Академический Документы
Профессиональный Документы
Культура Документы
StephanieBarnard
JasonLumicao
CST373
15October2015
TheLimitsofPrivacyPost9/11
Martinez,Barnard,Lumicao1
IntroductionWhatisprivacy?
According to definition in Webster dictionary, privacy has many meanings. Privacy is the state
of being alone, the state of being away from other people, the state of being away from public
attention, including the freedom from unauthorized intrusion. Privacy is an issue of profound
importance for each individual around the globe. In almost every nation, documented
constitutional rights, have taken place as a judicial decisions, in order to protect a persons
privacy. Many countries around the world, have enshrine privacy asafundamentalrightintheir
constitutional laws, however, in the United States, the Constitution doesnotexplicitlymakeuse
of the word privacy. Instead, the Constitution safeguards the sanctity of a personshome,and
protectstheconfidentiality ofcommunicationsfromgovernmentintrusion(Solove,p.2).In1791,
when the founding fathers were pursuing separation,fortheU.S.,fromatyrannicalgovernment,
they wrote the Bill of Rights as a collective name for the first ten amendments to the U.S.
Constitution. The Fourth Amendment in particular, proves tobeanimportantcornerstoneforall
privacylaws:
The right of the people to be secure in their persons, houses, papers, and effects, against
unreasonable searches and seizures, shall not be violated, and no warrants issued, but upon
probable cause, supported by oath or affirmation, and particularly describing the place to be
searched,andthepersonorthingstobeseized.
In addition, Fifth Amendment also provides protection against selfincrimination. More
recently,theU.S.SupremeCourthasheldtheConstitutiontopreservethezoneofprivacy,and
include decisions people make of theirsexualconduct,birthcontrol,health,includingprotection
ofpersonalinformationagainstunwarranteddisclosurebythegovernment(Solove,p.3).
Martinez,Barnard,Lumicao2
Privacy intodayssocietyencompasseswithwhom,apersondecidestowhetherornot,associate
with. It also incorporates the ability of a person to share disclosed information at their own
discretion. However, in this modern eraoftechnology,personalinformationbeingtransferredas
data, is constantly recorded or under attack. Individual privacy isatthe coreofpersonalidentity
and personal freedom. While the argument could be made for gathering or recording of
information, to serve a useful purpose for health, finances, and identity. Laws written toprotect
privacy, do not hinder brokers to collect and distribute sensitive information. This unfavorable
ability for individuals to choose withwhomtoassociatewith,poseasignificantcauseforworry.
When we assent to becoming a member of society, we agree to give up some freedom and
independence. That freedom that remains is what constitutes our common notion of individual
privacy(Mills,2008).
While the general public is content with using Facebook, Google, Amazon, and several
other companies who gather user information they reject the notionofthegovernmentusing the
same information to protect its citizens especially after 9/11. The U.S. government needed to
reaffirm its citizens, a primary objective, providing basic security and civic peace. Now is the
time to consider whether the government has our best interest for privacy, rather than a greedy
corporationlookingforprofits.
OurPersonalConceptsofPrivacy:
Steph:
GenderFemale
Age:21
Ethnicity:BlackAmerican
Martinez,Barnard,Lumicao3
As a black woman in the United States, my concepts and values of privacy is much
different from that of other citizens. To me,Americaismyhomebecauseitis all that myfamily
and I know. I am a part of a minority whoishasbeenwatchedandscrutinizedforaslongas we
can remember. Growing up in a black family was challenging with elders who want to see our
youth excel in order to combat the reality of just being another statistic another zero in the
system. FrommygrandmotherwhowasmakingsurethatIkeptmymoralsandreligionintactin
order to become spirituallysuccessfultomy motherwhoremindedmeeverydaythatnochildof
hershasalovelifebecauseeducationisfartoovaluableasablackwoman.
I am the youngest of three children and following my 25 yearold brother and my 33
yearold sister. Although my siblings and I had the same biological father, he was not
consistently presentinneither ourlivesnorourhome.Thisplayedavitalrolebothinthewaywe
were raised and how we each viewed the world. I shared a room with my brother when Iwasa
toddler because we were much closer in age than my sister and me. This helped shaped me in
many ways. I became close to my brother, which resulted in me getting along with guys much
better thangirls.Thethingsthatyounggirlsaretaughtshouldbeconversationshadamongsolely
girls, I was comfortable having with guys because of therelationshipIhadwithmybrother.For
example, I was more comfortable talking to my boy friends about who I had a crush on rather
than talking to a girls aboutit.However,asIgrewup,mymother,sisterandgrandmothertaught
methevalueofprivacyasawoman.
Although my family taught me that I should value my privacy as a woman,asachildof
mothers, I had no privacy when it came to her knowing. This was a way she could stay
connected and involved in the way I was being brought up and the direction my lifewastaking
Martinez,Barnard,Lumicao4
me in. She knew about every bad grade, every phone conversation, any social media account,
and even notes I passed in class. I find privacy to be conditional depending on the person and
theirbackgroundandmorals.
Jason:
Gender:Male
Age:21
Ethnicity:Filipino
I am a first generationImmigrantAmerican.IwasbornandraisedinthePhilippines,and
growing up in a third world countryhasshiftedmyviewsonprivacy.Ihavetakenaclosenotice
on the definition of privacy coming from two perspectives, one from what I learned from my
eldersandschoolinginthePhilippinestohowIgrewupandwhereIamnowinAmerica.
I grew up in a rural town called Bayombong. It was a small farming town at thetimeof
my youth, and it was very close to its roots.The peoplewerelivingthetypicaltraditionallifeof
farming and other simple, but rewarding lifestyles.Communitywashighlyvaluedintownssuch
as these since helping others and giving back to the community helped everyone prosper. From
simple farm workers to even doctors, there is always a way to contribute to the community.
Everybody wascloseandeldersofthecommunitywouldpassdowntotheyouthtoalwaysvalue
your neighbors since the community is essentially the embodiment of a family. This shapedmy
being as well contributing to my understanding of privacy at an early age to always be honest,
buildatrustwithothers,andtonotkeepsecretsfromyourneighbors.
My understanding of privacy became even more prevalent when my family decided to
move to the U.S. It wasquiteacultureshock sinceeverypersonwasstrictlyfollowingtheirown
agendas and I did not immediately find a sense of community. People were more social and
Martinez,Barnard,Lumicao5
connections were everywhere, and at the same time everyone only cared what revolved around
them. Regardless what outlet it may be from using technology to connect via social media,
physical interactions, and anything in between people wanted to make connections. My
understanding of privacy was almost like an object that we take care and only exclusive to
ourselves,howeverwillingtoshareittothosewedeemappropriatetobeabletolook.
Overall I still remember the teachingsIlearnedasachildfromanothercountry,andIam
somewhat finding a middle ground to balance out my life that I live now. Privacy is a very
important object in my life as it establishes information as to who I am as a person. It defines
what I value, what I want others to see me, and appliestruetohowIunderstandothersandhow
they end up becoming represented. Privacy is both a glass house andawellsecured vault toour
verybeing.ThatishowIseeprivacy.
Rico:
Gender:.
Male
Age:42
Ethnicity:Mexican
Martinez,Barnard,Lumicao6
TechnologyandPrivacy:
Rico:
Biometrics
Biometric technology is defined as technology that analyzes and measures unique
physiological or biological characteristics, that can be stored electronically, and retrieved for
positive identification. Biometric data canbestoredinoneormorecentraldatabasessharedonly
by people with high security clearance and authority, for use of identification verification
purposes (Etzioni, p. 115). The biggest concern with Biometrics is the verification security is
based on something you are. Unlike a password, that ismadeupandarbitrary,issomethingyou
try to remember, and can be forgotten. A token on the other hand, is something you have, or
keep, and can be lost. But a fingerprint can not be forgotten or misplaced. One of the
contemporary
problem for example, is that Apple iPhone TouchID, andotherbiometricsecurity
systems, aren't actually authenticating an individual based on fingerprints. They are
Martinez,Barnard,Lumicao7
Martinez,Barnard,Lumicao8
Nearly four years ago at a hacker conference, wellknown security researcher for the
consultancy Recursion Ventures, Kristin Paget (formerly known as Christopher Paget)
demonstrated the accessibility a hacker can have to this information. At theShmooconhacker
conference, Paget aimed to indisputably prove what hackers have long known and the payment
card industry has repeatedly downplayed and denied:ThatRFIDenabledcreditcarddatacanbe
easily, cheaply, and undetectably stolen and used for fraudulent transactions. (Greenberg,
2012). Though this was not new information to the security industry who has known that
contactless credit cards could be read wirelessly since 2006. In newer forms of RFID credit
cards, the card holders pin and CVV threedigit code on the back was not displayed withinthe
information a hacker would access which, the security industry argues, makes it impractical.
Although there are few benefits that come with RFID credit cards, these flaws have concerned
thepopulationwhohavethisnewtechnologyversusthetraditionalcreditcards.
Jason:
SecurityCameras
Security Cameras have been a powerful piece of technology ever since its release.Ithas
been proven to have helped several cases in scenarios of theft,robbery,andothermiscellaneous
crimes. Security cameras have become very popular and quite affordable in recent years that
even the public can purchase and installtheminwithintheconfinesoftheirprivateproperty.As
any piece of technology, security cameras are no exception to upgrades and improvements.
Recently, cameras have been enabled and implemented with facial recognition to identify a
certainindividualwiththeirhighresolutionlensestocreateanevenmoreaccuratetarget.
The FBI has introduced a new type of identification system which can track eye
movement, voice, and even walking strides. It is essentially a software that can be installed to
Martinez,Barnard,Lumicao9
cameras, mainly security cameras, but would then transition to more discrete devices like the
camera on your phone.Thistechnologyhasbeenprototypedandhavealreadybeenimplemented
to by several police departments that signed up for the pilot program By 2015, the system is
expectedtoproduceresultsonmorethan55,000photosearcheseveryday.(Pagliery,2014)Itis
quite an impressive technology that can potentially help with furtherinvestigation,howeveritis
also an infringement on the publics privacy since there are currently no regulationtowhenand
where they can use this technology, especially with drones this can potentially track and ID
anyoneinthiscountry.
Comparing/Contrastingwithgenerational/political/regionaldifferences:
Millennialgeneration:
The millennial generation comprise those born between 1982 and the early 2000s, also
known at Generation Y. When asked, about halfofthemillennialgenerationworryaboutdigital
privacy. This is plausible considering that todays society is seeing a rise intheadvancementof
technology like never before. Most things that weve had to do physically or inperson is now
available online shopping, catching up with the latest headlines, communicating with our
friends, social media, paying our bills, and watching movies arejustthebasics.Millennialscare
aboutonlineprivacybuttotheextentthatitisconvenient.
We want to know how our information is used, but its not easy to read a multipage
privacy policy. We dont want our credit card information compromised, but it is
inconvenient to stop buying online. By refusing to change our behavior, Millennials are
supplying data brokers with thousands of data points, which companies use to create a
profileonus.(OnMarketing,2014).
Martinez,Barnard,Lumicao10
The same public privacy is nonexistent in our society, online privacy is headed in the
same direction. It raises the question, if people put their information anywhereonline,whether
its through a trusted bank or a shopping site, are they at fault is their data is compromised?
Most would think that as children of this generation, now growing into adults, we would be
concernedwiththeinformationwesowillinglyputondigitalsiteseventhoughwearelivingina
day in age where it is much easier for our personal information to be made public and our
identitiesstolen(Powell,2015).
Communitarian:
Responsive Communitarian
seek to balance individual rights with socialresponsibilities,
and individuality with community. They do not view community or social harmony as an
unbounded or privileged good but rather treat social structure for the common good as values
that need to be balanced with concerns for individual rightsandsubgroupautonomy(Etzioni,p.
198). Any information that resides within the public sphere, that is also available to large
companies, should also be made available to the government. The government is proactive in
protecting society as a whole, and the loss of a little privacy in order to protect country/society
forthegreatgoodisacceptable.
Libertarian:
Martinez,Barnard,Lumicao11
Cultural/SocietalPerspective:
Jason:
NorthKorea
North Korea is well known as a military state, and as such privacy is a very important
aspect. The country has been well known for its secrets to the extent that some information are
even hidden to the people living in the country. Censorship iswellenforcedwithinitswallsand
it has a major toll on the country's citizens.ItsalmostimpossibleforaNorthKoreanresidentto
get a full grasp of events happening around the world since media and the internet iscontrolled
solely by the government. The oneparty regime owns all domestic news outlets, attempts to
regulate all communication, and rigorously limits the ability of the North Korean people to
access outside information. (Freedom of the Press, 2013) Any and all gathering and tampering
withinformationisaveryseriousoffenseinNorthKorea.
NorthKoreahasalso beenaccountedformanyatrocities,butitishardtosayif it isonly
just scratching the surface. Australian judge Michael Kirby, published a devastating report in
February 2014 that concluded that the North Korean government has committed systematic
human right abuses at a scale without parallelinthecontemporaryworld(WorldReport,2014)
Most crimes that are punished are usually those who seek and gain information outside of the
countryasobtainingsuchknowledgeispunishablebylifeinprison,andevendeath.
Martinez,Barnard,Lumicao12
Martinez,Barnard,Lumicao13
The relevant provision, Article 37, is very concise: The privacy of citizens, their
Martinez,Barnard,Lumicao14
and freedom. It could be argued that any individual who faces privacyissueswithinthecountry
canbejustifiedbythisactgenerallynonNigerianswithinthecountry(Kusamotu,2007).
Conclusion:
Akinsuyi, F. (2015). Data protection and privacy laws nigeria, a trillion dollar
opportunity!!RetrievedOctober14,2015.
http://ssrn.com/abstract=2598603
Martinez,Barnard,Lumicao15
Consumer Reports magazine (2011). Newer cards can be hijacked, too. RetrievedOctober
13,
2015.
http://www.consumerreports.org/cro/magazinearchive/2011/june/money/creditcardfraud
/rfidcreditcards/index.htm
Dale,K.(2013,September10).Howtostealafingerprint.RetrievedOctober6,2015.
http://www.chicagonow.com/listingtowardforty/2013/09/howtostealafingerprintiphone
/
Etzioni,A.(1999).
Thelimitsofprivacy
.NewYork:BasicBooks.
Greenberg, A. (2012). Hacker's demo shows how easily credit cards can be read through
clothes
and
wallets.
Retrieved
October
14,
2015.
http://www.forbes.com/sites/andygreenberg/2012/01/30/hackersdemoshowshoweasilycr
editcardscanbereadthroughclothesandwallets/
Keizer,G.(2012).
Privacy
.NewYork:Picador.
Mills,J.(2008).
Privacy:Thelostright
.Oxford[UK:OxfordUniversityPress.
On Marketing. (2014). Why Online Privacy Should Be The Defining Cause Of The
Millennial
Generation.
Retrieved
October
15,
2015.
http://www.forbes.com/sites/onmarketing/2014/07/24/whyonlineprivacyshouldbethedef
iningcauseofthemillennialgeneration/
Powell, A. (2015). Study: millennials indifferent about about digital privacy. Retrieved on
October
15,
2015.
http://college.usatoday.com/2015/04/03/studymillennialsindifferentaboutaboutdigitalpr
ivacy/
Solove,D.(2008).
Understandingprivacy
.Cambridge,Mass.:HarvardUniversityPress.
Tancer, B. (2008).
Click: What millions of people are doing online and why it matters
. New
York:Hyperion.
Martinez,Barnard,Lumicao16
"LibertarianParty."
LibertarianParty
.Web.15Oct.2015.