There is a lurking ethical issue that is facing contemporary society and that has already started to affect the military, but has the potential to grow even more monstrous. Online privacy or internet privacy is the root of this issue and “following the revelations of widespread data collection by the United States government, among others, the public has to decide whether to push for legislation that would safeguard their online privacy, and which criteria, if any, should first be met by government agencies before invading civilians' privacy”. The main point of this issue with leadership in the Marine Corps is the freedom of speech on social media. Marine Corps leaders need to ensure steps for troops realize the impact of their online interactions, how their identity translates beyond just themselves but to the entire Marine Corps, and how you have to be all in. “Young Marines are a generation that use social media to communicate and socialize by sharing certain or every detail of their lives” (Simpson). Young Marines believe that they can disclose any information without filter because there are no clear cut defining actions to identify the right and wrong things to post on social media. Marines should realize that their actions online can disgrace or discredit themselves which may have a negative impact for the integrity of the Marine …show more content…
In conclusion "some of the things our young Marines do on the Internet undermines that trust, and Marine Corps leadership has an obligation to ensure that Marines understand this and modify their behavior accordingly, both on social media as well in the community. "Wearing the uniform is a privilege and no Marine has the right to wear the uniform and then degrade the Marine Corps with an offensive video or
Abdo, Alexander, and Patrick Toomey. "The NSA is turning the internet into a total surveillance system." Theguardian.com. 11 Aug. 2013. Guardian News and Media. 25 Feb. 2014 .
The Marine Corps is not just an organization but instead it is a mindset, a spirit if you will,
Young Marines are in a generation that use social media to communicate and socialize by sharing certain or every details of their lives. Talking in public forums, Marines can deluge certain aspects of missions and provide their locations and activities that terrorist cells can use to their advantage. Everything from a Marines childhood good be made public for other people to see based on their settings that they have on their social media sites.
The ideas discussed in this article are also discussed in an article by Ross Bellaby in the Journal of Intelligence and National Security. Bellaby notes that as intelligence collection adapts to new threats in the world, a coherent ethical framework is needed to prevent abuse. He is concerned about the ability of intelligence organizations to intercept, monitor and retain personal data and personal communications on computers throughout the world forever. Individual privacy boundaries are being shattered as intelligence agencies routinely intercept our communications without our consent.
Joyce, who gives lectures at University of New South Wales in their law department is more than qualified to speak about this subject because the issues that online privacy pertains to is a serious matter since online surveillance is a real threat to private personal security. No person who is a law abiding citizen should be monitored for their online usage by their own government. The goal of this writing is to show awareness of online privacy concerns and how the US and
Information privacy is becoming a controversial subject across the globe in the heat of preventative terrorist methods.
The need for ensuring the security of nations and enterprises on the one hand and the need for protecting the privacy of individuals on the other, are creating a myriad of conflicts regarding ethics, laws and personal rights. Never before in the history of modern society has there been such a strong emphasis on capturing, analyzing, categorizing and using personal data that had been highly protected in the past for purposes of securing nations (Ottensmeyer, Heroux, 1991). Correspondingly, there has never been a time when every aspect of life in an organization is monitored, from personal computer and telephone use to the use of personal Wi-Fi and networking devices (Riedy, Wen, 2010). The first section of this analysis is to analyze three technologies that allow individuals to research other citizens' data and also discuss the advantages and disadvantages of these approaches to public access of information. The strategies or steps that citizens can do to protect their confidential information is also discussed as is the Federal law that enables the U.S. Government to gain legal right to make private information public. This specific law is called the Communications Assistance For Law Enforcement Act and is primarily used for providing greater information sharing within and between government agencies in fighting terrorism, piracy and major crimes (Riedy, Wen, 2010).
There are two values conflicting each other: national security and privacy of human rights. A controversial issue with those two values has got a lot of attention from the world. We found a case reflecting our topic; Snowden case. In that case indiscriminate surveillance were revealed by a man from inside. Some criticize him, but some support him. Through debates we have been at against indiscriminate surveillance. Surveillance by intelligence agencies violates human rights because of over-controlling, intended fear by government, and privacy as noble value.
The emic analysis of a social media program provides a baseline understanding of the practical applications of prior research related to government communication. Such a vantage point identifies and expands these attributes and shows their combined influences on social media work activities and organizational learning. For example, the transient Coast Guard culture is being further investigated in an examination of the program’s evolution in the wake of recent personnel and program changes, including the addition of a Coast Guard account on Instagram’s video and photo-sharing social networking site.
Many privacy violations are deemed justified because of the increasingly difficult war on terrorism, but that is arguably not a valid defense. “…privacy and safety are not conflicting parameters and that we must rethink our security legislation”
As an organizational- level leadership, he will confront many thorny problems and missions that challenge their moral criteria and military profession. In particular, when they receive the order from the upper- level, how he employ his expertise to exercise his moral leadership and undertake the tasks. Actually, both of the profession and ethic are interdependent, and inseparable. Thus, a professional commissioned officer should understand how to fit ethic into his expertise. Moreover, people would face the dilemmatic situation between the obedience of rules and the consideration of the consequence. When it comes to the moral or ethical, should I follow the deontology or consequentialism? Which one is the most critical priority to the stewardship
The principle of freedom in the United States of America has always tied with one’s private matters. But with technology advancing at such a rapid rate, the idea of privacy might soon become something from a fairytale. Especially included, is one’s online persona. The American government has begun to derestrict itself from the bounds of an individual's personal matters online. In reception, many Americans feel that their natural given rights are being exploited. They feel that the government has no justifiable reasons to be vigilating information that is not intended for anybody’s eyes except its rightful owner. However, it is truly necessary for the government to observe what citizens are doing online because it protects both the United States
As citizens of the United States of America, it is expected to feel a sense of security and privacy whether at home or elsewhere. This is why there is law enforcement that helps keep that sense of security and privacy locally while the military protects and keeps that same feeling internationally. With the advancement of technology, with the Internet especially some would think that reinforcing that feeling of security and privacy would be easy to do. But for quite some time now, we're learning that not only is this a complicated task but also in some cases you can have one but at the cost the other. For example some contend that security at the expense of privacy is not just un-American but unconstitutional. This paper will discuss some of
When we were younger we were always told by our parents to behave and follow the rules in school and to be nice to the other children. At school they had a set of rules that we were meant to follow and abide by them. Here in the Marine Corps is no different there are many rules and regulations that are meant to be followed under the UCMJ Articles. It’s important to keep following the orders you are given and that you follow these rules exactly like you are ordered to do so. In this essay I will be talking about the following: Disobeying an Order, Disrespect, Discipline, Chain of Command, Unauthorized Absence, and Leadership Principles and Leadership Traits. I will try my best’s efforts to explain everything and show what I have learned in
Since the birth of the internet, mankind has experienced unprecedented growth in knowledge and capabilities. For almost 40 years, this intricate realm of digital information has flung open the gates of change and empowered individuals in ways never before imagined. However, in line with nearly everything revolutionary, such an invention has also knocked the lid clean off of Pandora’s box. Criminals and terrorists alike have exploited the far-reaching platform of the internet to conduct their illicit business. In response, national governments have established numerous security programs in pursuit of these targets. Consequently, each program has presented itself as more intrusive than the previous by expanding government outreach through various data collection methods. Such actions have raised issues regarding privacy intrusion among numerous other factors of dehumanization that, until the recent years, have largely been ignored by the public eye. To be clear, the use of government surveillance in it of itself is necessary and acceptable. However, the lack of regulation and public transparency in the recent decades have resulted in intelligence agencies overstepping their jurisdiction along with an overall loss of focus in regards to identifying the enemy. In other terms, government surveillance, when left unchecked by the people, can and will result in the invalidation of natural rights.