Course Hero Logo

Essentially we value privacy and it is important to

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 5 - 7 out of 11 pages.

see in the latter half of the essay how third-party cookies violate this component of deontology.Essentially, we value privacy and it is important to us not only because there are many thingswe wish to keep to ourselves or particular others, but an invasion of privacy leads to treatingan individual as non-autonomous and as a mere means to an end.Let us turn to the consequences of not respecting one’s privacy in regards to third-partycookies. One advancement of computer technology is making “possible the accumulationand correlation of vast amounts of data on each individual.”14It would be useful here to9De George, 45.10De George, 43.11De George, 205.12De George, 50.13De George, 50.14De George, 40.63NALINI ELISA RAMLAKHAN
look at an argument presented by Jay Stanley and Barry Steinhardt in “Bigger Monster,Weaker Chains”. Although speaking about the problems of privacy in regards to data surveil-lance, posing a hypothetical Big Brother society similar to Orwell’s, Stanley and Steinhardt’sargument is useful and helpful when considering privacy in cyberspace. Stanley and Steinhardtbring attention to the consequences of living in a Big Brother society and how it would havean impact on each individual, and conclude that a constant surveillance on individuals is athreat to privacy, and that certain steps must be taken to ensure that data surveillance is inconformity with our value of privacy, or else we will end up being identified and profiledthrough this method of tracking.15By being constantly watched on video surveillance, citizenswill not have the right to privacy, and it will make citizens feel as if their right to privacy isnot being respected. According to Stanley and Steinhardt’s argument, although citizens willonly be taped and watched in the public sphere, many places in the public realm have a senseof privacy. Let me elucidate. While we cannot expect a full amount of privacy in the publicrealm, we can expect that we will not be constantly observed and watched. This is also aform of privacy because individuals expect not to be stalked or constantly observed by otherswho can gather their information while not having consent to do so. While many argue forthe implementation of constant data surveillance, Stanley and Steinhardt argue that “datasurveillance isthe collection of information about an identifiable individual, often frommultiple sources, that can be assembled into a portrait of that persons activities.16Thisis the role third-party cookies play in cyberspace. The impact of this is that it is much easierto accumulate information about an individual and identify an individual from the websitesthey visit and information they enter. It allows businesses to have more access to an individualthan an individual would actually allow. Without consent for this information, it is a directviolation of one’s privacy. The accumulation of information of an individual without consentalso violates an individual’s autonomy by not allowing an individual to make a rationalchoice of consent.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 11 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
Stern
Tags
1984, Richard T De George

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture