readings, philosophy began in ancient Egypt an.docxaulasnilda
 
1-Explain what you understood from the paper with (one paragraph).docx
1-Explain what you understood from the paper with (one paragraph).docx1-Explain what you understood from the paper with (one paragraph).docx
1-Explain what you understood from the paper with (one paragraph).docxaulasnilda
 
1-Explanation of how healthcare policy can impact the advanced p.docx
1-Explanation of how healthcare policy can impact the advanced p.docx1-Explanation of how healthcare policy can impact the advanced p.docx
1-Explanation of how healthcare policy can impact the advanced p.docxaulasnilda
 

More from aulasnilda (20)

1. Analyze the case and determine the factors that have made KFC a s.docx
1. Analyze the case and determine the factors that have made KFC a s.docx1. Analyze the case and determine the factors that have made KFC a s.docx
1. Analyze the case and determine the factors that have made KFC a s.docx
 
1. A.Discuss how the concept of health has changed over time. B.Di.docx
1. A.Discuss how the concept of health has changed over time. B.Di.docx1. A.Discuss how the concept of health has changed over time. B.Di.docx
1. A.Discuss how the concept of health has changed over time. B.Di.docx
 
1. Abstract2. Introduction to Bitcoin and Ethereum3..docx
1. Abstract2. Introduction to Bitcoin and Ethereum3..docx1. Abstract2. Introduction to Bitcoin and Ethereum3..docx
1. Abstract2. Introduction to Bitcoin and Ethereum3..docx
 
1. A. Compare vulnerable populations. B. Describe an example of one .docx
1. A. Compare vulnerable populations. B. Describe an example of one .docx1. A. Compare vulnerable populations. B. Describe an example of one .docx
1. A. Compare vulnerable populations. B. Describe an example of one .docx
 
1. A highly capable brick and mortar electronics retailer with a l.docx
1. A highly capable brick and mortar electronics retailer with a l.docx1. A highly capable brick and mortar electronics retailer with a l.docx
1. A highly capable brick and mortar electronics retailer with a l.docx
 
1. A. Research the delivery, finance, management, and sustainabili.docx
1. A. Research the delivery, finance, management, and sustainabili.docx1. A. Research the delivery, finance, management, and sustainabili.docx
1. A. Research the delivery, finance, management, and sustainabili.docx
 
1. All of the following artists except for ONE used nudity as part.docx
1. All of the following artists except for ONE used nudity as part.docx1. All of the following artists except for ONE used nudity as part.docx
1. All of the following artists except for ONE used nudity as part.docx
 
1. According to the article, what is myth and how does it functi.docx
1. According to the article, what is myth and how does it functi.docx1. According to the article, what is myth and how does it functi.docx
1. According to the article, what is myth and how does it functi.docx
 
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx
 
1. A.Compare independent variables, B.dependent variables, and C.ext.docx
1. A.Compare independent variables, B.dependent variables, and C.ext.docx1. A.Compare independent variables, B.dependent variables, and C.ext.docx
1. A.Compare independent variables, B.dependent variables, and C.ext.docx
 
1. According to the Court, why is death a proportionate penalty for .docx
1. According to the Court, why is death a proportionate penalty for .docx1. According to the Court, why is death a proportionate penalty for .docx
1. According to the Court, why is death a proportionate penalty for .docx
 
1- Prisonization  What if  . . . you were sentenced to prison .docx
1- Prisonization  What if  . . . you were sentenced to prison .docx1- Prisonization  What if  . . . you were sentenced to prison .docx
1- Prisonization  What if  . . . you were sentenced to prison .docx
 
1. 250+ word count What is cultural and linguistic competence H.docx
1. 250+ word count What is cultural and linguistic competence H.docx1. 250+ word count What is cultural and linguistic competence H.docx
1. 250+ word count What is cultural and linguistic competence H.docx
 
1. 200 words How valuable is a having a LinkedIn profile Provid.docx
1. 200 words How valuable is a having a LinkedIn profile Provid.docx1. 200 words How valuable is a having a LinkedIn profile Provid.docx
1. 200 words How valuable is a having a LinkedIn profile Provid.docx
 
1. According to recent surveys, China, India, and the Philippines ar.docx
1. According to recent surveys, China, India, and the Philippines ar.docx1. According to recent surveys, China, India, and the Philippines ar.docx
1. According to recent surveys, China, India, and the Philippines ar.docx
 
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx
 
1. A vulnerability refers to a known weakness of an asset (resou.docx
1. A vulnerability refers to a known weakness of an asset (resou.docx1. A vulnerability refers to a known weakness of an asset (resou.docx
1. A vulnerability refers to a known weakness of an asset (resou.docx
 
1. According to the readings, philosophy began in ancient Egypt an.docx
1. According to the readings, philosophy began in ancient Egypt an.docx1. According to the readings, philosophy began in ancient Egypt an.docx
1. According to the readings, philosophy began in ancient Egypt an.docx
 
1-Explain what you understood from the paper with (one paragraph).docx
1-Explain what you understood from the paper with (one paragraph).docx1-Explain what you understood from the paper with (one paragraph).docx
1-Explain what you understood from the paper with (one paragraph).docx
 
1-Explanation of how healthcare policy can impact the advanced p.docx
1-Explanation of how healthcare policy can impact the advanced p.docx1-Explanation of how healthcare policy can impact the advanced p.docx
1-Explanation of how healthcare policy can impact the advanced p.docx
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 

Government Surveillance and Privacy in the Digital Age

  • 1. 1) With Modern Surveillance technologies the government has the option to know its people by using the latest technology. The data relating to activities and interests of people is gathered from Information and Communication Technology, which has become the closest partner of people, including the use of the internet. It further explains how the government can keep a check on its people, while maintaining their privacy level, along with contextual integrity. The government makes satellite monitoring to get locational data. This information can be used in the Police department for the investigation of crimes. the application of data in this modern era, where behavioral data can become a source of revenue, and humans are considered part of this process and not the endpoint of revenue making process. It first explains the fact that Google which is considered a safe and secure website also holds user’s data and this data can be handed over to authorities if needed. The source explains how Google is violating the privacy of millions of people for the collection of big data, like they retain browsing histories, and takes photos of people’s houses without even asking permission. Annotated Bibliography Source #1 Giroux, H. A. (2015). Totalitarian paranoia in the post- Orwellian surveillance state. Cultural Studies , 29 (2), 108-140.
  • 2. The source “Totalitarian paranoia in the past-Orwellian surveillance state” (Giroux, 2015) objects to discover the public privacy threats arise by government spying. The source then explains the impacts of surveillance and says that people are deprived of their freedom of thinking and speech because of the institution of being tracked. It says that the latest information and communication technology devices like microphones, internet, videos, cameras, and text messages provide more facility to surveillance organizations than customers. Private and public space is easily violated and even a third party keeps records of a person’s shopping choices and personal messages from social media. Finally it says that we are leading a surveillance culture by a surveillance state. This source changed my research approach and provided me multiple valid points which I further used in my paper. For instance, the use of biometric bracelets that tells the attention of students sitting in the hall. It cleared my position by saying that this surveillance is against freedom and democracy which gave people the right to keep their things private. It helped me explain the fact the NSA is a threat to privacy and freedom. Companies can spy any customer or individual because they run their own data-mining setup. Source #2 Schaefer, A. T., & Claridge-Chang, A. (2012). The surveillance state of behavioral automation. Current opinion in neurobiology , 22 (1), 170-176.
  • 3. The source “The surveillance state of behavioral automation” aims to explain the latest use of behavioral data. It says that even complex behaviors can be analyzed and observed. The behaviors include comprehensive observation of animals and humans behavior. In a behavioral study, psychology is also attached, and the techniques include a blend of these domains. The tracking, sorting, and motion capture methods help in automation, which is the physiology of animal transformation. I found this source during my research, and it helped me in explaining my argument clearly about behavioral automation. The method and approach used in the source to describe the surveillance state changed my approach to research. I found this source when I was searching for the reasons for the huge significance of behavioral data. It helped me in understanding the current atomization in behavioral studies. It also identified the latest techniques that can improve observation and experimentation in various neuroscience aspects. Source #3 Sorell, T., & Draper, H. (2012). Telecare, surveillance, and the welfare state. The American Journal of Bioethics , 12 (9), 36-44. The source “Telecare, surveillance, and the welfare state” (Sorell & Draper, 2012) explains how surveillance and telecare are being provided to people and their role in the welfare of the country. It explains in detail these terminologies and the processes they use. The major argument supported in this source is that people do not like being tracked by a party. The concept
  • 4. of the surveillance state is becoming ubiquitous in America, and telecare is playing an important part in it. Telecare is promoting the freedom and independence of customers, by providing those services at their desired locations. I found this source during my research process, and it helped me in explaining my point clear to those who exclude telecare from the surveillance state. Surveillance states can support independence, where people are tech-savvy, and technology is solving their problems. The source also explains how surveillance can intervene in an emergency. This source directs me in the research approach and guided me in explaining my argument, in a highly cohesive and comprehensive way. I used this source to explain telecare benefits for independence and its contribution to making a surveillance state. Source #4 Taylor, J. A., Lips, M., & Organ, J. (2008). Identification practices in government: citizen surveillance and the quest for public service improvement. Identity in the Information Society , 1 (1), 135. The source “Identification practices in government: citizen surveillance and the quest for public service improvement” (Taylor et al., 2008) aims to explain the concept of the surveillance state. It says that the government has the option to know its people by using the latest technology. The data relating to activities and interests of people is gathered from Information and Communication Technology, which has become the closest partner of people, including the use of the internet. It further explains how the government can keep a check on its
  • 5. people, while maintaining their privacy level, along with contextual integrity. The government makes satellite monitoring to get locational data. This information can be used in the Police department for the investigation of crimes. We can summarize that the information collected is used in the public sector ranging from license making to pensioner records. I found this source at the beginning of my research, and it strengthens my position by supporting my argument. At the start of my research I was completely biased about information capitalism and I was only seeing one side of the picture which argues companies are breaching the privacy of people, and they have no right to collect information without the permission of its users. This source clearly depicts the positive aspects and applications of information collected by users. With the help of this source, I was able to explain the point that this information is shared with the government, where it is distributed to other departments like police, etc. Source #5: Zuboff, S. (2015). Big other: surveillance capitalism and the prospects of an information civilization. Journal of Information Technology , 30 (1), 75-89. The source “Big other: surveillance capitalism and the prospects of an information civilization” (Zuboff, 2015) aims to inform readers about the application of data in this modern era, where behavioral data can become a source of revenue, and humans are considered part of this process and not the endpoint of
  • 6. revenue making process. It first explains the fact that Google which is considered a safe and secure website also holds user’s data and this data can be handed over to authorities if needed. The source explains how Google is violating the privacy of millions of people for the collection of big data, like they retain browsing histories, and takes photos of people’s houses without even asking permission. The high use of Google gave it the benefit of a high amount of data, which assists Google to design predictive products first hand. In the end it explains the agreements, communication, and personalization of Google, and says that many of the users are unaware of the fact that they have lost control of their personal data, which is further used for their digital benefits and services. I found this source during my research and it helped me in explaining my arguments. I was unsure about how enterprises use institutional logic, and this source cleared my position regarding behavioral data and personal data, which companies collect based on using their institutional logic which allows them to hack and violate the privacy of customers. This source helped me to understand how companies and businesses control behaviors of customers now, which was opposite in the past. This big data, although it is providing large facilities, on the other side it is intervening in customer’s own matters, which is not liked by many people. This source changed my research approach by providing the argument that surveillance capitalism should not be considered completely evolved, and many aspects of it needed to be carefully examined. 2) In the present enhanced technological scenario, surveillance tasks are being done using state-of-art Information Technology techniques and tools and these are used to extend and augment
  • 7. traditional surveillance systems. In addition to this augmentation, latest Information and Communication Technologies (ICT) are being used in digital domain under the name ‘surveillance capitalism’. Government is predominantly using surveillance techniques either by intelligence services or law enforcement and these are normally justified with an appeal to the “greater good” and protecting citizens but their use is always controversial. Majority of citizens are upset with these mass surveillance actions as their privacy is lost and feel their fundamental rights are denied. Government is sometimes harsh on citizens to implement security activities to protect nations. Now the basic the argument of the public is a trade-off between privacy and security of citizens and nation is not inevitable but is shaped by surveillance employed as a technology-supported security practice, reinforced by securitization under Federal and State security laws. In view of the above the Agenda or Topic of the project is to study and discuss the ethical implications which surveillance, privacy and security call upon us to pay more attention to are those of our own choices, both individual and collective, and choices of government to protect ourselves, information data security and nation’s security without diluting the spirit of these three by adhering to prevailing Federal and State Laws. Related Quotes & Bibliography: “Government classifies far too much information, frequently in violation of applicable laws governing what information may and may not be classified.” Barry Eisler, author, and former CIA officer spoke at the Association of Former Intelligence Officers opposite ex-CIA and NSA director Michael Hayden. Barry Eisler has served under active positions in the CIA’s Directorate of operations and now live in San Francisco Bay Area.
  • 8. https://boingboing.net/2016/03/01/on-whistleblowers-and- secrecy.html “Free speech has occupied an exalted position because of the high service it has given our society. Its protection is essential to the very existence of a democracy. . . . It has been the safeguard of every religious, political, philosophical, economic, and racial group amongst us. . . . [Free speech] has been the one single outstanding tenet that has made our institutions the symbol of freedom and equality.” William O. Douglas, the longest-serving justice in the history of the Supreme Court as he served from (1939-75), and he also wrote books on this experience and observation from his travel diaries as well https://www.mtsu.edu/first-amendment/article/1328/william- douglas “Today we are at a crossroads. The technology is available for two great options: The massive surveillance state or the renewed freedom of a deeply-involved citizenry thinking independently and holding the government to the highest standards” Oliver DeMille is an American author, educator, and public speaker. He is the founder of an educational model known as TJEd and the co-author of Leader Shift. His work mostly is related to education and Orrin Woodward is also considered as a co-author for this. https://www.azquotes.com/quotes/topics/surveillance-state.html “There currently are and always have been real and material
  • 9. consequences of state surveillance that place the physical well being of individuals at risk” Jonathan Hofer is a senior studying political science at the University of California, Berkeley. https://www.dailycal.org/2019/04/23/california-needs-to-better- regulate-surveillance/ “Do we want to live in a society where we live totally naked in front of the government, and they are totally opaque to us” Edward Joseph Snowden is an American whistleblower https://www.amnesty.ca/our-work/issues/survelliance-security- and-human-rights/mass-surveillance “You have an always expanding, omnipresent surveillance state that's constantly chipping away at the liberties and freedoms of law-abiding Americans.” Ronald Lee Wyden is an American politician who is currently serving as the senior United States Senator for Oregon https://www.azquotes.com/quote/1341720