research paper regarding privacy.
The future of Privacy
For your semester research project, you will be discussing privacy: what is it or what was it? Does it exist
anymore? Did we give it up by mutual consent for things like security? What does Ã¢â‚¬Å“privacyÃ¢â‚¬Â mean to people in
this world of social media, and what does that have to do with what privacy meant to people in the past?
ThereÃ¢â‚¬â„¢s a lot to think about here, but then, your paperÃ¢â‚¬â„¢s going to be a 10-page paper with at least 10 supporting
1. Read Jacob MorganÃ¢â‚¬â„¢s Ã¢â‚¬Å“Privacy Is Completely And Utterly Dead, And We Killed ItÃ¢â‚¬Â in Forbes
magazine and read Evan Selinger and Woodrow HartzogÃ¢â‚¬â„¢s article Ã¢â‚¬Å“Stop Saying Privacy Is DeadÃ¢â‚¬Â from
the Medium web site
These articles will be the core of your paper.
Ã¢â€”Â Your essay should contain a summary of each article within it.
Ã¢â€“Â DonÃ¢â‚¬â„¢t just start your paper with summaries: your paper should start with your ideas.
Formulate your own understanding of
What Ã¢â‚¬Å“privacyÃ¢â‚¬Â means
How that wordÃ¢â‚¬â„¢s meaning has changed
What you think it will be like in the future
What you think it should be like in the future.
1. Write an 8-12 page essay explaining your point (your Ã¢â‚¬Å“thesis,Ã¢â‚¬Â your Ã¢â‚¬Å“debatable claimÃ¢â‚¬Â).
Research Paper requirements:
Your research paper must be between 8 and 12 pages, using the type size and margins of
the MLA standard
You must cite at least 10 sources in your final essay
As always in your college career, you cannot cite general knowledge sources like encyclopedias. This
includes Wikipedia or all Ã¢â‚¬Å“wikiÃ¢â‚¬Â web pages. Part of your grade includes the quality of the sources you
You have to cite your sources using textnotes and format them properly, and you have to have the Works Cited page formatted
correctly, but there is more to this paper than has been required before:
This paper must be formatted in full MLA style
This means that page layouts must be done in the MLA style, which you can find explained on
pages 1-6 of the MLA Handbook
Ã¢â€”Â follow the standards given by the MLA for
Ã¢â€”Â margins (if you cannot get your computer to do one-inch margins, get technical help: it is
still your responsibility)
Ã¢â€”Â page numbering in their right place on the page
Ã¢â€”Â The layout of the first page has to be MLA style, but you do not have to provide a
separate title page, which the MLA considers optional.
For the introduction, I would start off with explaining the purpose of the essay which is
the concern of privacy. I would simply start off with a hook to get my readers attention and then
give a brief definition of what privacy means. Then give more information and add my thesis,
and all while the last sentence ties with the next paragraph.
Body Paragraph 1
My first body paragraph would be describing how privacy was like in the past. I would
break it into three sub paragraphs to describe different aspects of the past. Adding evidence
throughout this section.
Ã¢â€”Â First subparagraph would be describing the definition before and what it was
Ã¢â€”Â Second subparagraph would be describing how it was regarding technology since
it was not a big part of it today. Other places like workplaces and in the streets
that would have privacy.
Ã¢â€”Â Third subparagraph would be describing the sudden transitional change from past
to present privacy
Body Paragraph 2
My second body paragraph would be how privacy is now. There would be a transition
from the last sub paragraph, briefly. I would break it into three sub paragraphs to describe
different aspects of present privacy. Adding evidence throughout this section.
Ã¢â€”Â First subparagraph would be describing the definition of it now and what it is
Ã¢â€”Â Second subparagraph would be describing how it was regarding technology now
and the different changes. Other places like workplaces and in the streets that
would have privacy.
Ã¢â€”Â Third subparagraph would be describing the change in privacy from then till now.
(Break into two paragraphs if needed).
Body Paragraph 3
My third body paragraph would be how it would be in the future. I would give brief
evidence that explains the future in privacy. Adding evidence throughout this section.
Ã¢â€”Â First subparagraph would be describing the definition of what it will be like in the
future with upholding evidence.
Ã¢â€”Â Second subparagraph would be describing how it should be in the future, with
Ã¢â€”Â Third subparagraph would be describing the change in privacy from what I think
vs how it probably will be. Comparing the two, with evidence
Body Paragraph 4
My fourth paragraph would be on different ways security can change within the
environment. I will give different examples of the change and environments of the source of
privacy and security. Break it down throughout each section. Adding evidence throughout this
Body Paragraph 5
My fifth body paragraph would be on how we can change that and secure our privacy.
Adding evidence throughout this section.
Ã¢â€”Â First subparagraph would be describing how the internet or government is taking
our privacy away from us when someone might not know
Ã¢â€”Â Second subparagraph would be describing how one can make sure they are
preserving their privacy as much as they can.
Ã¢â€”Â Third subparagraph would be describing how we can add these two points to have
privacy be saved in the future if so.
Body Paragraph 6
Having a paragraph on trying to understand the side of having our privacy changed and
how it would benefit us. A counterargument to try to understand where the other side is coming
from but still on topic of the paper. Adding evidence throughout this section.
Wrapping up all the information that was given briefly and explaining what was said
throughout the paper. Saying the thesis in a different way to circle back and have the reader read
a very detailed, well written research paper.
Auxier, Brooke, et al. Ã¢â‚¬Å“Americans and Privacy: Concerned, Confused and Feeling Lack
of Control over Their Personal Information.Ã¢â‚¬Â Pew Research Center: Internet,
Science & Tech, Pew Research Center, 17 Aug. 2020,
Ã¢â€”Â Due to the information and statistics on how people feel about having their
privacy and security gradually taken away, this website is useful. When
considering privacy settings on websites, it also makes statements about what
information is being taken away and the number of people who consent to this.
This website contains most of the statistics I need for my paper on how
individuals feel about their privacy.
Ã¢â‚¬Å“Future Privacy.Ã¢â‚¬Â Technology and Privacy Future of Privacy,
Ã¢â€”Â This website seemed useful for outlining my ideas about how the future may
affect our right to privacy. It contains brief observations about the types of
technology that will affect privacy. I may use this information to strengthen my
viewpoint on future privacy and more clearly express my views.
Ã¢â‚¬Å“History of Privacy Timeline.Ã¢â‚¬Â Information and Technology Services Safe Computing,
Ã¢â€”Â When examining how privacy has changed throughout time, this website can be
useful. It provides a timeline of privacy’s evolution, which I may include in my
research to demonstrate its progression. It begins in 1789 and finishes in 2021,
which is useful for displaying the past.
Ã¢â‚¬Å“How Technology Is Killing Privacy .Ã¢â‚¬Â Grand Valley State University
ScholarWorks@GVSU, Apr. 2015,
Ã¢â€”Â This is a really extensive essay on how privacy is severely being threatened by the
advancement of technology. This essay makes points on what privacy is, who is
collecting our data and ultimately how it is utilized, as well as much more
information about what we should consider. This can be quite beneficial because
it adheres to numerous tips, including how to protect ourselves during these
Madden, Mary, and Lee Rainie. Ã¢â‚¬Å“Americans’ Attitudes about Privacy, Security and
Surveillance.Ã¢â‚¬Â Pew Research Center: Internet, Science & Tech, Pew Research
Center, 17 Aug. 2020,
Ã¢â€”Â This article also provides information about public opinion on privacy. It provides
more information on what people let technology do with their privacy when they
give it up. It contains more information that I may use to strengthen my essay. It
has numerous sections on the perspectives of how people feel and the kinds of
questions that are asked.
McCreary, Lew. Ã¢â‚¬Å“What Was Privacy?Ã¢â‚¬Â Harvard Business Review, 1 Aug. 2014,
Ã¢â€”Â This webpage serves as a simple informational resource by providing a definition
of privacy. Due to the prior significant transformation, it also refers to what it was
rather than what it is now. It provides fundamental information to address the
initial query, “What is privacy?”
Mineo, Liz. Ã¢â‚¬Å“When It Comes to Internet Privacy, Be Very Afraid, Analyst Suggests.Ã¢â‚¬Â
Harvard Gazette, Harvard Gazette, 21 Mar. 2019,
Ã¢â€”Â To have a better understanding of what goes into technology privacy, this website
is interviewing with a cyber security specialist. The interviewer asks the expert a
series of questions on the many sorts of privacy and how to protect yourself. In
order to restore privacy, it also asks the expert why and how this breach might be
avoided. It can be used in my paper to get a different viewpoint from a
Ã¢â‚¬Å“PRIVACY IN THE WORKPLACE.Ã¢â‚¬Â Harvard Cyber,
Ã¢â€”Â I want to discuss several situations in which privacy can be violated or maintained
in my essay. This article discusses workplace privacy and how it may be
impacted. The confidentiality of your customers’ or buyers’ information may be
utilized for other purposes, such as someone reading your emails as some
examples being used. I may strengthen my research by using specific examples.
Rainie, Lee, and Janna Anderson. Ã¢â‚¬Å“The Future of Privacy.Ã¢â‚¬Â Pew Research Center:
Internet, Science & Tech, Pew Research Center, 17 Aug. 2020,
Ã¢â€”Â Another piece that can be used to address the issue of privacy in the future is this
one. I can utilize the knowledge to create an opinion and imagine what future
privacy would be like. The informational example explains future technology
possibilities and technological surveillance. It also demonstrates how little some
people care about privacy and surveillance.
Temming, Maria. Ã¢â‚¬Å“Smartphones Put Your Privacy at Risk.Ã¢â‚¬Â Science News for Students, 3
Ã¢â€”Â The simplest approach to violate privacy through phones might be another
specific example I would use in my paper. Your privacy can be readily
compromised by someone’s smartphone. This article details specific ways that
using a phone can impair one’s security
van den Hoven, Jeroen, et al. Ã¢â‚¬Å“Privacy and Information Technology.Ã¢â‚¬Â Stanford
Encyclopedia of Philosophy, Stanford University, 30 Oct. 2019,
Ã¢â€”Â This article describes the amount of electronic information that the government
can control and the number of people who have provided their personal
information to websites. The fusion of modern technology and security may
compromise people’s privacy. In my essay, I would discuss the issue of the loss of
The Library of Congress, 7 Feb. 2020, https://www.loc.gov/legal/privacy-policy/.
Ã¢â€”Â This website is exemplifying the specific details that websites gather, like cookies
and web beacons. This explains why and how the internet gathers information of
this nature. A research report must be read from both sides in order to be
effective. Using this article to shed light on the benefits of gathering your
Purchase answer to see full