Saturday, May 11, 2019

HOW IT SECURITY AND ROBUST TECHNOLOGY COMPROMISES PEOPLES FREEDOM AND Literature review

HOW IT SECURITY AND ROBUST TECHNOLOGY COMPROMISES PEOPLES FREEDOM AND HOW CAN PEOPLE, GOVERNMENT AND ORGANISATIONS ADAPT TO THESE CHALLENGES - literary productions review ExampleThe surveys were conducted between 1978 and 2004, and Westin usaged the data to build a privacy concern index. harmonize to the index, there are three classifications privacy fundamentalists (people generally distrustful of organizations asking for their personal data and use of computerized systems), privacy pragmatists (people with moderate concern on the use of technology for intrusion, 57% of US population), and privacy indifferent (individuals who are trustful of organizations and are not bothered about privacy constrictions by using reading technology) (Clarke, 2008).Bennet, (2005) explored the impacts of technology ion privacy Clarke, (1988, Lyon, (1994) examined surveillance and privacy while Zureik, (2005) attempted communication interception in the age of technology. The cornerstone telecommuni cation sector triggered a number of lawmakings on surveillance. As indicated by Privacy International (2003) states go in to update their surveillance laws. For instance, the case law in Strasbourg was used to update British legislation to take note of the technological advances. Though it can be argued that the intentions are good, the governments use old legislative instruments to apply new technologies to address the interception of information and networks without taking into account how the technology has altered the nature and predisposition of information. The European Union introduced a number of legislations as an immediate response to terrorist threats after 2001 attack on the US. Though the trend was replicated by law enforcement agencies worldwide, in an attempt to adopt a more world-wide approach to the capture, retention of information and access to information systems, Blakeney, (2007, quoted in Akrivopoulou, 2012) notes that the manner in which this was done this system questionable. As the author notes, much of

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.