Examining Internet and Technology Around the World by Steckman Laura M.;
Author:Steckman, Laura M.;
Language: eng
Format: epub
Publisher: ABC-CLIO, LLC
Published: 2020-09-15T00:00:00+00:00
Privacy is about much broader values than just âhiding things.â . . . [U]ltimately the fullest retort to the ânothing to hideâ impulse is a richer philosophical defense of privacy that articulates its importance to human lifeâthe human need for a refuge from the eye of the community, and from the self-monitoring that living with others entails; the need for space in which to play and to try out new ideas, identities, and behaviors, without lasting consequences; and the importance of maintaining the balance of power between individuals and the state.
In broadening the online privacy conversation to include more nuanced perspectives and definitions, scholars claim that we rise to the occasion and bring light to all the complex seriousness of online privacy issues in the United States. Irina Raicu (2017), director of the Internet Ethics program at the Markkula Center for Applied Ethics, claims that âIn addressing issues such as the balance of power between individuals and the state, weighing the benefits and harms that result from a particular privacy-related practice, or considering whether privacy is a right that must be respected, you are engaging in a process of ethical analysis.â Because there have been no resolutions in the online privacy debate, the conversation will continue until a side wins, for privacy concerns, both online and offline, directly impact the present and the future of multiple generations.
A. R. Mallory
Further Research
Boyd, Danah. 2010. âMaking Sense of Privacy and Publicity.â SXSW Austin, Texas. Accessed April 20, 2019. http://www.danah.org/papers/talks/2010/SXSW2010.html.
David, E. E., and R. M. Fano. 1965. âSome Thoughts about the Social Implications of Accessible Computing.â Proceedings of the 1965 Fall Joint Computer Conference. https://www.multicians.org/fjcc6.html.
Editorial Board. 2017. âRepublicans Attack Internet Privacy.â New York Times. Accessed March 29, 2019. https://www.nytimes.com/2017/03/29/opinion/republicans-attack-internet-privacy.html.
Engleman, Eric. 2012. âSOPA Bill Petition Collects 7 Million Signatures, According to Google.â Washington Post. Accessed May 5, 2019. https://robinwestenra.blogspot.com/2012/01/sopa-bill-petition.html.
H.R. 3261. 2011. âStop Online Piracy Act.â House Judiciary Committee. Accessed August 13, 2019. https://www.congress.gov/bill/112th-congress/house-bill/3261.
Krapf, E. 2007. âA Perspective on Internet Security.â Business Communications Review 37 (6): 10â12.
Raicu, Irina. 2017. âLoss of Online Privacy: Whatâs the Harm?â Markkula Center for Applied Ethics, Santa Clara University. Accessed June 19, 2019. https://www.scu.edu/ethics/privacy/loss-of-onlineprivacy-whats-the-harm.
Stanley, Jay. 2012. âPlenty to Hide.â ACLU. Accessed June 19, 2019. http://www.aclu.org/blog/technology-and-liberty-nationalsecurity/plenty-hide.
Wheeler, Tom. 2017. âHow the Republicans Sold Your Privacy to Internet Providers.â New York Times. Accessed March 29, 2019. https://www.nytimes.com/2017/03/29/opinion/how-the-republicans-soldyour-privacy-to-internet-providers.html.
Valcke, M., B. De Wever, H. Van Keer, and T. Schellens. 2011. âLong-Term Study of Safe Internet Use of Young Children.â Computers & Education 57 (1): 1292â1305. https://doi.org/10.1016/j.compedu.2011.01.010.
Valentino-DeVries, Jennifer, Natasha Singer, Michael H. Keller, and Aaron Krolik. 2018. âYour Apps Know Where You Were Last Night, and Theyâre Not Keeping It Secret.â New York Times. Accessed May 30, 2020. https://www.nytimes.com/interactive/2018/12/10/business/location-data-privacy-apps.html.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7397)
Grails in Action by Glen Smith Peter Ledbrook(7291)
Kotlin in Action by Dmitry Jemerov(4633)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4127)
The Age of Surveillance Capitalism by Shoshana Zuboff(3411)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3236)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3011)
Mastering Python for Networking and Security by José Manuel Ortega(2936)
Blockchain Basics by Daniel Drescher(2883)
TCP IP by Todd Lammle(2633)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(2537)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2478)
Hands-On Azure for Developers by Kamil Mrzyglod(2397)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(2335)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2309)
The Social Psychology of Inequality by Unknown(2304)
The Art Of Deception by Kevin Mitnick(2292)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(2286)
Azure Containers Explained by Wesley Haakman & Richard Hooper(2168)