HCA 457 California State University Long Beach Working Around the World Essay

Custom Writing Services by World Class PhD Writers: High Quality Papers from Professional Writers

Best custom writing service you can rely on:

☝Cheap essays, research papers, dissertations.

✓14 Days Money Back Guerantee

✓100% Plagiarism FREE.

✓ 4-Hour Delivery

✓ Free bibliography page

✓ Free outline

✓ 200+ Certified ENL and ESL writers

✓  Original, fully referenced and formatted writing

HCA 457 California State University Long Beach Working Around the World Essay
Sample Answer for HCA 457 California State University Long Beach Working Around the World Essay Included After Question
Description

Read Lesson Introduction

Read O’Lawrence’s text – Chapter 3 Pages 31 -54

Read Chernotsky & Hobbs – Chapter 3 Pages 54 – 81

Read Article: Price, T. (October 2013). Big Data and Privacy. CQ Researcher 23(38), 909–932 

450-500 word essays addressing the questions stated in the assignment. The essays should demonstrate your familiarity with the reading material and concepts, understanding of the topic discussed, your ability to conduct additional and relevant to the topic research and integrate the knowledge from the class material and other sources with your personal and professional experience. You are expected to cite and reference minimum three sources of information; it might include the class textbook, lecture notes, and any other sources you find during your research activities for each lesson.

Part 1

How do different generations communicate? What are some of the reasons that experts are worried about the increase in online communication among young people?

.Part 2

According to the text, what is the main mission of workforce education and development in the 21st century?

Published by CQ Press, an Imprint of SAGE Publications, Inc. www.cqresearcher.com Big Data and Privacy Should the use of personal information be restricted? B ig data — the collection and analysis of enormous amounts of information by supercomputers — is leading to huge advances in such fields as astrophysics, medicine, social science, business and crime fighting. And big data is growing exponentially: According to IBm, 90 percent of the world’s data has been generated within just the past two years. But the use of big data — including Tweets, facebook images and email addresses — is controversial because of its potential to erode individual privacy, especially by governments conducting surveillance operations and companies marketing products. Some civil liberties advocates want to control the use of big data, and others think companies should pay to use people’s online information. But some proponents of big data say the benefits outweigh the risks and that privacy is an outdated concept. A refrigerator that can communicate with a homeowner’s smartphone is shown at the 2013 International Consumer Electronics Show in Las Vegas. Big data experts say the amount of information processed and analyzed will increase exponentially in the future. Huge amounts of data will be generated by what many are calling the “Internet of Things” — the online linking of sensors installed on more and more inanimate objects, such as home appliances. I N THIS REPORT S I D E CQ Researcher • Oct. 25, 2013 • www.cqresearcher.com Volume 23, Number 38 • Pages 909-932 THE ISSUES ………………..911 BACKGROUND …………….918 CHRONOLOGY …………….919 CURRENT SITUATION ……..924 AT ISSUE……………………925 OUTLOOK ………………….926 RECIPIENT Of SOCIETY Of PROfESSIONAL JOURNALISTS AwARD fOR EXCELLENCE ◆ AmERICAN BAR ASSOCIATION SILvER GAvEL AwARD BIBLIOGRAPHY …………….930 THE NEXT STEP …………..931 BIG DATA AND PRIvACY THE ISSUES 911 918 SIDEBARS AND GRAPHICS Big Data Reveals Sources of Racist Tweets Racist “hot spots” were often in rural areas. • Do big data’s benefits outweigh the risks? • Is the use of big data speeding the erosion of privacy? • Should the federal government strengthen its regulation of big data? 912 913 Most Americans View Big Data Negatively fewer than 40 percent see it as “mostly positive.” BACKGROUND 916 Health Care Providers, Employers Most Trusted to Protect Data Political parties and the media are considered least trustworthy. Data Overload Technologies emerged to address the “information explosion.” 921 Birth of Big Data Sociologist Charles Tilly coined the term “big data” in 1980. 922 Data and Politics Sen. Barrack Obama’s 2008 presidential campaign succeeded in part because it used big data. 919 Chronology Key events since 1967. 920 Using Big Data to Test Historical ‘Facts’ ‘Big data allows us to ask questions that were not possible before.” CURRENT SITUATION From Yottabytes to Googolplexes: Big Data Explained for some, it’s “writing zeroes until you get tired.” 924 Hunting Criminals Law enforcement uses big data to track lawbreakers and terrorists. At Issue: Are new laws needed to prevent organizations from collecting online personal data? 924 ‘Reclaim Your Name’ Some companies oppose allowing Internet users to block use of their data. OUTLOOK 926 ‘Internet of Things’ Billions of Internet-linked sensors in inanimate objects will generate huge amounts of data. Cover: Getty Images/David Becker 910 CQ Researcher 922 Oct. 25, 2013 Volume 23, Number 38 MANAGING EDITOR: Thomas J. Billitteri tjb@sagepub.com ASSISTANT MANAGING EDITORS: Lyn Garrity, lyn.garrity@sagepub.com, Kathy Koch, kathy.koch@sagepub.com SENIOR CONTRIBUTING EDITOR: Thomas J. Colin tom.colin@sagepub.com CONTRIBUTING WRITERS: Sarah Glazer, Peter Katel, Reed Karaim, Barbara mantel, Tom Price, Jennifer weeks SENIOR PROJECT EDITOR: Olu B. Davis FACT CHECKER: michelle Harris An Imprint of SAGE Publications, Inc. VICE PRESIDENT AND EDITORIAL DIRECTOR, HIGHER EDUCATION GROUP: michele Sordi EXECUTIVE DIRECTOR, ONLINE LIBRARY AND REFERENCE PUBLISHING: Todd Baldwin FOR FURTHER RESEARCH Copyright © 2013 CQ Press, an Imprint of SAGE Publications, Inc. SAGE reserves all copyright and other rights herein, unless previously specified in writing. No part of this publication may be reproduced electronically or otherwise, without prior written permission. Unauthorized reproduction or transmission of SAGE copyrighted material is a violation of federal law carrying civil fines of up to $100,000. 929 For More Information Organizations to contact. CQ Press is a registered trademark of Congressional Quarterly Inc. 930 Bibliography Selected sources used. 931 The Next Step Additional articles. 931 Citing CQ Researcher Sample bibliography formats. 925 CQ Researcher (ISSN 1056-2036) is printed on acidfree paper. Published weekly, except: (march wk. 5) (may wk. 4) (July wk. 1) (Aug. wks. 3, 4) (Nov. wk. 4) and (Dec. wks. 3, 4). Published by SAGE Publications, Inc., 2455 Teller Rd., Thousand Oaks, CA 91320. Annual full-service subscriptions start at $1,054. for pricing, call 1-800-818-7243. To purchase a CQ Researcher report in print or electronic format (PDf), visit www.cqpress.com or call 866-427-7737. Single reports start at $15. Bulk purchase discounts and electronic-rights licensing are also available. Periodicals postage paid at Thousand Oaks, California, and at additional mailing offices. POSTmASTER: Send address changes to CQ Researcher, 2300 N St., N.w., Suite 800, washington, DC 20037. Big Data and Privacy BY TOM PRICE THE ISSUES tices. But big data is controversial because of its potential to erode individual prihen Peter Higgs and vacy, especially in the wake françois Englert of recent revelations that the won the Nobel National Security Agency (NSA) Prize for physics this month, is collecting massive amounts they were honored for a theof personal information about ory they published nearly a Americans and others around half-century ago but was not the world. Critics want privaconfirmed until march. cy controls on big data’s use, Higgs, of Scotland’s Univerwhile proponents say its bensity of Edinburgh, and Englert, efits outweigh its risks. of Belgium’s Université Libre Big data has led to cuttingde Bruxelles (free University edge medical discoveries and of Brussels), had independently scientific breakthroughs that theorized that matter obtains would have been impossible in mass from an unknown enthe past: links between genetergy field that permeates the ic traits and medical conditions; universe. Higgs suggested it correlations among illnesses, is composed of an undiscovtheir causes and potential ered subatomic particle, which cures; and the mapping of the became known as the Higgs human genome. boson. To confirm the theory, Big data also is a boon to scientists needed to find that businesses, which use it to particle. conduct consumer marketing, They finally succeeded figure out when machines will largely with the help of sobreak down and reduce enercalled big data — the colgy consumption, among other Actor Kunal Nayyar wears Google glasses to the 65th Annual Primetime Emmy Awards in Los Angeles lection and analysis of enorpurposes. Governments mine on Sept. 22, 2013. Part of the big data revolution, the mous amounts of information big data to improve public serglasses contain a computer that can take pictures, by supercomputers, often in vices, fight crime and track respond to voice commands, search the Internet and real time. Physicists analyzed down terrorists. And pollsters perform other functions. Along with the nonstop trillions of subatomic exploand political scientists use it to collection of data come concerns about loss of privacy. sions produced at the Euroanalyze billions of social media pean Organization for Nuclear Research’s up to 600 million collisions per second, posts for insights into public opinion. Large Hadron Collider, a 17-mile cir- and the teams’ servers can handle 10 (See graphic, p. 913.) cular underground tunnel that crosses gigabytes* of data a second. 2 Even humanities scholars are emThe search for the Higgs boson is bracing big data. Historians tap big the border between Switzerland and france. There, protons are fired at each just one of a vast array of discover- data to gain new perspectives on hisother at nearly the speed of light, shat- ies, innovations and uses made pos- torical figures. (See sidebar, p. 920.) tering them into other subatomic par- sible by the compilation and manip- Other scholars use it to study literaulation of big data. The explosively ture. In the past, researchers investiticles, including the Higgs. 1 To analyze the results of those col- emerging field could radically advance gating literary trends might read 10 lisions, scientists needed computing ca- science, medicine, social science, crime- books and conclude that “these books pability that was “of larger scale and fighting and corporate business prac- from this era show us how literature faster than ever before,” says Joe Inis different” from another era, says Brett candela, a University of California, Santa * A gigabyte is 1 billion bytes. A byte is eight Bobley, director of the National EnBarbara, physics professor who led one bits. A bit is one action of a computer switch. dowment for the Humanities Office of of the two collider teams searching for A byte commonly is equivalent to a single al- Digital Humanities. “Today, a researcher the Higgs. The collider can generate phanumeric character. could study thousands of books and Getty Images/Frazer Harrison w www.cqresearcher.com Oct. 25, 2013 911 BIG DATA AND PRIvACY Big Data Reveals Sources of Racist Tweets Geographers at Humboldt State University in Arcata, Calif., used big data to create an interactive “Geography of Hate” map revealing where racist Twitter traffic originated. Hot spots predominated in the Midwest, South and Northeast, often in rural areas. Where Most Racist Tweets Originated, June 2012-April 2013 Most hate Some hate To protect privacy, actual tweet locations have been aggregated to the county level and normalized by number of tweets. Source: Monica Stephens, “Geography of Hate,” Humboldt State University, http://users.humboldt.edu/mstephens/hate/hate_map.html# look at how language changes over time, how the use of gender changes, how spelling changes.” Uses of big data involve businesses, governments, political organizations and other groups vacuuming up massive amounts of personal information from cell phones, GPS devices, bank accounts, credit-card transactions, retail purchases and other digital activities. The data often are gleaned from search engines, social networks, email services and other online sources. The mountains of information compiled in this manner — and the way they are analyzed and put to use — generate much of the criticism of big data, particularly after former NSA computer specialist Edward Snowden revealed in June that the agency has been collecting Americans’ telephone and email records, and The New York Times revealed that the Drug Enforcement Administration had ordered AT&T to hand over vast amounts of records about its customers’ telephone and computer usage. 3 912 CQ Researcher “I don’t really want to live in a total surveillance state where big brother knows everything I do and has all that information at its fingertips,” says John Simpson, privacy project director for Consumer watchdog, a consumer advocacy organization in Santa monica, Calif. Sen. Jay Rockefeller, D-w.va., has introduced a measure to allow Internet users to prohibit websites from collecting any of their personal information except when needed to provide a requested service to that person. Even then, the identity of the user would have to be kept secret or the information would have to be deleted after the service was performed. The bill awaits action in the Senate Committee on Commerce, Science and Transportation. 4 Big data differs from old-fashioned data partly in the massive volume of the information being collected. But other distinctions exist as well. Big data computers often crunch vast amounts of information in real time. And they can reach beyond structured databases — such as a company’s customer list — to make sense of unstructured data, including Twitter feeds, facebook posts, Google searches, surveillance-camera images and customer browsing sessions on Amazon.com. As a result, Internet platforms, such as facebook or Google, act as big data “sensors,” gathering information about people just as a thermometer gathers temperature information. In addition, Internet-connected optical, electronic and mechanical sensors are being installed in ever-increasing numbers and locations. viktor mayer-Schonberger and Kenneth Cukier offer striking illustrations of the size of the data being collected — and the speed with which the volume of that information is growing — in their 2013 book Big Data: A Revolution that Will Transform How We Live, Work, and Think. If all the world’s data were distributed among everyone on Earth, they write, each person would have 320 times more information than existed in third-century Egypt’s Alexandria Library. If today’s information were stored on stacks of compact disks, the stacks would stretch from Earth to the moon five times. In 2000, only one-fourth of the world’s information was stored digitally. Today 98 percent is, and the amount of digital data is doubling every two to three years, according to mayerSchonberger, a professor at Oxford University’s Internet Institute, and Cukier, data editor of The Economist. 5 According to IBm, 90 percent of the world’s data has been created in the last two years, and that information is growing by 2.5 quintillion bytes each day. 6 (A quintillion is 1 followed by 18 zeroes. See sidebar, p. 922.) for example, rapidly improving telescopes linked to powerful computers and the Internet are doubling the world’s compilation of astronomical data each year and making it available to astronomers around the globe. Until it suffered a major malfunction in may, the Kepler Space Most Americans View Data Collection Negatively More than half of Americans polled in May and June said the massive collection and use of personal information by government and business have a “mostly negative” impact on privacy, liberty and personal and financial security.* The polling was done just before former National Security Agency computer specialist Edward Snowden in June revealed widespread NSA domestic spying. Fewer than 40 percent of the respondents see the use of big data as “mostly positive.” Fewer than half trust how the government uses their personal data, and nearly 90 percent support the so-called “right to be forgotten.” What is your viewpoint on . . . Collection and Use of Big Data? A New Federal Privacy Law? Mostly negative, because big data puts privacy, safety, financial security and liberty at risk. Would you support a federal law that would require online companies to permanently delete personal data or activity if requested by an individual (the so-called “right to be forgotten”)? Mostly positive, because big data can improve the economy, grow businesses, increase public safety and provide better service. 89% Social Media? Being able to connect with people all over the world and access information about any subject is worth the potential privacy tradeoffs. The ease of communicating and locating information online has made it too easy for personal information to be shared and is not worth the risks. 47% 47% Yes Yes 55% 38% 8% Yes Yes Support, strongly or somewhat Oppose, strongly or somewhat Note: Totals do not add to 100 because don’t know/refused to answer responses are not included. * Pollsters contacted 1,000 people by telephone between May 29-June 2, 2013. Source: “Allstate/National Journal/Heartland Monitor Poll XVII,” June 2013, www.theheartlandvoice.com/wp-content/uploads/ 2013/06/HeartlandTopline-Results.pdf Telescope, for instance, measured the light of 170,000 stars every 30 minutes in search of changes indicating the presence of planets, according to Alberto Conti, a scientist for the Space Telescope Science Institute at Johns Hopkins University. 7 As advances in technology relentlessly expand big data’s capabilities, here are some questions that scientists, business executives, privacy advocates and government officials are debating: Do big data’s benefits outweigh the risks? mario Costeja was shocked when a Google search on his name returned www.cqresearcher.com an 11-year-old Spanish newspaper notice about a financial transgression. Costeja, a Spaniard, had become delinquent on social security contributions, creating a debt that landed him in legal trouble in 1998 but that he had long since paid. In a case still pending, Costeja asked a court to order the newspaper to remove the notice from its online archives and Google to block the notice from search results. The court ruled in the newspaper’s favor, but the Google ruling remains undecided. 8 Costeja’s plight reveals a key drawback to big data: Once something enters an online database, it can be im- possible to erase. Before digital databases and powerful search engines, the newspaper notice that Costeja encountered in 2009 would have existed only as a yellowed clipping in the newspaper’s “morgue,” or perhaps been buried in microfilm or old newspapers stored in a few libraries. But with today’s search engines capable of instantly exploring every database connected to the Internet, old transgressions can be found by anyone with a computer connection. And polls indicate that people are concerned about losing control of information once it gets collected and stored. Oct. 25, 2013 913 BIG DATA AND PRIvACY you,” he says. Analysis might conclude, for example, that “you’re probably a health risk because you go to all these sites about losing weight, and we can see you’re buying too much booze. “Similarly, you can slice and dice the data you get from the web and other sources and produce something that might be used to determine whether you should get a job, whether you should get a loan, or what rate you have to pay if you get the loan.” Getty Images/John Moore Of 1,000 Americans surveyed this year, 55 percent perceive a “mostly negative” impact from the collection and use of personal information. (See graph, p. 913.) Two-thirds complain they have little or no control over information collected about them. Threefifths believe they can’t correct erroneous data. Conducted for the Allstate insurance company and National Journal, and just before the NSA domestic spying became public, the poll Police at New York City’s counterterrorism center monitor more than 4,000 security cameras and license plate readers in the Financial District and surrounding parts of Lower Manhattan. Vast amounts of data are collected and stored by police departments and other government agencies. For example, law enforcement agencies store photos taken by cameras mounted on patrol cars and on stationary objects. Governments store photos made for driver’s licenses and other identification documents. Many images are stored indefinitely and can now be searched with facial-recognition technology across multiple databases. found that only 48 percent of Americans trust how governments, cellphone companies and Internet providers use that information. 9 Simpson of Consumer watchdog says big data can harm individuals, especially if the information is erroneous or used to draw incorrect conclusions. Organizations can collect information from a variety of sources, then use it to “put together a profile about you that potentially could be used against 914 CQ Researcher with sophisticated enough analysis, organizations might “red-line people,” just as neighborhoods, suggests Jules Polonetsky, executive director and cochair of the future of Privacy forum, a washington-based think tank. Such “weblining,” as some are calling it, can cause people to pay more for health insurance if they have traits associated with certain illnesses, he explains, or a person’s credit rating could be affected by his facebook friends’ financial histories. Those are “probabilistic predictions that punish us not for what we have done, but what we are predicted to do,” said mayer-Schonberger, the Oxford professor. 10 But Jeff Jarvis, a City University of New York journalism professor who writes frequently about big data, says critics focus too much on the negatives while ignoring the positives. for example, while many deplore facial recognition technology as an invasion of privacy that can empower stalkers and other predators, Jarvis explains, “facial recognition technology also can be used to find lost children or people on Alzheimer’s alert or criminals or terrorists.” And despite the negative attitudes toward big data uncovered by the Allstate/National Journal survey, some poll respondents saw value in the technology. Nearly half said the privacy tradeoffs are a fair price for being able to connect with people around the world and access information about almost any subject within seconds. more than two-thirds said the collection and analysis of information about them would likely lead them to receive more information about interesting products and services and better warnings about health risks. Nearly two in five said big data could enable government and business officials to make better decisions about expanding businesses, improving the economy, providing better services and increasing public safety. 11 Scientists in Boston, for example, are using probabilistic predictions to try to prevent suicide. funded by the federal government’s Defense Advanced Research Projects Agency, the scientists are monitoring social media and text postings by volunteers who are active-duty military personnel or veterans. The scientists’ computers watch for keywords associated with suicide in an effort to create an automated system that will alert caregivers, relatives or friends when suicide-linked expressions are observed. 12 The financial Industry Regulatory Authority — a self-regulating body for the securities industry — has turned to big data to catch up with the rapid technological changes occurring in financial markets. In August 2012, the agency employed software that scans trading activity for patterns that indicate suspicious practices. Results led the agency to launch 280 investigations by July 2013. 13 Is big data speeding the erosion of privacy? Security technologist Bruce Schneier, who has declared that “the Internet is a surveillance state,” is doubtful about protecting privacy in the era of big data. “If the director of the CIA can’t maintain his privacy on the Internet,” Schneier said, “we’ve got no hope.” 14 Schneier, a fellow at Harvard Law School’s Berkman Center for Internet and Society, was referring to David Petraeus, who stepped down as director of the spy agency last November as his extramarital affair with former military intelligence officer Paula Broadwell was becoming public. The couple — presumably experts in covert actions — had taken steps to conceal their relationship. To avoid blazing email trails, they left messages to each other in the draft folder of a shared Gmail account. And when Broadwell sent threatening emails to a woman she thought was a rival for Petraeus’ attention, she used a fake identity and accessed the Internet from hotel networks rather than her home. But big data tripped them up. 15 Analyzing email metadata — addresses and information about the computers and networks used by the senders (but not message content) — the fBI traced Broadwell’s threatening messages to several hotels. from hotel records, they found one guest who had stayed at those hotels on the dates the emails were sent: Broadwell. 16 Combining Internet data with offline data occurs constantly across the globe, www.cqresearcher.com as companies build dossiers on their customers to offer personalized products and services and to target advertising or sell the information to others. “This is ubiquitous surveillance,” Schneier said. “All of us [are] being watched, all the time, and that data [are] being stored forever. . . . It’s efficient beyond the wildest dreams of George Orwell,” whose novel 1984 introduced the world to the all-seeing “Big Brother.” 17 Internet users voluntarily post photos of themselves and their friends on social media. Surveillance cameras take photos and videos of people in public and private places. Police departments store photos taken by cameras mounted on patrol cars and on stationary objects. Governments store photos made for driver’s licenses and other identification documents. Some police cruisers are equipped with devices that enable remote searches of photo databases. many of those images are stored indefinitely and can now be searched with facial-recognition technology across multiple databases. Phone companies store call records, and mobile phone companies store records of where phones were used. Analysis of those records can reveal where a phone was at any time, down to a specific floor in a specific building. 18 Big-data companies say they protect the identities of individuals behind the data. But scientists say even “anonymized” phone records — those with users’ names removed — can reveal identities. many phone numbers are listed in public directories. Researchers at the massachusetts Institute of Technology (mIT) and Belgium’s Université Catholique de Louvain discovered that they could identify anonymized cell phone users 95 percent of the time if they knew just four instances of when and where a phone was used. 19 Companies’ privacy policies also can be meaningless if they accidentally release information or if their business partners don’t honor the policies. for example, due to a computer bug, facebook allowed unauthorized people to access the phone numbers and email addresses of 6 million users and nonusers between mid-2012 and mid-2013. The social network admitted that it had been secretly compiling data about users from sources beyond facebook and had been gathering information about nonusers as well. 20 In 2010, the network had admitted that many third-party applications available through facebook were collecting data on users and that the apps’ makers were passing the information on to advertisers and tracking companies, contrary to facebook’s stated policy. Some also were collecting and distributing information about the appusers’ friends. 21 Such revelations have left many Americans worried about their privacy. In the Allstate/National Journal poll, 90 percent of Americans said they have less privacy than previous generations, and 93 percent expect succeeding generations to have even less. 22 An 11nation survey by Ovum, a London-based business and technology consulting firm, found that two-thirds of respondents would like to prevent others from tracking their online activities. 23 “Everything we do now might be leaving a digital trail, so privacy is clearly on the way out,” says David Pritchard, a physics professor at mIT who studies teaching effectiveness by mining data gathered during massive open online courses (mOOCs), which mIT and other universities offer for free over the Internet. 24 By recording and analyzing students’ keystrokes, Pritchard can see what page of an online textbook they viewed, for how long and what they did before and after that. He can also see who participated in the course’s online forum. Comparing such study habits with performance on tests will enable him to “figure out what tools students use to get problems right or wrong,” he says. But he is quick to note that Oct. 25, 2013 915 BIG DATA AND PRIvACY Health Care Providers, Employers Most Trusted to Protect Data Consumers said they trusted doctors, hospitals and employers the most to handle individuals’ personal data responsibly, according to a poll taken in late May and early June. Political parties, the media and social media websites were trusted the least. The poll was conducted just before Edward Snowden’s revelations that the National Security Agency has been spying on private citizens. How much do you trust these groups or people to use information about you responsibly? Health care providers Employers Law enforcement Insurance companies Government Cell phone/Internet providers Political parties Media Social media sites A great deal/some Not much/ not at all 80% 79 71 63 48 48 37 29 25 20% 19 28 35 51 50 61 69 70 Note: Totals do not add to 100 because don’t know/refused to answer responses are not included. Source: “Allstate/National Journal/Heartland Monitor Poll XVII,” June 2013, www. theheartlandvoice.com/wp-content/uploads/2013/06/HeartlandTopline-Results.pdf he obtains students’ permission to monitor their keystrokes for the study. while many people value their personal privacy, he says, “we’re going to have to work a lot harder to maintain some aspects of it.” Others say concerns about big data speeding the loss of privacy are overblown. Patrick Hopkins, a philosopher who focuses on technology, advocates a pragmatic approach. “we need to get realistic about privacy in the information age. This notion of privacy being an inalienable right is recent,” says Hopkins, who chairs the millsaps College Philosophy Department in Jackson, miss., and is an affiliate scholar 916 CQ Researcher with the Institute for Ethics and Emerging Technologies, an international organization based in Hartford, Conn., that studies technology’s impact on society. “It’s not in the Constitution. It’s not in the french Declaration of Rights,” he says, referring to the “Declaration of the Rights of man and of the Citizen,” adopted by the french National Assembly in 1789. 25 “I’m only worried about privacy if there’s something that’s going to harm me.” “These days, I know if I drive down a street I will be monitored,” says Hopkins. “That does not bother me. There’s no harm to me, and I might benefit” if surveillance catches a criminal. Similarly, he’s not bothered by the government mining big data in search of terrorists. “Asking if you’re willing to give up your privacy for security is a false dilemma,” Hopkins says. “It’s not like you have 100 percent of one and zero percent of the other. I would be willing to give up a bit of privacy for security.” Citing surveys showing that young people are less worried about privacy than their elders, mike Zaneis, senior vice president for public policy at the Interactive Advertising Bureau, a New York-based trade association for the online advertising industry, says, “It’s not because they don’t care about privacy. It’s that they understand the value of the exchange, and they are willing to give up more information as long as they are receiving some benefit.” Andreas weigend — former chief scientist at Amazon.com who now directs Stanford University’s Social Dat

error: Not Allowed