Sunday, February 16, 2020

Utilitarian Theories of Punishment Essay Example | Topics and Well Written Essays - 1750 words

Utilitarian Theories of Punishment - Essay Example This theory relies on some intrinsic value being installed within a person initially in order for these decisions and distinction to be made. The tern utilitarianism was established or became from philosopher Bentham’s test question; ‘What is the use of it,’. Bentham’s’ theory suggests that all pleasures are qualitatively alike; grading them based on values such as intensity, certainty, purity, fruitfulness, length and temporal closeness. While Bentham and Mills were philosophers they were also known as economists and Mills theory expanded on utilitarianism. Mills suggested that pleasure is something that can be quantified and qualified and that those who are aquatinted with both prefer that pleasures are quantified. Explaining this preference involves assuming that humans have a sense of decency within their higher faculties and that this dignity is necessary for happiness and those pleasures which conflict with maintaining this dignity is rejected. Theory’s regarding punishment is usually either retributive or utilitarian (Rawls). Those that are retributive emphasize past actions in consideration of the consequence that much must be paid. Theories that are utilitarian are frequently seen as the opposing position and are often used in consideration of the future. Utilitarian theories of punishment will serve as the focus of this discussion.

Sunday, February 2, 2020

Internet and Social Networking Privacy Essay Example | Topics and Well Written Essays - 1000 words - 1

Internet and Social Networking Privacy - Essay Example I have identified three major trends in approaching this question among the authors of articles and books on Internet privacy. The first one is the view that the Internet privacy does not exist at all. Secondly, some authors acknowledge that privacy on the Internet may be reached through certain measures and that privacy exists/may exist but always to certain extent. Thirdly, there are authors who claim that privacy on the Internet is not something to worry about, since it is normal that it may be violated for the sake of the third party’s interests. More than a hundred years ago privacy was defined as the â€Å"right to be let alone† (Warren & Brandeis 193) While users generally agree that privacy is basically about human dignity as well as protection of private property, in the virtual world, this notion is narrowed. Specifically, information privacy is thought to exist if one is able to control the usage, circulation, as well as release of personal information (Culna n 341). With the rapid growth of the web space and progress of technology, concerns of users’ regarding personal privacy threats are growing, too. While many people sincerely believe that maintaining privacy while on the Internet and especially while visiting social networking sites is their basic right and the basic thing you need to do to protect your privacy is to merely adjust the privacy settings, Steven Rambam and other authors believe that privacy does not exist on the Internet. A private investigator and head of Pallorium Investigative Agency, Rambam gave a few talks at American conferences whose basic idea was â€Å"Privacy is Dead – Get Over It†. In particular, in his talk on privacy death at the 8th www.Toor.Con.org Information Security Conference in San Diego back in 2006, Rambam provided an overview of online databases and resources that could effectively be used with investigative purposes. â€Å"Digital footprints† left practically by every body today help Rambam retrieve as many as up to 500 pages of personal information in just a few hours about a person he is not familiar with at all (Rambam, â€Å"Privacy is Dead – Get Over It†) At the Last HOPE Conference, Rambam described the process of finding necessary information on the Internet through intrusion into privacy, which as the speaker remarkably noted â€Å"is out of the bottle† (Mills, â€Å"The Internet – a Private Eye’s Best Friend†). Specifically, every search through Google, each blog post, and each photo posted online mean further losing the fight over privacy protection for users. This is because â€Å"anything you put on the Internet will be grabbed, indexed, cataloged, and out of your control before you know it† (Mills, â€Å"The Internet – a Private Eye’s Best Friend†). According to Rambam, every kind of information online is digitized, with older information scanned and placed online, after which this mixture gets aggregated into special databases sold to government agencies, marketers, and virtually anyone able to pay for it. Twitter, cell phones, taking photos by iPods, etc are all tools to identify a person’s location; buying preferences and alike information is gathered by marketing databases that are bought by the government. Thanks to using the information provided by