Order shopping_cart

Summary and Comparison of Articles

Summary of the Articles

Solove, D. J. (2008, September). The End of privacy? Scientific American, 101-106.

In this article, the author covers the concept of social-networking in relation to privacy. He discusses how a majority of young people rely on the Internet to socialize with their peers who are mostly strangers. In addition, he highlights how the social networks are both useful and sometimes a nightmare. The author explains this as a result of lack of privacy control in that anyone can upload anything on the Internet as well as use other people’s personal information without really caring how this will affect the given person. In the article, Solove gives relevant examples such as that of the Star Wars Kid as well as those of Facebook’s News Feeds, Socio Ads, and Beacons.

The author also covers the strategies that can be used to protect privacy, owing to the fact that very little can be done in the U.S given the less stringent privacy laws available. He also discussed the available privacy protection laws which include Appropriation Tortthat protects against use of somebody’s name or likeliness for financial benefits; Breach of Cofidentiality Tort, whichdefends from disclosure of private information shared in privileged relationships, such as with a doctor, a lawyer, a clergy among others, and Privacy in public, which dictates that in the U.S, a person looses all the privacy rights when information becomes public. The author elaborates on how these laws are insufficient in privacy protection as well as how they can be improved.


Murphy, E. (2013, March). The government wants your DNA. Scientific American, 72-77.

In this article, the author focuses on the issue of the collection and use of DNA in relation to privacy. The articles elaborates on how the collection of DNA from suspects and crime scenes has since changed, covering not only serious murder and sex crimes, but also less serious felonies and misdemeanors. The author highlights both the advantages and disadvantages of the DNA use. To begin with, she uses the example of the long hunted serial killer who was referred to as Grim Sleeper, beingarrested after his son’s DNA was found to be a partial match to that obtained in the crime scenes. This example is used to highlight how the use of DNA can be useful in solving cases. However, the author also covers other examples that prove the contrary whereby suspects are forced to give their DNA for analysis and they end up innocent after their reputation is ruined.

Murphy covers strategies in which the government should regulate the use of the DNA databases without violating the privacy of people. She suggests that suspects who are not yet convicted should not have their DNA taken. The author also recommends that retesting of old samples should only be done with prior notice and legal permission to avoid infringing into other people’s privacy. In addition, she gives a detailed account of how things are done differently in the U.K. and how helpful this would be if embraced by the U.S. government.

Lanier, J. (2013, November). How should we think about privacy? Making Sense of one of the thorniest issues of the digital age. Scientific American, 65-71.

In this article, the author focuses on how privacy should be viewed as opposed to how people currently see it. He begins by defining ths notion in relation to people’s way of life as well as the choices they make. The author also argues that privacy is not yet dead, but the future greatly depends on the decisions that people make now. In addition, he discusses why people should avoid speaking of privacy in terms of trade-offs. He supports this idea by pointing out how people are lured into giving up their privacy with a promise of things such as better security, only for them to find out that the promised benefits are always exaggerated. He points out the possibility of people being manipulated using the information that they provide about themselves. The author also covers ways in which the privacy of people can be protected by analyzing in detail how new rules and regulations can be articulated and enforced as well as ways of seeking universal transparency.

A comparison of the articles

The choice of article prspectives highly depends on factors such as the target audience as well as the message the author wants to convey to others. However, the point of view chosen, greatly affects the way in which the ideas flow in the article. This, on the other hand, inflence how the audience reacts to informationas well as how they view the author of the piece. For instance, choosing the most appropriate point of view will ensure that the audience finds the work interesting thereby deeming the author as very competent in his sphere.

Daniel J. Solove (2008) embraces the third person point of view throughout his article The End of Privacy? This approach enables him to include relevant examples of how young people use the Internet and social media to share their most intimate details. In addition, it  helps the audience to understand  the piece well as the ideas flow steadily without shifting the mind of the reader from one point of view to another. This makes the author look well organized and competent in the eyes of the readers.

Erin Murphy (2013), on the other hand, uses the first  second, and the third person approach. In the tittle The Government Wants your DNA, she apply the second person to help capture the reader’s attention by showing them that the information in the article concerns them. Then she shifts to the use of the third person in order to discuss in details why the government wants people’s DNA. In addition, she elaborates on how this can be both useful and at times risky. This shift enables the readers to follow the discussion as the content relates to genuine life situations happening to real people. In such way the author makes the information in the article not only interesting but also credible\.  She also includes the use of first person in a disclosure to indicate that she was giving firsthand data not hearsay. This move makes the article credible, especially because she is referring to a powerful security firm which would lead to the audience questioning the credibility of the information.

Jaron Lanier (2013) also uses more than one point of view. At first, he applies the first person in the title How Should we view privacy? This approach helps capture the attention of the audience as they feel that the information contained in the article concerns them. In addition, he uses the first person approach to incorporate his own experiences into the article. This helps the audience view the events through the eye and opinion of the author. In addition, it helps them  relate well with the content of the article. The author also uses third person to convey various arguments as well as to support them. This makes the information in the article look credible to the audience.

Discount applied successfully