English 1A : Essay 2 (Rhetorical Analysis) Assignment Sheet

English 1A : Essay 2 (Rhetorical Analysis) Assignment Sheet

Select ONE of the following articles from the Chapter 26, “Has the Internet Destroyed Privacy?” for your rhetorical analysis:

“How Privacy Became a Commodity for the Rich and Powerful,” p. 724 < I choose this ONE

THIS IS THE LINK OF THE ARTICLE AND WE DID ESSAY ABOUT IT

Prompt: Analyze how well the components of the argument in the article you select work together to persuade or move an audience. Focus on elements that stand out or make the piece intriguing or problematic.  English 1A : Essay 2 (Rhetorical Analysis) Assignment Sheet.Try to show how the key devices in an argument actually make it succeed or fail. Let readers know where and why an argument makes sense and where falls apart. If you believe that an argument startles, challenges, insults, or lulls audiences, explain why that is the case and provide evidence. Whether you agree or disagree with the argument itself does not matter. Pay attention only to how – and to how well – the argument works.

 

Requirements:

This IS THE FIRSt ESSAY ABOUT THE ARTICLE 

ORDER A PLAGIARISM-FREE PAPER NOW

 

How Privacy Become a Commodity for the Rich and Powerful.

Data privacy or privacy I information refers to a branch or a division of security that deals with or ensures that data is properly handled. It can also be described as the practice of keeping data collected from customers safe and used for the intended purpose. This includes the data that revolves regularly. Data privacy amongst organizations, companies, and institutions is highly regarded and protected. English 1A : Essay 2 (Rhetorical Analysis) Assignment Sheet. A company may be processing millions of information from their customers, which they safeguard with a lot of concern. This protects or maintains the company’s or organization’s reputation. Technological sophistication has resulted in the issue of data privacy. In some way, I agree with the article, “How privacy become a commodity of the rich and powerful”.

In different countries, different laws have been formulated to take care of the people’s or citizen’s privacy like in the U.S.A, but it has not been effectively implemented to protect the cyberspace users from the disaster of exposing their privacy to the public domain. The inability to deliver health data by companies is increasing rapidly causing a great threat to cyberspace users. Customer’s data are either hacked or accessed by powerful companies and stored in their data warehouse for their use mostly in business statistics. Simply this is to means that privacy is no longer available so long as the data-mining companies are in their operation.

Security and data privacy seems to be two different concepts, but they are related in one way or the other (Zhou et al. 56). Data securities are the procedures that are used in the processes of safeguarding sensitive data within the company from the access of malicious people or intruders. In the present world, it hard to find a company or an organization that has protected its data fully. The issue of data hacking which is growing rapidly on daily basis is revealing how the privacy of individuals and companies is becoming so hard to be maintained. For instance, a certain country installed a certain anti-virus software in governmental computers. Little did they know that the software was not exactly an anti-virus but a hacking software which used to send information of any single step taken in the government offices to the public domain.

Therefore, privacy is becoming just easy and affordable for the rich people as well the powerful in the world. Where their privacy once has been exposed to the public domain, they can pay money or bribe the expositors to keep their privacy in secrecy. With the increase of smartphones in the current decade, data mining is so easy for data mining companies. Many times as we use our smartphones we are never careful on the websites in the cyberspace that we visit. Finding information from the internet is the easiest thing that we can do but we ought to ask ourselves several questions concerning the state of our privacy. The powerful have now owned the privacy and therefore, this is giving them the ability to take control over the others hence evading their accountability. It is no longer a bargaining matter about the privacy that an ordinary person expects because it is simply little privacy (Zhou et al. 56).

Nevertheless, governmental figures, as well as business figures, are growing over indignant on the desire to be left independent. Non-disclosure agreements have forced companies and organizations to seek arbitration. Though this process seems to bring some light, the matter can’t be resolved most simple way. This is because the field of technology is growing from second to second.English 1A : Essay 2 (Rhetorical Analysis) Assignment Sheet.  One minute of growth or advancement in the technological arena can cause a very great impact in the world. It is so impossible to compare the law-making process with technological growth. It has been so difficult for these data mining-related issues to be curbed fully or explained and being covered fully in the law (Kerry et al. 87). As I mentioned before, the laws that have been formulated covers just a small percentage of the technological field. This why the data-mining companies are taking over by mining people’s data without minding our privacy. This proves how privacy is for the rich and the powerful.

However, only the big institutions and public figures can brag about their privacy. Many times this is achieved by paying lots of money to secure information privacy as well as any single transaction they do in cyberspace. Imagining about an ordinary man who owns some sensitive data. This means the data is not secure as long as he is not able to secure his privacy by paying for it. Though in some times, privacy was termed as the necessity in the cultivation of the life of a mind, in the present date this seems to be a mere dream which doesn’t have any fact of truth in it. In some past centuries, the governments would protect people’s privacy regardless of their social statuses (Hess et al. 34). The same institutions now have given room for some classification based on social life.

ORDER A PLAGIARISM-FREE PAPER NOW

For instance, in the eighteenth century, during the fourth amendment of the American constitution, that protected citizens from the physical search of their bodies and homes. Immediately after a duration of one hundred years, this is after the advancement of the technology, some men must have had the common sense of thinking about the same agenda of privacy. Discussion may be done severally, but bringing a permanent solution of equality privacy-wise may be so hard and impossible. Funny enough, our privacy is continuing to be under threat every day. The solution seems to be very far away from our sight. Our ignorance of information and keenness might have contributed to allowing the power to own privacy. It has been so hectic for us to go through the terms and conditions of certain applications on our mobile phones (Hess et al. 34).

Moreover, our individual choice has become meaningless. This is due to the growth of new automated data collecting applications and software have no opportunity to notify us; The data is collected without our consent. If we ignore cyberspace, our data will still be collected by the security cameras in the streets. Devices and sensors have been greatly applied almost in every place. The world is under the monitoring of technological devices. Our daily environment is full of monitoring devices and our privacy is being weakened by this technology (Kerry et al. 87). Despite the growth in data privacy, the government and the companies or institutions seem to still compromise about the consumer’s privacy.

In conclusion, the issue of data privacy is no longer a little issue. The governments and the data mining companies should be involved in serious talks concerning the user’s privacy. The users are making the data-mining companies rich. This is because small data that is used daily by companies is got from cyberspace users either without their consent. There needs to be an agreement so that the users may also benefit from the data mining. The data-mining companies should not be so mean to generate wealth from our data, and we the data providers remain to be as poor as we were. Even if the users won’t be paid well, they should be appreciated. English 1A : Essay 2 (Rhetorical Analysis) Assignment Sheet.

Work cited.

Zhou, Minqi, et al. “Security and privacy in cloud computing: A survey.” 2010 Sixth International Conference on Semantics, Knowledge and Grids. IEEE, 2010.

Kerry, Cameron F. “Why protecting privacy is a losing game today and how to change the game.” New York Times (2018).

Petters, J. “Data Privacy Guide: Definitions Explanations and Legislation: Varonis.” issuu (2020).

Hess, Amanda. “How privacy became a commodity for the rich and powerful.” (2017). English 1A : Essay 2 (Rhetorical Analysis) Assignment Sheet.