Controlling of Personal Information

Download .pdf, .docx, .epub, .txt
Did you like this example?

Controlling of personal information: An in-depth Analysis Summary of Assigned Article Lisa M. Austin in her article, Control Yourself, or at least your core self-defines privacy as a control mechanism over one’s personal information.[1] The author provided legal framework for the protection of one’s privacy. Such legal frameworks include: Federal personal Information protection and privacy act as well as Canadian internet policy and public interest clinic.

Don’t waste time! Our writers will create an original "Controlling of Personal Information" essay for you whith a 15% discount.

Create order

Furthermore, Austin differentiates between the first and second generation philosophers of technology through the idea of the “self”. According to first generation, technology is linked with culture and modernity and it is through these notion that the advancement in technology is so vast that it simultaneously can threaten an individual’s freedom.[2] However, second generation philosopher’s critique the first philosophers view on technology, critiquing the usage and development of technology[3] explaining that technology does not control human.[4]Moreover, second generation philosophers open up questions to legal scholars about the consequences of technology stating that “technology is not neutral rather it has a social and political value”.[5] Austin discusses the impact on the issues of control to the concept of the “self”.[6] The author goes further on to discuss how there are issues pertaining to ones control of privacy and the idea of the “core-self”.[7] The disclosure of personal information by an organization requires the individual to consent without limiting the disclosure of information that is “sensitive and intimate”.[8] She further conceptualizes the concept of the self in relation to ones “biographical core of information” that is personal information revealing “intimate details of an individual’s life style”[9] to the control of one’s personal information. She argues that the solution and the problem of control should be embedded in providing more control on how information and technologies interact. Austin explains the extent of protecting ones “self-presentation” that is choosing to whom one wants to present themselves to.[10] She discusses the example of a person’s photograph in a magazine, shifting from an audience that has access to the photograph to a much larger audience that reads the magazine. This causes, as Austin states a “prima facie privacy claim”[11] undermining ones capacity to protect “self-presentation”[12] posting a question for legal scholars of the concept of the “self” to advances in technology.[13] Part II: Comparative Analysis Article 1: Langdon Winner, “Do artifacts have politics” Winner as well as Austin speak about the implications of technological advancements on society. Winner argues that technology is arranged in a way that has political, social and economic ends.[14] Similarly, Austin argues that technology has a detrimental effect on an individual’s freedom where legal scholars need to re-evaluate how technologies are designed and implemented.[15] This rests on the assumption that, states should recognize the public and structural aspects of privacy in political and social context,

Do you want to see the Full Version?

View full version

Having doubts about how to write your paper correctly?

Our editors will help you fix any mistakes and get an A+!

Get started
Leave your email and we will send a sample to you.
Thank you!

We will send an essay sample to you in 2 Hours. If you need help faster you can always use our custom writing service.

Get help with my paper
Sorry, but copying text is forbidden on this website. You can leave an email and we will send it to you.