More Subjects
Letter to Editor
[Name of the Writer]
[Name of the Institution]
Liberty or Security? We need ourselves secure, and not Vulnerable
We all are living in a world that is experiencing change at every moment. These changes are impacting on our way of life. We are now much open to the threats, compared to in the past. No one has ever pondered upon that what has brought us close to such threats? We literally have never thought about this. These changes are actually the inventions that the world has made in a short span of time. Everyone has been taking advantage of the new inventions and in doing so we brought ourselves very much close to the destruction. This destruction is actually the agreement between us and the changes we brought to this world that we are ready to surrender our freedom to these changes.
How the world population today is vulnerable? Our reliance on technology that has made us away from the pleasures of the natural world- of which we are an essential part of, our disastrous inventions like weaponry which has made us all unsafe, and our dangerous experiments on earth that have made it unsafe for us. These changes have made us vulnerable and have restricted our liberty. Every coming generation today is much prone to technology compared to the previous generations. Patzek argues about the technological advancement that is destructive and nothing more ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"CxeUYdUd","properties":{"formattedCitation":"(Patzek, 2008)","plainCitation":"(Patzek, 2008)","noteIndex":0},"citationItems":[{"id":405,"uris":["http://zotero.org/users/local/s8f0QVnP/items/3DARUKGL"],"uri":["http://zotero.org/users/local/s8f0QVnP/items/3DARUKGL"],"itemData":{"id":405,"type":"article-journal","title":"Exponential growth, energetic Hubbert cycles, and the advancement of technology","container-title":"Archives of Mining Sciences","page":"131–159","volume":"53","issue":"2","source":"Google Scholar","author":[{"family":"Patzek","given":"Tad W."}],"issued":{"date-parts":[["2008"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Patzek, 2008). This is how we are not secure anymore. Although with these changes coming forward, the concept of security has expanded but the primary definition of security is the vulnerability of our personal information. The use of gadgets in schools, universities and other institutions have made everyone’s personal information open to each other. There are many incidents that have been reported in which the victims suffered the repercussions of their personal vulnerability.
With every ill, there is a cure, and there is a cure also in terms of lessening these threats. In doing so, each one of us needs to calculate that are we really in a need to digitalize ourselves. About the young people it is quite understandable that they cannot be pulled away from this digitalized world, but what about the people who are not much trained in using these technologies. Such ill-trained users then become a source of threat for many others. There are also some more trade-offs we need to do, just in order to lessen our vulnerability from the digitalized threat.
We need to make our reliance narrower on technology. Although it has now become the part and parcel of our daily life, still we can live without it. In exploring the advantages of the digital world and the technology we have not cared about creating the means to lessen our dependence on this world. There are some ways we can disconnect ourselves from the technology-oriented world, thus making ourselves secure. We can do this by organizing programs in the high schools and by raising awareness through the media campaigns about the negative consequences of all this. The law makers of our country must also explore the ways as to how the constitutional cover could be provided to limit the inflow of technology in the life of the people of the U.S. As Chanson has argued that unless we do not make our people aware of the dangers associated with this technology, we are making them vulnerable to many kinds of threats at a time ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"uva50loY","properties":{"formattedCitation":"(Chaison, 2002)","plainCitation":"(Chaison, 2002)","noteIndex":0},"citationItems":[{"id":408,"uris":["http://zotero.org/users/local/s8f0QVnP/items/9M32KQG7"],"uri":["http://zotero.org/users/local/s8f0QVnP/items/9M32KQG7"],"itemData":{"id":408,"type":"article-journal","title":"Information technology: The threat to unions","container-title":"Journal of Labor Research","page":"249–259","volume":"23","issue":"2","source":"Google Scholar","title-short":"Information technology","author":[{"family":"Chaison","given":"Gary"}],"issued":{"date-parts":[["2002"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Chaison, 2002).
The purpose of this letter is also to draw an image for the public that how we have reached close to such mega-threats within no time. Although the first amendment of the U.S constitution call for the freedom and liberty of its citizen but this has ruined the liberty provided to us by our constitution. We are enjoying the so-called liberty, but actually, it does not exist. In real terms, we have become more compact and more open to the threats to our personal life. We can just get true liberty, just if we detach ourselves from the world that has not built anything benefitting for ourselves.
(ENTER YOUR NAME HERE)
(ENTER YOUR CITY NAME HERE)
REFERENCES:
ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Chaison, G. (2002). Information technology: The threat to unions. Journal of Labor Research, 23(2), 249–259.
Patzek, T. W. (2008). Exponential growth, energetic Hubbert cycles, and the advancement of technology. Archives of Mining Sciences, 53(2), 131–159.
More Subjects
Join our mailing list
@ All Rights Reserved 2023 info@freeessaywriter.net