Big Brother, Big Business: Private Information Usage Report

Exclusively available on IvyPanda Available only on IvyPanda

Introduction

The given video depicts severe surveillance issues people are going through in the technology era. Nowadays, it is almost impossible to keep privacy in the community, as people use the Internet and visit places and are seen by outside and interior cameras. Surveillance helps catch terrorists and criminals, but if the information falls into the wrong hands, it can ruin lives (TalkRadios WorstNightmare, 2008a). The age of technological development reflects science fiction, for instance, George Orwell’s famous novel and Big Brother propaganda, where people were deprived of any freedom (TalkRadios WorstNightmare, 2008a). Examining which risks are connected to online surveillance and considering social or ethical problems is essential.

We will write a custom essay on your topic a custom Report on Big Brother, Big Business: Private Information Usage
808 writers online

Summary

The video narrated issues that could become dangerous for people who fell into surveillance violations. For instance, there are businesses related to collecting personal data. Several points mentioned in the video demonstrate the dangerousness of following people’s activities offline and online. For example, people’s devices could track Internet searches, and businesses could misuse them. Therefore, employees had significant problems while hiring for the job because of inappropriate information (TalkRadios WorstNightmare, 2008a). Indeed, the video mentioned the practical use of technology – for example, police could trace the drunk driver who killed three people (TalkRadios WorstNightmare, 2008a). Therefore, the offender was identified, and the speed of his car was higher than allowed. Technology can capture evidence of behavior and help police to investigate criminal cases.

However, the video addressed people who were surveilled as being vulnerable to the issue. For instance, the professor on privacy rights said that people had no rights in those processes because the information could be used for secret purposes (TalkRadios WorstNightmare, 2008a). The problem was that nobody could prove that one’s private data was violated. One more example was Global Positioning System (GPS) which often fell “from use to abuse” (TalkRadios WorstNightmare, 2008a, 00:07:36 – 00:07:38). In addition, even though the person could have no GPS on their phone, it was possible to identify their location. Rental cars mentioned in the video could track the driver’s way and report this data for various purposes. Therefore, the area of a person became apparent, and it could become an issue for a driver. Moreover, people’s devices such as mobile phones, computers, and cameras contain various confidential information, including location, IP address, and technical options (TalkRadios WorstNightmare, 2008b). Furthermore, compact discs had personal knowledge and serial numbers, and it became possible to identify the owner (TalkRadios WorstNightmare, 2008b). Therefore, people’s devices were not secure to keep private information.

Statements to Agree

It is essential to state whether to agree or disagree with the given points. I agree with the mentioned information and consider the personal information issue and its risks. The person never knows for what purpose criminals will use their private data. Moreover, it is feasible to agree with the dangers that inappropriate usage of confidential information can bring. Details on location, money transactions, and browser searches are connected to people’s vulnerability, and they cannot defend their human rights.

Indeed, I agree with the beneficial points of surveillance mentioned in the video. For instance, it becomes easy to identify criminals because of street cameras and surveillance within shops and other places. Moreover, rental cars contain a unique black box, which helps determine the speed and trace the driver’s location (TalkRadios WorstNightmare, 2008a). Police can quickly denote the individual, as particular databases contain criminals’ personal details, including address, phone number, and other aspects. In this case, private data surveillance is helpful for the safety of cities and towns.

Social Issues

Trackable and traceable devices can become beneficial, but it is vital to remember about problems they can bring. Moreover, it concerns social issues, as people might become exposed to danger. For instance, if someone is spied on or threatened by a lawbreaker, trackable devices can facilitate a fatal ending for an innocent victim. In addition, offenders can use private information to threaten and blackmail people into demanding money.

10 Interesting Points

Several points from this video are interesting to me; tracing browser history, monitoring money transactions, and analyzing phone calls. It was interesting to know that political leanings, religion, and medical concerns are tracked through mobile phones. Additively, it takes about five minutes to identify any person using a particular database (TalkRadios WorstNightmare, 2008b). Another issue involves monitoring a person in the street through outside and hidden cameras. Accordingly, the last two points are the ability to track any individual’s exact location and determine any person’s inclinations in places, food, and other aspects.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Conclusion

Overall, businesses collect personal knowledge about people for different purposes. As seen from the video, the purposes of usage data vary significantly. For instance, cars’ black boxes and GPS trackers become necessary to identify the offender when an accident happens. Therefore, it contributes to police investigation and facilitates safety within the community. However, many businesses might abuse personal data usage, and confidential information can flow into the wrong hands. Thus, the consequences of such a violation might be horrible – people can have problems while hiring for a job position. Moreover, social and ethical considerations are violated, as there are significant risks of criminal threats and blackmail.

References

TalkRadios WorstNightmare. (2008a). [Video]. YouTube.

TalkRadios WorstNightmare. (2008b). [Video]. YouTube.

Print
Need an custom research paper on Big Brother, Big Business: Private Information Usage written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2023, April 17). Big Brother, Big Business: Private Information Usage. https://ivypanda.com/essays/big-brother-big-business-private-information-usage/

Work Cited

"Big Brother, Big Business: Private Information Usage." IvyPanda, 17 Apr. 2023, ivypanda.com/essays/big-brother-big-business-private-information-usage/.

References

IvyPanda. (2023) 'Big Brother, Big Business: Private Information Usage'. 17 April.

References

IvyPanda. 2023. "Big Brother, Big Business: Private Information Usage." April 17, 2023. https://ivypanda.com/essays/big-brother-big-business-private-information-usage/.

1. IvyPanda. "Big Brother, Big Business: Private Information Usage." April 17, 2023. https://ivypanda.com/essays/big-brother-big-business-private-information-usage/.


Bibliography


IvyPanda. "Big Brother, Big Business: Private Information Usage." April 17, 2023. https://ivypanda.com/essays/big-brother-big-business-private-information-usage/.

Powered by CiteTotal, easy essay citation maker
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Updated:
Cite
Print
1 / 1