Literature comparison
This is the other article
The source is Xinhua News Agency April 25, 2011.
It also says comtexnews.com as the copy right. I included the full text below of that helps.
Full Text:SAN FRANCISCO, Apr 25, 2011 (Xinhua via COMTEX) — Apple Inc’s iPhone is collecting and storing user’s location data even when location services are turned off, the Wall Street Journal reported on Sunday after analyzing data and documents.
According to a test conducted by the newspaper, the location data appear to be collected using cellphone towers and Wi-Fi access points near a user’s phone and don’t appear to be transmitted back to Apple, said the report.
It noted that the new finding is likely to renew questions about how well users are informed about the data being gathered by their cellphones.
On Friday, the Wall Street Journal reported its security analysts had found that Apple’s iPhone and smartphones running Google’s Android operating system regularly transmit users’ locations back to the two companies respectively, which is part of their race to build databases capable of pinpointing people’s locations via smartphones.
Worries on the iPhone tracking issue surfaced on Wednesday after two British researchers announced at a technology conference in California that iPhone has been collecting users’ location information and storing the data for extended periods of time.
The researchers said starting on June 21, 2010, after the release of iOS 4 mobile operating system, iPhones began logging and storing location information in a file, which shows the users’ latitude and longitude and is timestamped to the second. They noted the information is not encrypted on the phone or on the iPhone backups made by iTunes and the file is also persistent, transferring itself to a new iOS device when the old one is replaced.
They added they had no evidence that the file was being transmitted to Apple.
On Thursday, U.S. congressman Edward Markey reacted angrily to the news in a letter to Apple CEO Steve Jobs, asking Jobs to make a response within 15 business days or no later than May 12.
On Saturday, Markey called for a congressional investigation into the privacy practices of Apple and Google. In a statement, he made clear that he thinks the data collection is potentially dangerous, saying predators could have hacked into an iPhone or Android to find out children’ s location information.
Below is the paper given to us in class. Basically we had to read an article called “Visible Man: Ethics in a World without Secrets” by Peter Singer. We have to read that and compare it to an article we found on the schools website. Below is the link to that article. Those are the two pieces of literature needed to write the paper.
Assignment:
Paper Three: Expanding the Conversation
[img alt=”page1image1496″ width=”63″ height=”1″ src=”https://mail.google.com/mail/u/0/?ui=2&ik=c8d7844b84&view=fimg&th=148e7afc05c72488&attid=0.1.1&disp=emb&attbid=ANGjdJ-w1nBntOTmqWXP90jOz3Dyp6HF4wJrCeC9TzGw2qYzJqUAtRYHbEzBAmWlmy0EAtLTLQzskuL6unX8WVeZVnBsxywrDELu2_NQck_Rh63JXaa8rYHTQ4R93Wc&sz=-w1600-h1000&ats=1412653461304&rm=148e7afc05c72488&zw&atsh=1” class=”CToWUd”>Details:
This paper represents the first step in research. You will be responsible for discovering some article or book chapter or other scholarly source that will help you expand or adjust your initial argument. The key will be to find some source that will give you the opportunity to shift your position in some way, to argue something slightly different than your position in the original paper. Nevertheless, you must still maintain your original sources in the argument: Fukuyama and/or Singer must remain as part of your argument in addition to the new source.
For example, if you argued about the ethics of biotechnology in Paper #1, perhaps you can find another source that also talks about biotechnologies in such a way that offers some new perspective you did not account for in the original paper. Likewise, if you argued about the ethics of privacy in Paper #2, find some source that offers a new perspective on the idea of privacy that in turn allows you to reconsider your position and argument.
You do not need to change your fundamental position, but the shape of your paper should shift to account for new arguments. However, if you read something that makes you completely reconsider your original position so that you want to change it, you can do so—as long as you keep all of the original and the new sources “in the conversation.” If in the original paper you used Fukuyama to support your position, maybe in the revision you will need to show Fukuyama as a contrary position against which you argue, with the support of the new source.
Your new source must be a scholarly, academic article discovered through the library search. Newspaper and Magazine articles are not academic.
Requirements:
Length: 1,200 words
Format: MLA
A Works Cited page is required for this paper.
………………….Answer Preview………………
Literature comparison
Name:
Institution:
The time of the two articles, seem to be slightly different. The publishing of the article “visible man” seems to have been earlier than that on the school website regarding the iPhone collecting information without the user’s consent. Despite the slight different in the time, both articles seem to cover the same theme. A common theme in the two articles is privacy. The name “Visible Man” suggests, Peter Singer is supporting the idea of less privacy in his article. On the hand, the article in the Xinhua News Agency reveals the impact of taking people’s privacy without their permission.
Peter Singer starts by explaining the history behind the technological advances of such websites as WikiLeaks by illustrating the work of philosopher Jeremy Bentham in 1787. Jeremy Bentham advocated the construction of a Panopticon, which is a circular………………..
MLA
1,118 Words