• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Most of our examples that will be given are events that took place in America or in Europe. We will also be discussing the ethical and legal issues regarding Security vs. Privacy as well as incorporation of IT use.

Extracts from this document...

Introduction

SECURITY VS PRIVACY Introduction For this assignment we have chosen 'Security vs. Privacy' as our main topic area. We will be discussing the background underlying concepts including examples from current situation gathered from different sources and different media. Most of our examples that will be given are events that took place in America or in Europe. We will also be discussing the ethical and legal issues regarding Security vs. Privacy as well as incorporation of IT use. "Today, we have the capability of putting a camera almost everywhere, do you believe that you would conduct yourself differently if you were on camera than if you weren't? I think so ... it wouldn't necessarily be something legal or illegal, but it would be different." "You'd give up everything by way of individuality, privacy, anonymity ... and even then you would not have total security." James Gilmore (Chairman of the National Advisory Commission) Background Underlying Concepts: There's still a lot of confusion out there about just what privacy is and how we keep it or lose it. Privacy can be described as the power to control what others can come to know about you and to determine the entry rules for your own private space. Privacy is a concept which applies to an individual. ...read more.

Middle

In essence Information Technology (IT) is your PC, telephone, fax machine, printer and much, much more. From the software applications you use to write emails and letters through to the massive systems that make up the World Wide Web, Information Technology is in use everywhere. Although no one can guarantee a country's total security, technology could potentially come close. As advanced technology creates problems for the protection of privacy, it can also provide a large part of the solutions. Networks, hardware and software can and should be designed, or redesigned, to put the user in control of his own personal information and his private sphere. But given the considerable commercial and state interests in the collection of personal data, this will only happen with a clear, enforceable legal framework guaranteeing the individual's right to privacy and regulating the measures to achieve it. Ethical issues & Legal boundaries Most countries have laws protecting individual privacy. The EU has the Data Protection Act of 1995. Organisation that collects personal data must register with the government, and take precautions against misuse of that data. They are also prohibited from the collection, use and dissemination of personal information without the consent of the person. Organisations also have the duty to tell individuals about the reason for the information collection, to provide access and correct inaccurate information, and to keep that information secure from access by unathorised parties. ...read more.

Conclusion

We'll learn to pick and choose a few secrets. Conclusion In conclusion, we all know without some privacy, we couldn't stay human. But we'll be better equipped to defend a core of essential privacy if our overall civilization is open enough to let us catch the Peeping Toms and power abusers. Better, more intrusive technology is going to limit our ability to stay anonymous. In 5 or 10 years, you'll have eyeglasses that scan any face on the street, look it up on the Internet, and provide captions as you walk by. This will be a return to the village of our ancestors, where they recognized everyone they saw. No one will be a total stranger. Different security technologies have important place in an overall security solution. Privacy violations can easily lead to fraud, whatever data can be exploited, someone will tri it, computers or no computers. As Whitfield Diffie has said 'No right of private conversation was enumerated in the constitution' we don't suppose it occurred to anyone at that time that it could be prevented. The ability to have a private conversation, like the ability to keep your thoughts in your head, was a natural consequence of how the world worked. Technology had demolished that world view, powerful directional microphones can pick up conversation hundreds of yards away. It is plausible that we could soon be living in a world without expectation of privacy, anywhere or at anytime. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. I have selected a nursery because there is high demand in the UK as ...

    The research which I have done for market and about childminders is attached in the appendix 2. Customers-After analysing the children's day care market I have come to know that the children from the age o to 5 can attend private day nurseries.

  2. Report on ethical practices of TATA Group (India)

    Says Kishor Chankar, the chairman of the Tata Council for community Initiatives. Tata companies adhere to environmental procedures drawn by Global Reporting Initiative (GRI) which operates under the regulations of the United Nations. The group's contribution to conserve the environment falls into two categories: * Efforts of different Tata companies to preserve the environment.

  1. For this unit I will be looking at the marketing of an existing service. ...

    There are a number of important steps involved in analysing the environment. The most important of these are: * To identify which forces are the most important and why they are so significant * To forecast how these forces might change in the future * To build expectations and predictions

  2. This coursework that I intend on completing will be based around setting up a ...

    shop because the ideas that I would have for the shop in Caerphilly would be very similar. Monday to Friday (10am to 6pm) = myself (�1,200per month) and second assistant (�700) Saturday (10am to 6pm) = myself and two part time staff both on �4.10 per hour.

  1. Implementation of ATMS at SBI. Banks in India are looking at deploying biometric ATMs ...

    * Keyboard/Keypad: A recessed keyboard with 11 or more keys is available in the front panel and used for entering numeric data viz. Personal Identification Number (PIN) and the amount of transaction. The keys on the board represent numbers from 0 to 9, Cancel / Clear, and Enter / OK.

  2. In this assignment I have to the planning and implementation issues a business will ...

    that you need money but by doing that you will be getting something back you will consistently have a watch on your website and you can be sure your website will be safe. All websites have a domain name - which is normally the same as the organizational name, such as www.boots.co.uk.

  1. BTEC Business Unit 1 - In this report the two groups that I will ...

    If that was not enough, a Wax Museum was opened in Paris and finally, Port Aventura opens in Spain, again another exciting and mind blowing theme park. I will now look more specifically into the company and things which go on behind close doors.

  2. In this task I will be going over the legal, ethical and operational issues ...

    It is illegal to hack into somebody's computer and access unauthorised data. This act is very beneficial to businesses such as Vodafone as it means anyone who accesses unauthorised Vodafone data will be prosecuted. Vodafone will also have protection on their computers which will require staff to have a login and password.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work