• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Most of our examples that will be given are events that took place in America or in Europe. We will also be discussing the ethical and legal issues regarding Security vs. Privacy as well as incorporation of IT use.

Extracts from this document...


SECURITY VS PRIVACY Introduction For this assignment we have chosen 'Security vs. Privacy' as our main topic area. We will be discussing the background underlying concepts including examples from current situation gathered from different sources and different media. Most of our examples that will be given are events that took place in America or in Europe. We will also be discussing the ethical and legal issues regarding Security vs. Privacy as well as incorporation of IT use. "Today, we have the capability of putting a camera almost everywhere, do you believe that you would conduct yourself differently if you were on camera than if you weren't? I think so ... it wouldn't necessarily be something legal or illegal, but it would be different." "You'd give up everything by way of individuality, privacy, anonymity ... and even then you would not have total security." James Gilmore (Chairman of the National Advisory Commission) Background Underlying Concepts: There's still a lot of confusion out there about just what privacy is and how we keep it or lose it. Privacy can be described as the power to control what others can come to know about you and to determine the entry rules for your own private space. Privacy is a concept which applies to an individual. ...read more.


In essence Information Technology (IT) is your PC, telephone, fax machine, printer and much, much more. From the software applications you use to write emails and letters through to the massive systems that make up the World Wide Web, Information Technology is in use everywhere. Although no one can guarantee a country's total security, technology could potentially come close. As advanced technology creates problems for the protection of privacy, it can also provide a large part of the solutions. Networks, hardware and software can and should be designed, or redesigned, to put the user in control of his own personal information and his private sphere. But given the considerable commercial and state interests in the collection of personal data, this will only happen with a clear, enforceable legal framework guaranteeing the individual's right to privacy and regulating the measures to achieve it. Ethical issues & Legal boundaries Most countries have laws protecting individual privacy. The EU has the Data Protection Act of 1995. Organisation that collects personal data must register with the government, and take precautions against misuse of that data. They are also prohibited from the collection, use and dissemination of personal information without the consent of the person. Organisations also have the duty to tell individuals about the reason for the information collection, to provide access and correct inaccurate information, and to keep that information secure from access by unathorised parties. ...read more.


We'll learn to pick and choose a few secrets. Conclusion In conclusion, we all know without some privacy, we couldn't stay human. But we'll be better equipped to defend a core of essential privacy if our overall civilization is open enough to let us catch the Peeping Toms and power abusers. Better, more intrusive technology is going to limit our ability to stay anonymous. In 5 or 10 years, you'll have eyeglasses that scan any face on the street, look it up on the Internet, and provide captions as you walk by. This will be a return to the village of our ancestors, where they recognized everyone they saw. No one will be a total stranger. Different security technologies have important place in an overall security solution. Privacy violations can easily lead to fraud, whatever data can be exploited, someone will tri it, computers or no computers. As Whitfield Diffie has said 'No right of private conversation was enumerated in the constitution' we don't suppose it occurred to anyone at that time that it could be prevented. The ability to have a private conversation, like the ability to keep your thoughts in your head, was a natural consequence of how the world worked. Technology had demolished that world view, powerful directional microphones can pick up conversation hundreds of yards away. It is plausible that we could soon be living in a world without expectation of privacy, anywhere or at anytime. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. I have selected a nursery because there is high demand in the UK as ...

    The research which I have done for market and about childminders is attached in the appendix 2. Customers-After analysing the children's day care market I have come to know that the children from the age o to 5 can attend private day nurseries.

  2. Report on ethical practices of TATA Group (India)

    Says Kishor Chankar, the chairman of the Tata Council for community Initiatives. Tata companies adhere to environmental procedures drawn by Global Reporting Initiative (GRI) which operates under the regulations of the United Nations. The group's contribution to conserve the environment falls into two categories: * Efforts of different Tata companies to preserve the environment.

  1. For this unit I will be looking at the marketing of an existing service. ...

    reported that this was the reason for over 75% of Virgins breakdowns and failures. * There has been an increase in the number of low cost airlines offering cheap domestic flights to the same destinations as Virgin Trains and other rail companies.

  2. This coursework that I intend on completing will be based around setting up a ...

    ages unlike WHSmith or Hitman which are both old fashioned and doesn't give people details of the type of shop. However, currently a conclusion cannot sufficiently be made yet on whether or not the business would be a success.

  1. Apple Incorporation - Case Analysis

    Its market share has been reduced to below 5% and its operating system differs considerably from the Wintel operating system used my dominant Microsoft. Costs of maintaining this difference have increased in comparison to those utilizing the competitive operating system.

  2. This report will look at McDonalds as an international business, but also focus on ...

    McDonald's vision is to be the world's best quick service restaurant experience. Being the best means providing outstanding quality, service, cleanliness and value, so that they make every customer in every restaurant smile.

  1. Psychology discussing stress.

    The fight or flight response sees stress as a biologically based survival mechanism which evolved prepared the body for rapid activity. Task Three How are the autonomic nervous and the endocrine system involved in stress behaviour? The processes of the brain are involved in every aspect of stress behaviour from

  2. The Use of Geographical Information Systems (GIS) And International Technology Transfer by Non-Governmental ...

    The Socio-economic realities and priorities of the "Third world" are quite different and, if GIS is to be of use to the challenges to these realities and priorities"(Taylor, preface 1991) APPLICATION OF GIS According to a report of the British Computer Society's Developing Countries Specialist Group (1991)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work