Wednesday, June 19, 2019

HOW IT SECURITY AND ROBUST TECHNOLOGY COMPROMISES PEOPLES FREEDOM AND Literature review

HOW IT SECURITY AND ROBUST TECHNOLOGY COMPROMISES PEOPLES FREEDOM AND HOW CAN PEOPLE, GOVERNMENT AND ORGANISATIONS ADAPT TO THESE CHALLENGES - Literature review object lessonThe surveys were conducted between 1978 and 2004, and Westin used the data to build a privacy concern index. According to the index, there ar three classifications privacy fundamentalists (people generally dis unsuspecting of organizations communicate for their personal data and use of computerized systems), privacy pragmatists (people with moderate concern on the use of technology for intrusion, 57% of US population), and privacy unconcerned (individuals who are trustful of organizations and are not bothered about privacy constrictions by using information technology) (Clarke, 2008).Bennet, (2005) explored the impacts of technology ion privacy Clarke, (1988, Lyon, (1994) examined surveillance and privacy while Zureik, (2005) attempted dialogue interception in the age of technology. The innovation telecommuni cation sector triggered a number of legislations on surveillance. As indicated by Privacy International (2003) states moved in to update their surveillance laws. For instance, the case law in Strasbourg was used to update British legislation to take note of the technological advances. Though it can be argued that the intentions are good, the governments use old legislative instruments to apply new technologies to address the interception of information and networks without taking into account how the technology has altered the nature and sensitivity of information. The European inwardness introduced a number of legislations as an immediate response to terrorist threats after 2001 attack on the US. Though the trend was replicated by law enforcement agencies worldwide, in an attempt to charter a more comprehensive approach to the capture, retention of information and access to information systems, Blakeney, (2007, quoted in Akrivopoulou, 2012) notes that the manner in which this was done this remains questionable. As the source notes, much of

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.