Vous êtes sur la page 1sur 4

Privacy Invasion

By Arianne Rose

Remember when life was simple? When everything was manual and computer
technology still in its infancy. Cell phones, computers, and other electronics could
only preform basic functions. They were merely prototypes as compared to what we
have now. Because, at the time, they were new technology no one had any idea
what to expect concerning the risk to their privacy. From cybercriminals to Digital
Restrictions Management (DRM) the internet is no longer a safe place to post and
download, for someone is always watching.
In this research paper I will include all my findings concerning the issue of online
privacy. Below in Figures 1 (HERLEY) and Figure 2 (Schmitz)shows the two articles
Ive selected that best support the risks of online privacy. I used Database Business
Source Premier for it seemed to have the most information regarding the topic. Also
because it gave many examples of DRM such as SOPA, PIPA, ACTA and other forms
of legislation in support for DRM. DRM is a way to control the product (i.e. iTunes,
MP3) the consumer purchased online and dictates what and how you can legally use
it. For these I used the following keywords; cybercrime, SOPA, PIPA, and DRM.

Figure 1: Cyber Crime

Privacy Invasion
By Arianne Rose

Figure 2: DRM and SOPA

The first Ill be discussing is an article I found using the keywords identity theft.
One articles entitled Five Steps to Secure Your Data After I.R.S. Breach. I thought it
interesting for two reasons; the length hackers can go to steal identities online, and
how you can prevent it. Even though its giving you steps to protect yourself, Nicole
Perlroth writes in the first paragraph advice security experts have for those trying
to keep their personal information safe, it is simply: You cant. (Perlroth) But you
can take steps to thwart the criminals in action. Your information is permanently on
the internet, so theres no way to stop people from taking that little bit of
information and open accounts and credit lines in your name. But keeping a close
eye on your credit score and continuously changing your passwords can help deter
them among other ways.
The next article I discovered on Google (another I used was Yahoo) is called Their
Crime: Playing iTunes on Devices Not Named iPod. I found it by using the keywords
DRM, Personal Privacy, and Piracy. As I mentioned earlier in the in the second
paragraph DRM is a program they place in most devices that most label Defective
by Design (referenced from the videos and text in the section Digital Literacy on
MindTap). This allows the company such as iTunes to monitor what you do with the
songs you purchase. In this article it discusses how one French man, Jrme
Martinez, protested the right to listen or watch any form of media on any desired
device. He and two other protestors were taken back to the police station and had
their offenses documented. It stated in the article that for the crime of uploading a
iTunes song onto a non-Apple device, He faces fines up to $52,000, and six months
in prison. (Crampton) Even though Mr. Martinez came out and admitted his crime
2

Privacy Invasion
By Arianne Rose

many other common civilians have been caught and fined, some serving prison
time. But this is just an example of the extent Corporations have gone to protect
their intellectual property rights even if that means the public suffers accidental
imprisonment.
To elaborate on the second internet article I will evaluate its source using TRAAP.
The article was written back in October of 2006 and doesnt mention when the last
time it was updated, but I thought it was a perfect example of what I was
explaining. It is relevant by showing an extreme example of not only can
cybercriminals dip their hand into your privacy, but also corporations looking to
protect their property rights. One of the reasons I choose this article was because it
was from The New York Times. I trust them as media, but I also looked into the
author credentials. The Authors name is Thomas Crampton and is an award winning
journalist. Hes travelled the world and covered many stories such as the 2004
presidential elections and the outbreak of SARS in Hong Kong. Hes earned degrees
in the different countries including here in the USA. He is also a digital and social
media specialist and can speak French, Thai, and Mandarin Chinese which he uses
to give lectures world over. As for accuracy I believe his credentials prove him to be
reliable especially since he can speak French being as that the event took place in
France. But I check to see in other sites how reliable the New York Times can be and
I found very few incidents of fraudulence. And Mr. Crampton has a clean record and
everything reported thus far has been legitimate. As far as purpose it seems to be
unbiased reporting. He states the fact without offering opinion.
In both the first database article and first internet article I found no hindrance of any
sort in trying to locate one. But if I had to nitpick Id say the internet article was
easier to locate only on the grounds that I was still learning how to work my way
around CCBC Librarys Database site. I also had a hard time with the Database
because in order to enter the article I had to set up an account which would
continuously kick me off if I took too long. Now the Database article was more
recent in Timeliness. It was September of 2014 while the internet article was of
October 2006. But I dont see that really affecting the accuracy of the iTunes article
considering it was documented at that time from first person account. As for the
authority of both authors I see they both seem well educated and well-seasoned
authors. Cramton is a specialist in digital and social media and Herley is a Microsoft
researcher specializing in the areas of Signal Processing, Security, Security
Economics, and Authentication as stated on scholar.google.com.

Works Cited
Crampton, Thomas. "http://www.nytimes.com/2006/10/09/technology/09steal.html."
9 October 2006. http://www.nytimes.com/.
HERLEY, CORMAC. ""Security, Cybercrime, And Scale."." Communications Of The
ACM 57.9 (2014) (5 June 2015): 64-71. Business Source Premier.
Perlroth, Nicole. "http://www.nytimes.com/2015/05/28/technology/irs-breachdemonstrates-the-need-to-make-hacking-harder.html." 27 May 2015.
http://www.nytimes.com/.
3

Privacy Invasion
By Arianne Rose

Schmitz, Sandra. " "The US SOPA And PIPA A European Perspective."."


International Review Of Law, Computers & Technology (2015): 213-229.

(In Works Cited I used MLA format)

Vous aimerez peut-être aussi