You should have “illuminating lenses through which to view the People’s Republic of China”. I did not understand what this meant at first, but now I understand and I love the quote. Wasserstrom is right that people have a very skewed view of China that are based of stereotypes and others popular opinions. People don’t think that the United States is anything like that China, but this is not completely true the 2 countries are the same in many ways. I thought he made an interesting point that people like to compare the 2 countries in terms of human rights and everyone talks about how bad China is. But, both countries have human rights struggles amongst the lower classes and they are the only 2 big countries left that still have the death penalty. Because the death penalty is such an inhumane punishment I think it is a good start to showing how these 2 countries are more alike then people make it seem.
Keping Yu – “The People’s Republic of China Sixty Years of Political Development”
Time is a funny thing, because time is relative. Sixty years in terms of a human life is a long time, it is over half of our life. But when you are thinking about history sixty years is nothing. Although Sixty years seems like a long time from the beginning of the Culture Revolution with Mao to the end of the reform period with Deng, it is not in the grand scheme of things. China in that 60 year period changed from a revolutionary party to a ruling party. Within this time period there are six major changes that took place: revolution to reform , struggle to harmony, dictatorship to democracy, rule of man to rule of law and decentralized, and state to society. You cannot point any of these topics as extremely more important then the other topics, because they almost all inter link in someway.
I think the element that is craziest to investigate is the revolution to reform aspect. The fact that Mao tried to carry out a forever lasting revolution is interesting in itself because here you are with a leader that wants armed struggle and violence permanently. It puzzles me that he could think that China could be stable and last while constantly in a state of revolution. Yes, the revolution had a lot of short term positive effects like : increased standard of living, boosted economy, literacy rates improved and the international status was enhanced. But during a revolution rule of man takes over and defies all rule of law. I don’t understand how people could live under those violent conditions. I would think that the “natural disaster” of millions of Chinese starving to death would have made it evident that things need to change, but that was not the case. China in those 60 years was just complete chaos and its hard to believe the country came out of that chaos in any way.
Frank Pieke – Introduction: Knowing China
This introductory chapter shed light to how complex the politics, economy, and government are in China. It starts off by shedding light on the conflict that occurred in Tian’anmen Square and that movement. Then discusses how China can no longer be labeled socialist or capitalist because it has aspects of both. China is a cauldron of a socialist government, market economy, globalization, modernization and traditional culture. People do not see China for all that it is because they have a prejudices or a believed false insight. This book evaluates China in a China-centric approach, so it should be as close to accurate that you can encounter. This book aims to describe the changing politics in China, society, economy and nation globalization through the prism of the neo-socialist experiment and experience, asking questions which start from Chinese realities.
This chapter did not clear anything up, but just made me more confused. It shed light on the complexity and how biased we Americans feel towards China. I will be interested to read more about the different topics in detail. Hopefully, I will become a lot less confused at the end of the book.
Felix Wemhauer – Dealing with the Responsibility for the Great Leap Famine in the People’s Republic of China
This article does not point fingers, but looks at who is responsible for this event. Depending on who you ask will change the response. The official records are different then the unofficial record or people’s own personal records of the event. It also is not written in many Chinese history books. It is the rulers responsibility to nourish his people so he does take responsibility for the event publicly, but not in actuality. He used his local cadre as scapegoats for the event, most of the blame was placed on them and they were the ones punished and sent to jail. Many of them faced charges such as violating party policy and crime against the masses. I think that one could argue that although the cadre were the forceful hand they are also the victims in this case. Local cadre had steel quotas and orders they had to meet so they were not concerned with the conditions of the villages. If they did not meet their quotas they would face consequences as well. Intellectuals who were able to escape the villages understand their ignorance in just blindly following Mao and the Communist party. Peasants were essentially powerless they just executed the orders of the party. They were tortured and beaten and a hunger would be used as a means to control them.
The famine that was caused by the Great Leap is believed to be 70% man made and 30% due to nature. I think a good way of proving this to be true is that the death rates were significantly different in different parts of the country and not all leadership and villages were run the same. the quality of the cadre might have greatly affected the village after all. In Bo many villagers die from starvation, but in the neighboring village where there was a drought that village was able to support themselves. Then you have Villages like Henan and Xinyang where over 2 million peasants died in each village and the death rate was higher then the national death rate. It is in villages like these that I question could this really be a “mistake”. No one has taken responsibility for what occurred in Henan, but many local cadre were punished for Xinyang.
In the cases of many famines, cannibalism took place. Villagers would steal grain and food. There was a black market for food essentially. Villagers would be tortured, punished, and maybe killed for committing this crimes, but they did whatever they had to do to survive and so they all see themselves as active victims. Problem one of the things that makes me question the governments “mistake” in all of this is they then built mass graves to try and cover up the extent of the famine. Why try and hide something that is evident and if it is if no fault of yours then it doesn’t seem like it should be a secret. My last comment on this subject is why was is so dangerous to speak of the famine during that time. With all of the people already dying killing those that acknowledge the fact people are dying seems unnecessary.
Roderick Marfarquhar – The Once and Future Tragedy of the Cultural Revolution
I do not understand the point of not acknowledging history. I understand when terrible things happen people just want to forget about it, but it seems so obvious that people need to talk about it to spread awareness. It is also crazy to me that Xi Jinping is leading China towards another Cultural Revolution and it does not appear that China is very aware of this change taking place. Xi Jinping fits all the ingredients you need to have a cultural revolution and although the motive of Mao is different then the motive of Xi it appears that it will have the same outcome, which is millions of people’s lives that are affected. I wonder whether the Chinese people will realize and do something if it turns into something that mocks Mao’s Cultural Revolution.
Andrew G Walder – “China Under Mao”
It’s interesting that Mao studied Soviet Books and Stalinism as a model for how he was going to rule. My question for Mao would be when everything he tried to do backfired and he was constantly running into new problems did he ever think he should not be so stubborn, but try something else? My question for those that followed Mao blindly would be why did you worship him like a God when he led you in the wrong direction so many times? I could never imagine living under a government where we are essentially praying to the president and worshipping everything he says or does. It seems like it is essentially brainwashing a whole population.
It is puzzling that Mao could find bad in a stable country that is developing economically, that is secure, and that is working to improve the standard of living. These are all things that most countries strive for and that China is striving for now for the most part. The second he passed away is when things started to become more relaxed and market economy started to form. It is fascinating how impactful the leadership of the country is on its economy.
James Fallows “China’s Great Leap Backward.” The Atlantic
After reading this article it would appear to me that China is going bad. I know that this question is very loaded, but it seems that after studying china for 5-10 years and watching it become more repressive then it was that it would be safe to assume they are moving in the wrong direction. This article made me aware of how little I know about China and keep up with the news in the country. I was not aware the China had the “Great Firewall”. A lot of our rights such as Freedom of the speech and freedom of the religion clearly do not exist. I could not imagine what America’s news would look like if the government placed such strict controls on the media and news. I feel that if the government tried to regulate religion as tightly as it is in China right now it would face a lot of protests and lash back.
The anti-foreignism policy seems to come from an extremely paranoid place. Maybe I am just not aware of how many foreign spies are in China, but it seems excessive to assume every nice foreigner or professor might be a spy. The program implemented in Public Schools to make children be able to identify spies even in the ranks seems like it could create paranoid children with possible prejudices. I understand that since China’s market capitalization dropped by $40 billion that probably scared the president and he wants to boost his economy, however not allowing his people to buy from the U.S. software companies and banning Apple products does not seem like a fix to the problem more just short term solution for someone that is scared to loose their economical power to another country.
I will be interested to see if U.S. changes its engagement with China in the next couple years. I believe that if China continues to get more oppressive and closer to it’s Maoist roots U.S. would have to alter its interaction. At the same time I wonder if China’s policy is self-destructing enough to not need to do anything about it. I know that cutting off ties would impact the entire world so that does not seem like the best solution, however I don’t see China compromising or meeting the U.S. in the middle.
President Xi Jinping’s 2017 New Year Address
President Xi Jinpig spoke of many things in his 2017 new year address. He said the 13th Five Year plan is coming along nicely. In 2016 they worked towards building a moderately prosperous society, being forefront runners of the world, making strides in their structural reform, making military breakthroughs, enhancing rule of law and judicial/social fairness, implementing a strict discipline of communist party of China, reforming citizenship process to make it easier, and increasing school conditions in poor neighborhoods.. Although they celebrated a lot of other successes in 2016 these are the ones that stood out to me because he said that in 2017 they must work to continue to improve all of those same things. Xi’s deepest concern is getting those that still live in poor circumstances in better living arrangements. He believes that the answer to this problem is finding the people in these families employment, increasing the education for the children, and creating better housing situations. I know that I know very little about Politics in China and the China government, but his desire to try and solve the poverty and social gap goes against what I thought about the class and hierarchical situation. I thought that it was similar to U.S. mentality and that there is not such an emphasis placed on the social and poverty gap line.
Research Essay
Reflection Tag: My research essay is about privacy in the technology era. It is a definitional research paper and I spend a majority of the paper trying to show the different types of things that all fall under the category of privacy. Ultimately in my paper my opinion is that we need to protect our privacy a lot closer and there needs to be a clear definition made of what is privacy.
Download Link: ERH102-06WhatisPrivacy?
Olivia-Aman Cotton
ERH-102-06
Mrs. Smith
Help Received: The Writing Center
What is Privacy?
Imagine a restroom in a building that has no walls and no doors. It then just becomes a corner in a room with toilets, completely exposed. The advancement of technology is a big, exposed bathroom when it comes to privacy. Everyone wants privacy, however, without doors, walls and already provided protection no one knows how to get privacy. At the same time if you have to go to the bathroom you have to use the toilet and leave yourself unprotected. Most people use social media and technology that they are aware leave them unprotected, but they make the conscious decision to sacrifice their privacy. On the other hand, there are a lot of privacy concerns that take place behind the scenes that many people do not understand. In order to understand what privacy people are entitled to, there needs to be a broader understanding of what privacy is and what falls under the category of privacy. Privacy needs to be protected because it is a right granted in the amendments to the constitution and information that falls into the wrong hands can be dangerous.
Currently, the laws and regulations do not correspond to the advancement in technology. Many reforms are in the process of being voted on, however, legislation is having trouble defining privacy and what rights to privacy need to be protected. A commonly accepted definition of privacy was created by Justice Brandeis in the Olmstead v. United States case, who states that “‘ Privacy is the right to be left alone – the most comprehensive of rights most valued by free people” (Cady 9). In the Harvard Law Review Brandeis further defines privacy as the “’right to enjoy life – the right to be let alone; the right to liberty [that] secures the exercise of extensive civil privileges: [where] the term ‘property’ has grown to comprise every possession –intangible, as well as tangible‘” (Cady 9). Although this definition was written in 1928 and 1890 it still can be applied to todays society. It is a very general definition, but can apply to everything digital, you should be able to use the device without feeling that your rights are being infringed on and without feeling you are not being left alone. When it comes to the Internet and technology people should have the right to use their technology without having to fear that they are being tracked, spied on, or their data/metadata is being used to compromise their privacy.
Among different age groups there have been differences found in attitudes relating to privacy. A study was done in The Netherlands by Tilburg University that found that “adolescents are less concerned about their privacy than young adults and adults. However, all three age categories reported that privacy was a lesser concern than both freedom and security” (Steijn 299). There is no exact science that can determine why these age groups have different feelings, but as you get older you have more valuable information. In the adolescent age using social media and technology seems harmless. As someone gets older and acquires credit cards, a social security number, and more personal information is being asked for in order to have full access to websites you realize that this information could be used in extremely harmful ways. Part of this is just experience, someone might have experience being hacked online, identity theft, or someone trying to steal their credit information. Witnessing or involvement in these events is going to make someone more cautious and they will begin to understand reliable websites from risk factors. In an interview done with another cadet Jameson Donahue, he states that, “there is no real privacy when it comes to technology. There is always a way for someone to figure who is posting what, so you should always be careful what you are posting” (Donahue). This is an example of a young adult accepting that there is very little privacy when it comes to technology, at the same time they are all still willing to use the technology but they just tell themselves to be careful. Donahue also, states that “[he] believes if someone is using a website where they believe it is private then it should be private. So companies should ensure their clients privacy as long as it does not endanger others” (Donahue). This is an interesting point that Donahue brings up, the difference between what privacy people are getting versus the reality. “In a study done with 60 online social networks (OSNs) it was found that many people acknowledge they are giving up some privacy and forty-five percent do not even take the time to read the privacy policy” (Kuzma 74). According to the study almost half of the users of OSN are not even aware of sites privacy policies. Users information could be shared with third parties or there could be very little policies protecting someone from harmful material, or exposure. Users of the internet and technology need to be aware of how important it is to read the privacy and policy agreements to know how much they are sacrificing by using the website or device.
As it relates to privacy versus security, I think many people do not realize what is the balance between the two. As technology advances so does the ability to keep tabs on people. After the 9/11 attack, the United States passed the Patriot Act, which increased security in the United States and made it legal for the government to do wiretaps, searches business records, and get access to phone record information without a court order if they believed the person was deemed to be a threat. Eventually, President Obama expanded the Patriot Act to include metadata under section 215 of the Patriot Act. Metadata for those that do not know is, “data about data. It is descriptive information about a particular data set, object, or resource, including how it is formatted, and when and by whom it was collected” (What is metadata?). According to the Harvard Law Review “Congress intended there to be a broad standard in section 215”, but at the same time it also “[acknowledges] that the metadata program is more expansive than existing precedent has permitted“ (National Security 1874). Many people believe that metadata is harmless, but in the hands of the right person it is extremely dangerous. Metadata can track what websites you visit, what you are buying, where you are location wise. Although the government can use this to closely track people and eliminate threats, it can also be used to interfere with people’s lives. Cookies is an example of metadata that affects everyone. “Cookies is a data collecting mechanism that is constantly tracking the number of times someone visits a website, what websites they are visiting, noting any patterns, and recording what they are buying. This information then can be sent to third parties where they can gain access of your information and it can be used for targeted advertisement or the information could just be shared” (Kuzma 76). Targeted advertisements seem harmless, but if someone knows how they could develop software that is tracking credit cards or social security numbers and this runs into a much bigger issue. Recently there was a breech in the IRS. A cyber attack occurred where many people’s information was obtained. The IRS, who has stronger protection than these OSNs, is not immune so OSN’s with weak privacy policies are definitely not immune.
People are free to say whatever they want on social media and use technology as they please. That is one of the benefits of social media and technology. It is often an outlet for people to be creative, express their feelings, have fun, or communicate. The only catch us it cannot be harmful, or hurt to anyone else. There are some steps towards protection of privacy that have been taken. A very interesting aspect of privacy mentioned by Richards in Compulsory Process in Cyberspace: Rethinking Privacy in the Social Networking Age is that people’s privacy in terms of the first amendment and freedom of speech needs to be protected. The article gave two examples that stood out. The first was someone had posted a twitter post that the police considered a direct threat towards them when they subpoena twitter, twitter reviewed the tweet and then denied the police the twitter account because they believed it went against their privacy policy and the tweet was not a direct threat towards the government, police, or anyone, but an act of free speech. The second situation was the case with Zimmerman and Trayvon Martin. They tried to use his twitter account to prove that he was capable of putting the officer in harms way based on previous actions or words. Trayvon Martin who no longer could defend himself in court or explain himself was going to be defamed by the government based off of his social media profile. By many this was considered a violation of his privacy, even after death. And there actually laws that protect people’s privacy after death.
An aspect of privacy that many people neglect to think about it is the self right to privacy. In order to prevent self-inflicted harm the unwritten rule on OSN is: do not post anything that you would not want your mom to see. “Many people are not aware of the digital footprint we leave and once something is posted online it can never truly be erased. Once it is posted a user loses a large portion of control of what happens to it. The posting is then shared with not just your friends, but your friend’s followers as well” (YÜKSEL 768). Someone can screenshot the posting and send it to whomever they like. In extreme cases someone will steal someone’s pictures and identity to catfish someone else, which is identity theft and a huge invasion of privacy. “People seeing information that you did not intend for them to see, because a user thought it was a private or secure conversation, or website can potentially ruin someone’s reputation” (YÜKSEL 768). Depending on the degree that someone’s reputation is harmed and if it was self-inflicted or the results of cyber bullying, harassment, or weak privacy policies it can be considered defamation of character and the matter could be taken to court. “Unless it is a case of self-exposure anytime that someone else posts an unauthorized picture, video, or word posting about you that is harmful is considered a violation of privacy and can be evaluated legally” (Greenberg 696). However, in most cases it is not taken to court or legal matters because, “people follow an unspoken code of managing privacy. If you don’t want to be associated with something you can un-tag yourself, remove a post from your page, un-follow, or block someone. And there are settings as a user that can be set that can limit who can see posts and if one’s profile is public or private” (Greenberg 694). It is important to use proper digital etiquette when using the Internet in order to keep social media and online friendly and keep everyone’s business as private as they want it to be kept. Also, because privacy is not guaranteed when it comes to anything posted online or done with technology it is important to be cautious with everything that is done.
With the job market so tight, it allows for employers to be extremely selective with whom they employ and social media is starting to play a key factor in their decisions. As an employee, you are a reflection of your company and so it is fair that they would want to see what there employees are doing and that they are an asset to their company versus harming their image. However, when employees have privacy settings that do not allow their employers too see everything employers are digging deeper. They are requesting username and passwords, friend requesting, or finding another way to view more information. Because this is a new issue, there are no laws or regulations against it: however, it raises a giant red flag of protecting employee’s right to privacy (Baumhart). To many this is a very clear invasion of privacy, however, the companies can get away with because of the pressure of finding a job. This places a lot of pressure on employees because they are being forced to give up their right to privacy, if they want a job. Although someone’s online profile is not a direct reflection of their ability to do a job, employers should only have access to what anyone in the public has access to.
Privacy is a very complicated topic, especially when discussing social networks and technologies. Part of the reason why it is so difficult is because there is not clear definition of what privacy is in relation to digital technologies and OSNs. Very simply put though privacy should allow you to live your life without fear and without being bothered. Because privacy is not the top concern, but safety and freedom that probably contributes to why there are no laws and regulations set in stone about privacy. Just to reiterate as technology advances so does the need for privacy. Currently there are few laws that protect privacy, but more that grant the government a way to invade privacy. The Patriot Act and the addition of metadata to section 215 is a huge matter of legislation that needs to be revised. Metadata if in the wrong hands can be extremely dangerous and harmful. Other aspects of privacy also include the right to freedom of speech and a networks responsibility to protect that, the right to privacy after death, the right to privacy from harmful and hurtful material, and the right to the privacy of your username and password. These are all different aspects of privacy that help to outline the need for more laws and regulations and a clear definition of privacy.
Works Cited
Baumhart, Peter B. “Social Media and the Job Market: How to Reconcile Applicant Privacy with Employer Needs.” University of Michigan Journal of Law Reform 48.2 (2015): 503-33. Academic Search Complete. Web. 28 Feb. 2016.
Cady, Glee H, and Pat McGregor. Protect Your Digital Privacy!: Survival Skills for the Information Age. Indianapolis, Ind.: Que, 2002. Internet resource.
Donahue, Jameson. Personal Interview. 10 April 2016.
Greenberg, Joshua M. “The Privacy-proof Plaintiff: But First, Let Me Share Your #selfie.” Journal of Law & Policy 23.2 (2015): 689-740. Academic Search Complete. Web. 28 Feb. 2016.
Kuzma, Joanne. “Empirical Study of Privacy Issues among Social Networking Sites.” Journal of International Commercial Law & Technology 6.2 (2011): 74-85. Academic Search Complete. Web. 28 Feb. 2016.
“National Security — Telephony Metadata Collection — White Paper Argues Metadata Collection Is Legal under the Usa Patriot Act.” Harvard Law Review 127.6 (2014): 1871-878. Academic Search Complete. Web. 12 Apr. 2016.
Richards, Robert D. “Compulsory Process in Cyberspace: Rethinking Privacy in the Social Networking Age.” Harvard Journal of Law & Public Policy 36.2 (2013): 519-48. Academic Search Complete. Web. 29 Feb. 2016.
Steijn, Wouter M. P., and Anton Vedder. “Privacy Concerns, Dead or Misunderstood? The Perceptions of Privacy amongst the Young and Old.” Information Polity: The International Journal of Government & Democracy in the Information Age 20.4 (2015): 299-311. Academic Search Complete. Web. 12 Apr. 2016.
“What Is Metadata?” Indiana University: Knowledge Base. 24 Aug. 2014. Web. 10 Apr. 2016.
YÜKSEL, Mehmet Erkan, Asİm Sinan YÜKSEL, and Abdül Halim ZAİM. “A Reputation-based Privacy Management System for Social Networking Sites.” Turkish Journal of Electrical Engineering & Computer Sciences 21.3 (2013): 766-84. Academic Search Complete. Web. 28 Feb. 2016.
Exploratory Essay
Reflection Tag: The Exploratory essay was very similar to the Annotated Bibliography. It was a very personal essay that you reflected on the sources, why you chose them, how they changed your thinking towards your topic, and if it made you want to explore any topics further. This essay was another step towards setting us up for our research essay’s.
Download Link: ExploritoryEssayRevision
Olivia-Aman Cotton
ERH-102-06
Mrs. Smith
Help Received: None
Exploratory Essay: Privacy
Do you ever feel like you are being watched? I would tell someone who does they are paranoid, but they just might be on to something. With technology advancing, so is the ability to spy on people, or invade people’s privacy. Being college students, I am sure that most of us have laptops and probably most have laptops with cameras already built in. How would it make you feel if I said the government has the knowledge to hack into your operating system and turn on your camera and watch you, without your knowledge? It seems like an invasion of privacy to me, but some people do not see it that way. I planned on writing my exploratory essay on why we need more laws protecting people’s privacy, but as I started doing more research it occurred to me that it would be difficult for laws to be made about privacy when no one has defined what privacy is in the digital age. The question I am exploring in this essay is, what is privacy?
My first source is by Joanne Kuzma and is titled “Empirical Study of Privacy Issues among Social Networking Sites”. I started with this source because I think it talks about two of the most important issues of privacy: the fact that no one pays attention to privacy policies and how our privacy is always being invaded without people’s knowledge. This source is a study that was done with 60 online social networks (OSNs). The results of this study found that many people know they are giving up some privacy and forty-five percent do not even take the time to read the policy. Different Social Networks offer different types of privacy, but people don’t take advantage of this privacy was also mentioned. Something very important that was discussed was metadata collection. It referred specifically to cookies, which is a software that is tracking the number of times someone visits a website, what websites they are visiting, noting any patterns, and recording what they are buying. This information can then be sent to third parties and it can be used for targeted advertisement, or if it falls in the wrong hands can lead to things like credit card theft and identity theft. This source was extremely enlightening to how many people do not even pay attention to privacy policies. If people aren’t concerned about their own privacy, how can anyone expect the government to be worried about making changes to protect people’s privacy? I think that I need to look more into the metadata issue and cookies to really understand it. It seems like a very scary concept that someone is literally tracking our every move even if it is just little things, such as how many times I check my E-mail a day.
My second source is by Mehmet Erkan YUKSEL, Asim Sinan YUKSEL, and Abdul Halim ZAIM. The article is titled “A Reputation-based Privacy Management System for Social Networking Sites. I picked this source because it discusses the digital footprint we leave anytime something enters the Internet and people loosing control over something once they post it. The source discusses how once you post something online it can never truly be deleted. Also, once you post you lose a lot of control over what happens to it, people will share your posts with their friends, people might screenshot it, and in the most extreme cases it could be used for identity theft. In many cases people’s reputations are hurt when they post or say something online that they expect to be private and it ends up being publicized. I agree with everything in this source. It makes me realize two things: because you can never erase something put on the Internet it is important to be cautious with everything that is posted. Also, I think it is a huge invasion of privacy if you send someone a private message and they end up publicizing it, or someone in an authoritative position gets control of it. Something I might want to look into is what are the laws and regulations when it comes to government figures acquiring people’s online material. Also, what are the cyber bullying policies when it comes to privacy.
My third source is by Robert Richards and is titled “Compulsory Process in Cyberspace: Rethinking Privacy in the Social Networking Age”. I picked this article because it brings the constitution into the picture. This article mentions privacy in terms of the first amendment and freedom of speech and how it needs to be protected. It discusses how people are free to say whatever they want as long as it is not harmful to anyone. The government also, is not the deterrent of what is a threat, or harmful and social networks need to protect users privacy in that way. Two important examples this article gives is Twitter denying the police the right to access one of its users profile because they believe they guy was threatening the police, when he was just exercising his right to freedom of speech. The second example was regarding the Trayvon Martin and Zimmerman case and brought to light the huge concern for privacy even after death and how that should be respected. I am really glad that Twitter denied the Police the right to look through the person’s profile. I think it is a good example of privacy being protected, however, I know this is often not the case. I think I might want to look into cases where the government harassed someone via social media to prove why this form of privacy is so important.
My fourth source is by Joshua Greenberg and is titled, “The privacy-proof Plaintiff: But First, Let Me Share Your #selfie”. I picked this article because it discusses how you can sacrifice your own right to privacy. This article discusses self-exposure and anytime you post something of yourself that is harmful, or used against you, you sacrificed your right to privacy when posting it. However, if someone else post something unauthorized picture, video, or word posting and it is harmful this is an invasion of privacy and can be a legal matter. In many cases, people just follow an unspoken code of privacy and just un-tag themselves from something or remove a post from their page if they do not want it there. I would have to disagree that there is really a code. People post things without permission on the daily, and some sights it is not that easy to un-tag or remove something that you didn’t post, because it almost there right to have it on their page. I think self-exposure is an interesting concept I never thought that anytime I post something I am sacrificing my right to privacy. I think that for my research essay I could explore the idea of self-exposure and privacy more because this is a very different aspect of maintaining one’s privacy.
My fifth source is Peter Baumhart and is titled, “ Social Media and the Job Market: How to reconcile Applicant Privacy with Employer Needs”. I picked this article because it present a new privacy issues that has not even been legally discussed yet. This article discusses how the job market is so tight that employers can be picky. Now employers are using social media as a deciding factor for their employees and requesting usernames and passwords from their potential and current employees. Because there are no laws against it, companies are allowed to do this, however, everyone is aware it raises a big red flag for invasion of privacy. I think this is insane. I do not think that I would want to work for a boss that was requesting such info, so I would not give it to my employer. I am hoping that this issue is evaluated right away, because it is a huge invasion of privacy and everyone should have the right to security of his or her own username and password information. I could investigate this case further, or I could look at more issues that have been brought to surface with the advancement of technology for my research paper.
Currently, I am thinking that I don’t know nearly enough about privacy. I feel like it is hard to take a stance on the issue because it is so complex. There are many different forms of privacy so I am not sure that one definition of privacy will ever suffice. I think that there might need to be multiple definitions for different solutions. Originally, I wanted to find a solution to the privacy problem, but it is far more complex then I thought and I don’t think that I am going to be able to come up with a solution. I think I am going to have to do more research about privacy before I can really come up with a thesis for my research paper. I do know for a fact that I believe we need more acts toward preserving privacy.
Works Cited
Baumhart, Peter B. “Social Media and the Job Market: How to Reconcile Applicant Privacy with Employer Needs.” University of Michigan Journal of Law Reform 48.2 (2015): 503-33. Academic Search Complete. Web. 28 Feb. 2016.
Greenberg, Joshua M. “The Privacy-proof Plaintiff: But First, Let Me Share Your #selfie.” Journal of Law & Policy 23.2 (2015): 689-740. Academic Search Complete. Web. 28 Feb. 2016.
Kuzma, Joanne. “Empirical Study of Privacy Issues among Social Networking Sites.” Journal of International Commercial Law & Technology 6.2 (2011): 74-85. Academic Search Complete. Web. 28 Feb. 2016.
Richards, Robert D. “Compulsory Process in Cyberspace: Rethinking Privacy in the Social Networking Age.” Harvard Journal of Law & Public Policy 36.2 (2013): 519-48. Academic Search Complete. Web. 29 Feb. 2016.
YÜKSEL, Mehmet Erkan, Asİm Sinan YÜKSEL, and Abdül Halim ZAİM. “A Reputation-based Privacy Management System for Social Networking Sites.” Turkish Journal of Electrical Engineering & Computer Sciences 21.3 (2013): 766-84. Academic Search Complete. Web. 28 Feb. 2016.