User Tools

Site Tools


cost_of_technology

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
cost_of_technology [2015/04/29 01:04]
dfreeland02_mail.roosevelt.edu more edits for final revision
cost_of_technology [2015/04/29 14:51] (current)
dfreeland02_mail.roosevelt.edu Final revision before submission
Line 39: Line 39:
 ==== How technology affects personal freedoms of children in the family==== ==== How technology affects personal freedoms of children in the family====
  
-The digital era has presented our society with many interesting ​situations. ​The main aspect that technology has affected is the ability to communicate. We have always been able to communicate,​ yet technology allows society to communicate more fluildly ​in comparison to 10 or 20 years ago. This is true with the children of today, as the WashingPost states, "For most teens, the big increase in screen time is on their cellphones. More than three-quarters of all teens own cellphones, according to a 2011 study conducted by Pew Internet and American Life Project. This is an increase from the 45 percent of teens who owned cellphones in 2004, Pew said."​[(mylink6>​Public,​WashingtonPost,​http://​www.washingtonpost.com/​postlive/​teens-are-spending-more-time-consuming-media-on-mobile-devices/​2013/​03/​12/​309bb242-8689-11e2-98a3-b3db6b9ac586_story.html)] This is different from 10 years ago, not every child had access to a cellphone ​like they do today. The accessibility that children have would worry any parent. ​+The digital era has presented our society with many situations. ​One aspect that technology has affected is the ability to communicate. We have always been able to communicate,​ yet technology allows society to communicate more fluidly ​in comparison to 10 or 20 years ago. This is true with the children of today, as the WashingPost states, "For most teens, the big increase in screen time is on their cellphones. More than three-quarters of all teens own cellphones, according to a 2011 study conducted by Pew Internet and American Life Project. This is an increase from the 45 percent of teens who owned cellphones in 2004, Pew said."​[(mylink6>​Public,​WashingtonPost,​http://​www.washingtonpost.com/​postlive/​teens-are-spending-more-time-consuming-media-on-mobile-devices/​2013/​03/​12/​309bb242-8689-11e2-98a3-b3db6b9ac586_story.html)] This is different from 10 years ago, not every child had access to a cellphone ​in the way they do today. The accessibility that children have today would worry any parent. ​
  
-Parents are genuinely concerned about what their children ​are doing with technology ​in general. The evolution of technology has made it very easy to communicate with people from all around the world. This can present problems for worried parents given the stories of children meeting strangers through internet chat-rooms. Not only the concern of strangers, but how many social networking sites children use on a daily basis. This begs the question, ​Should ​these children have some kind of freedom to do as they will on the internet? Although, this may seem like a trivial question, but it is a question worth investigating,​ and furthermore;​ it is worth investigating how technology can potentially restrict a children'​s freedom in the family, even with the given autonomy the internet can give anyone+Parents are genuinely concerned about what their children ​do with technology. The evolution of technology has made it very easy to communicate with people from all around the world. This can present problems for worried parents given the stories of children meeting strangers through internet chat-rooms. Not only the concern of strangers, but the amount of social networking sites children use daily. This begs the question, ​should ​these children have some kind of freedom to do as they will on the internet? Although, this question ​may seem provocative since these are children, but it is a question worth investigating,​ and furthermore;​ it is worth investigating how technology can potentially restrict a children'​s freedom in the family, even with the autonomy the internet can give to whomever uses it
  
-If parents are worried about the activities their children are engaging ​in on the internet, how can they take precautions to monitor their children'​s activities? There are a multitude of applications provided in the application market stores, and given the variety of applications that exist, there are applications that assist parents with spying on their children. One application that can enable parents to spy on their children is MyMobileWatchDog. This application makes it easy for parent to impede on their child'​s privacy, a parent can monitor everything that their child does with this application. A parent can inquire who their child is texting, what websites their child visits the most, this application can even block other applications,​ or decide what notifications to block.[(mylink5>​Public,​MyMobileWatchDog,​https://​www.mymobilewatchdog.com/​)] An application such as this one, may be a surprise for people whom are new to technology, yet there are hundreds ​of other applications that try to accomplish similar goals, such as SecuraFone. This application allows ​for parents to track how fast their children are speeding in a car. This application easily allows the parent to monitor their child'​s speed since a parent does not want their insurance company to increase their monthly payment if child is pulled over for wreckless or careless driving. Additionally,​ this application also tracks the geographical locations that a child has travelled, and it alerts you when that child travels outside of geographical locations that have been marked.[(mylink8>​Public,​parents,​http://​www.parents.com/​parenting/​technology/​best-apps-for-paranoid-parents/#​page=13)] Lastly, another application that can restrict and monitor technology usage is BitMeter 2. This application monitors how many Gigabytes someone uploads or downloads, it also gives you the ability to block certain internet addresses, and if someone uses too much data, the application will restrict that person'​s internet use.[(mylink7>​Public,​hongkiat,​https://​www.mymobilewatchdog.com/​)]+If parents are worried about these activities their children are engaging ​with on the internet, how can they take precautions to monitor their children'​s activities? There are a multitude of applications provided in the application market stores, and given the variety of applications that exist, there are applications that assist parents with spying on their children. One application that can enable parents to spy on their children is MyMobileWatchDog. This application makes it easy for parent to impede on their child'​s privacy, a parent can monitor everything that their child does with this application. A parent can inquire who their child is texting, what websites their child visits the most, this application can even block other applications,​ or decide what notifications to block.[(mylink5>​Public,​MyMobileWatchDog,​https://​www.mymobilewatchdog.com/​)] An application such as this one, may be a surprise for people whom are new to technology, yet there are many of other applications that try to accomplish similar goals, such as SecuraFone. This application allows parents to track how fast their children are speeding in a car. This application easily allows the parent to monitor their child'​s speed, especially if a parent does not want their insurance company to increase their monthly payment if their child was speeding. Additionally,​ this application also tracks the geographical locations that a child has traveled, and it alerts you when that child travels outside of geographical locations that have been marked.[(mylink8>​Public,​parents,​http://​www.parents.com/​parenting/​technology/​best-apps-for-paranoid-parents/#​page=13)] Lastly, another application that can restrict and monitor technology usage is BitMeter 2. This application monitors how many Gigabytes someone uploads or downloads, it also gives you the ability to block certain internet addresses, and if someone uses too much data, the application will restrict that person'​s internet use.[(mylink7>​Public,​hongkiat,​https://​www.mymobilewatchdog.com/​)]
  
-These applications show potential to restrict the personal freedoms of child, although there must be consideration for the age of the child. One discussion that must be had is the idea of a child having some type of personal freedom. Is it okay for a child to have personal freedom ​within the family ​with all of the potential dangers of the internet? There are no directions or guides written to help parents decide when their child should be given more freedom, or even if the parent feels their child should have freedom. The discussion here is how the internet does promote some kind of autonomy, yet its perceived ​autonomy can also aid to the restrictive uses of technology.+These applications show potential to restrict the personal freedoms of any child, although there must be consideration for the age of the child. One discussion that must be had is the idea of a child having some type of privacy. Is it okay for a child to have privacy ​within the family ​given the potential dangers of the internet? There are no directions or guides written to help parents decide when their child should be given more privacy. The discussion here is how the internet does promote some kind of autonomy, yet its autonomy can also aid to the restrictive uses of technology.
  
  
 ====Does Technology impede on the freedom of adults also?==== ====Does Technology impede on the freedom of adults also?====
  
-While the way children use technology may be a concern, the way in which adults use technology can also be concerning. Adults do not have to worry about someone imposing on their freedoms like the adult-child relationship,​ or do they? Being an adult, a person may think that they should be free to choose what they would like to do. This may be the case, yet at the same time, if one is in a relationship,​ technology can affect the dynamic of a relationship if one person does not trust the other. If technology gives a partner reasonable doubt that their partner is being adulterous, there are several ways to investigate ​further into this manner without a private investigator. The first application that a person could use is called MSpy. One must preload this application into a phone and give it to their partner, or whomever they want to spy on, or they can download the application onto the designated device. This application allows a person to conduct a full search through ​your partner's phone. If you are curious whom they are talking to late at night, or who they text the most throughout the week, MSpy can assist you with your investigation. It can track the activity of other applications on the designated device undetected.[(mylink9>​Public,​dailydot,​http://​www.dailydot.com/​technology/​love-surveillance-spying-apps/​)]+While the way children use technology may be a concern, the way in which adults use technology can also be concerning. Adults do not have to worry about someone imposing on their freedoms like the adult-child relationship,​ or do they? Being an adult, a person may think that they should be free to choose what they would like to do. This may be the case, yet at the same time, if one is in a relationship,​ technology can affect the dynamic of a relationship if one person does not trust the other. If technology gives a partner reasonable doubt that their partner is being adulterous, there are several ways to further ​investigate ​into this manner without ​services such as a private investigator. The first application that a person could use is called MSpy. One must preload this application into a phone and give it to their partner, or whomever they want to spy on, or they can download the application onto the designated ​device while that person is not monitoring their device. This application allows a person to conduct a full search through ​a person's phone. If you are curious whom they are talking to late at night, or who they text the most throughout the week, MSpy can assist you with your investigation. It can track the activity of other applications on the designated device undetected.[(mylink9>​Public,​dailydot,​http://​www.dailydot.com/​technology/​love-surveillance-spying-apps/​)]
  
-With this given situation, the freedom ​of one person is being invaded by technology. The way of how technology has helped us communicate has changed, it allows people to communicate ​more easier compared to 15 years ago, yet there are missteps to technology in regards to our freedom of privacy being invaded by others. MSpay is one of many other applications that help spy on your significant other, and if MSpy does not infiltrate ​someone'​s privacy enough, there is an application that aids tracking a person step-by-step. This application is called Find My Kids--Footprints. Once this application has been implanted into the designated device, it has a real-time tracker of where that person is traveling. It also keeps track of the data for a few days.[(mylink9>​Public,​dailydot,​http://​www.dailydot.com/​technology/​love-surveillance-spying-apps/​)]+With this given situation, the privacy ​of one person is being invaded by technology. The way in which technology has helped us communicate has changed, it allows people to communicate easier compared to 15 years ago, yet there are missteps to technology in regards to our freedom of privacy being invaded by others. MSpay is one of many other applications that help spy on your significant other, and if MSpy does not infiltrate someone'​s privacy enough, there is an application that aids tracking a person step-by-step. This application is called Find My Kids--Footprints. Once this application has been implanted into the designated device, it has a real-time tracker of where that person is traveling. It also keeps track of the data for a few days.[(mylink9>​Public,​dailydot,​http://​www.dailydot.com/​technology/​love-surveillance-spying-apps/​)]
  
  
 ====Do companies take your privacy into consideration?​==== ====Do companies take your privacy into consideration?​====
  
-Families today, are kept in constant contact ​with all of the technological devices they have. Depending on what company'​s product you buy, you could potentially be protected from someone infringing on your privacy. Unfortunately,​ it is difficult to know if your privacy rights are preserved since you must agree to a long list of terms before you accept the company'​s service. One would wish that a company would think about the consumer'​s rights, Cindy NG of Varonis.com offers different ideas to consider. First, she raises a question about companies ​selling ​or sharing ​your information to third parties. This information was initially yours before you agreed to set of terms, and now the question is if the information continues to be yours even though companies do sell your information. Specifically she states, "many fitness trackers’ privacy policies are vague and ever-changing,​ with platitudes that begin with “We respect your privacy” and end with “We may share your information with third parties…” Unless you live in a state that treats this data as PHI, or Protected Health Information,​ expect that they can legally share your sensitive medical data without your permission, because HIPAA’s extensive privacy regulations."​[(mylink11>​Public,​Varonis,​http://​blog.varonis.com/​5-privacy-concerns-about-wearable-technology/​)] ​+Families today, are kept in constant contact ​by all of the technological devices they have. Depending on what company'​s product you buy, you could potentially be protected from someone infringing on your privacy. Unfortunately,​ it is difficult to know if your privacy rights are preserved since you must agree to a long list of terms before you accept the company'​s service. One would wish that a company would think about the consumer'​s rights, Cindy NG of Varonis.com offers different ideas to consider. First, she raises a question about companies ​whom sell or share your information to third parties. This information was initially yours before you agreed to the set of terms, and now the question is if the information continues to be yours even though companies do sell your information. Specificallyshe states, "many fitness trackers’ privacy policies are vague and ever-changing,​ with platitudes that begin with “We respect your privacy” and end with “We may share your information with third parties…” Unless you live in a state that treats this data as PHI, or Protected Health Information,​ expect that they can legally share your sensitive medical data without your permission, because HIPAA’s extensive privacy regulations."​[(mylink11>​Public,​Varonis,​http://​blog.varonis.com/​5-privacy-concerns-about-wearable-technology/​)] ​
  
-Another idea she mentions is that, "HIPAA can't help"​[(mylink11>​Public,​Varonis,​http://​blog.varonis.com/​5-privacy-concerns-about-wearable-technology/​)]in regards to information that is generated by worn devices that monitor your heartbeat and body temperature. She further states that unless your information is formally given to a doctor or some kind of formal institution,​ your information cannot be considered or protected under HIPAA law. This specific situation does not grant ease for people ​who are concerned about what companies do with their data that is collected by these worn devices. This situation presents another question, does this technology impose on the person'​s right to privacy since their bodily measurements are not protected under HIPAA? Or another question could be asked, is this technology helping monitor the health of our society to find a better way to treat certain diseases? ​+Another idea she mentions is that, "HIPAA can't help"​[(mylink11>​Public,​Varonis,​http://​blog.varonis.com/​5-privacy-concerns-about-wearable-technology/​)]in regards to information that is generated by worn devices that monitor your heartbeat and body temperature. She further states that unless your information is formally given to a doctor or some kind of formal institution,​ your information cannot be considered or protected under HIPAA law. This specific situation does not grant ease for people ​whom are concerned about what companies do with their data that is collected by these worn devices. This situation presents another question, does this technology impose on the person'​s right to privacy since their bodily measurements are not protected under HIPAA? Or another question could be asked, is this technology helping monitor the health of our society to find a better way to treat certain diseases? ​
  
 ==== Technology impedes on personal privacy...but what is privacy?​==== ==== Technology impedes on personal privacy...but what is privacy?​====
  
-The tone of this manner is not to shame the person whom is invading the privacy of others with technology, yet it is to show how technology can help violate the privacy of others. It is difficult to determine if a person does have the freedom to install these applications on designated devices, given the new territory ​that arises ​with technology. There are laws that are still being made for the boundaries in which cannot be violated by using technology. In regards to the aforementioned situation with adults, a person has the right to do what they want with their body even if that is cheating on their partner or talking to people via technology. ​Essentially,​ technology ​is invading the privacy of the people whom wish to engage in these activities as they would like. The question that must be discussed is when people are engaging in these activities, does that warrant people to invade the other person'​s privacy? ​+The tone of this manner is not to shame the person whom is invading the privacy of others with technology, yet it is to show how technology can help violate the privacy of others. It is difficult to determine if a person does have the freedom to install these applications on designated devices ​since there are new obstacles ​that arise with technology.There are laws that are being made to define ​the boundaries ​of the law in regards to technology.In regards to the aforementioned situation with adults, a person has the right to do what they want with their body even if that is cheating on their partner or talking to people via technology. ​Technology ​is invading the privacy of the people whom wish to engage in these activities as they would like. The question that must be discussed is when people are engaging in these activities, does that warrant people to invade the other person'​s privacy? ​
  
-The general problem with this issue, is how privacy is defined. Privacy is a very vague term that is used in many debates, Michael McFarland from Santa Clara University defines it as, ""​Privacy has many meanings. The most general is freedom from interference or intrusion, the right "to be let alone,"​ a formulation cited by Louis Brandeis and Samuel Warren in their groundbreaking 1890 paper on privacy. 1 This recognizes that each person has a sphere of existence and activity that properly belongs to that individual alone, where he or she should be free of constraint, coercion, and even uninvited observation. As we would say today, each of us needs our own "​space.""​[(mylink10>​Public,​SCU,​http://​www.scu.edu/​ethics/​practicing/​focusareas/​technology/​internet/​privacy/​what-is-privacy.html)] Using McFarlands context, one must look at where these acts are being committed ​in which people are invading the privacy of a person. Are these acts taking place in the public space, ​yet that person is still demanding that they want to have the right to privacy. ​If a person has a sort of existence that is special to them, and it can be let alone by other people, can it be let alone in public? ​If these acts are occurring in public can they be considered for the right to privacy of a person? These are questions that need to be discussed, these discussions will help determine if a person is allowed to have their right to privacy violated due to their geographical location.+The general problem with this issue, is how privacy is defined. Privacy is a very vague term that is used in many debates, Michael McFarland from Santa Clara University defines it as, ""​Privacy has many meanings. The most general is freedom from interference or intrusion, the right "to be let alone,"​ a formulation cited by Louis Brandeis and Samuel Warren in their groundbreaking 1890 paper on privacy. 1 This recognizes that each person has a sphere of existence and activity that properly belongs to that individual alone, where he or she should be free of constraint, coercion, and even uninvited observation. As we would say today, each of us needs our own "​space.""​[(mylink10>​Public,​SCU,​http://​www.scu.edu/​ethics/​practicing/​focusareas/​technology/​internet/​privacy/​what-is-privacy.html)] Using McFarlands context, one must look at where these acts are being committed ​given that people are invading the privacy of a person. ​Does the context of these situations depend if another person can invade another person'​s right to privacy?  ​Are these acts taking place in the public space, ​but that person is still demanding that they want to have the right to privacy. If these acts are occurring in public can they be considered for the right to privacy of a person? These are questions that need to be discussed, these discussions will help determine if a person is allowed to have their right to privacy violated due to their geographical location.
cost_of_technology.txt · Last modified: 2015/04/29 14:51 by dfreeland02_mail.roosevelt.edu