• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Most of our examples that will be given are events that took place in America or in Europe. We will also be discussing the ethical and legal issues regarding Security vs. Privacy as well as incorporation of IT use.

Extracts from this document...


SECURITY VS PRIVACY Introduction For this assignment we have chosen 'Security vs. Privacy' as our main topic area. We will be discussing the background underlying concepts including examples from current situation gathered from different sources and different media. Most of our examples that will be given are events that took place in America or in Europe. We will also be discussing the ethical and legal issues regarding Security vs. Privacy as well as incorporation of IT use. "Today, we have the capability of putting a camera almost everywhere, do you believe that you would conduct yourself differently if you were on camera than if you weren't? I think so ... it wouldn't necessarily be something legal or illegal, but it would be different." "You'd give up everything by way of individuality, privacy, anonymity ... and even then you would not have total security." James Gilmore (Chairman of the National Advisory Commission) Background Underlying Concepts: There's still a lot of confusion out there about just what privacy is and how we keep it or lose it. Privacy can be described as the power to control what others can come to know about you and to determine the entry rules for your own private space. Privacy is a concept which applies to an individual. ...read more.


In essence Information Technology (IT) is your PC, telephone, fax machine, printer and much, much more. From the software applications you use to write emails and letters through to the massive systems that make up the World Wide Web, Information Technology is in use everywhere. Although no one can guarantee a country's total security, technology could potentially come close. As advanced technology creates problems for the protection of privacy, it can also provide a large part of the solutions. Networks, hardware and software can and should be designed, or redesigned, to put the user in control of his own personal information and his private sphere. But given the considerable commercial and state interests in the collection of personal data, this will only happen with a clear, enforceable legal framework guaranteeing the individual's right to privacy and regulating the measures to achieve it. Ethical issues & Legal boundaries Most countries have laws protecting individual privacy. The EU has the Data Protection Act of 1995. Organisation that collects personal data must register with the government, and take precautions against misuse of that data. They are also prohibited from the collection, use and dissemination of personal information without the consent of the person. Organisations also have the duty to tell individuals about the reason for the information collection, to provide access and correct inaccurate information, and to keep that information secure from access by unathorised parties. ...read more.


We'll learn to pick and choose a few secrets. Conclusion In conclusion, we all know without some privacy, we couldn't stay human. But we'll be better equipped to defend a core of essential privacy if our overall civilization is open enough to let us catch the Peeping Toms and power abusers. Better, more intrusive technology is going to limit our ability to stay anonymous. In 5 or 10 years, you'll have eyeglasses that scan any face on the street, look it up on the Internet, and provide captions as you walk by. This will be a return to the village of our ancestors, where they recognized everyone they saw. No one will be a total stranger. Different security technologies have important place in an overall security solution. Privacy violations can easily lead to fraud, whatever data can be exploited, someone will tri it, computers or no computers. As Whitfield Diffie has said 'No right of private conversation was enumerated in the constitution' we don't suppose it occurred to anyone at that time that it could be prevented. The ability to have a private conversation, like the ability to keep your thoughts in your head, was a natural consequence of how the world worked. Technology had demolished that world view, powerful directional microphones can pick up conversation hundreds of yards away. It is plausible that we could soon be living in a world without expectation of privacy, anywhere or at anytime. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. I have selected a nursery because there is high demand in the UK as ...

    The research which I have done for market and about childminders is attached in the appendix 2. Customers-After analysing the children's day care market I have come to know that the children from the age o to 5 can attend private day nurseries.

  2. Report on ethical practices of TATA Group (India)

    Says Kishor Chankar, the chairman of the Tata Council for community Initiatives. Tata companies adhere to environmental procedures drawn by Global Reporting Initiative (GRI) which operates under the regulations of the United Nations. The group's contribution to conserve the environment falls into two categories: * Efforts of different Tata companies to preserve the environment.

  1. Apple Incorporation - Case Analysis

    Its market share has been reduced to below 5% and its operating system differs considerably from the Wintel operating system used my dominant Microsoft. Costs of maintaining this difference have increased in comparison to those utilizing the competitive operating system.

  2. Basic concepts (MRP, MRP II and ERP).

    Exception reporting by part number/model number is not presented in a one-shot approach like other traditional MRP systems. Reports are not always formatted to meet business needs. Although there are shortcomings to pc/MRP, these minor inconveniences are far outweighed by what it offers in total.

  1. Develop my understanding regarding the production of accounts and their use for business decision ...

    Current Assets - Current Liabilities Business Ratio's. Return on capital employed (ROCE) 1993 - 16,741.00 96,921.00 X 100 = 17.2% 1994 - 11,153.00 97,174.00 X 100 = 11.5% 1995 - 11,336.00 96,490.50 X 100 = 11.7% Gross profit percentage 1993 - 20,025.00 80,100.00 X 100 = 25% 1994 - 19,725.00

  2. Implementation of ATMS at SBI. Banks in India are looking at deploying biometric ATMs ...

    Normally, the keyboard is vandal proof i.e. it cannot be tampered with easily. * Touch Screen: Most of the ATMs now-a-days come with touch screen that enables customers to select transaction options by touching the screen with their fingers. In case of certain applications, virtual keyboard also appears on the screen for alpha-numeric data entry.

  1. Stakeholders vs. Shareholders.

    The compass for true leadership unmistakably to stakeholder-management practices. The Global Challenge Facts and Stakeholders arguments In the other hand we have also heard that businesses, must do more than just take their shareholders into account. It maintains that organisations must instead be accountable to all their stakeholders, and that

  2. For this unit I will be looking at the marketing of an existing service. ...

    What age group are you in? 20 under 21 - 30 31 - 40 41 - 50 50+ Q2. What is your gender? Male Female Q3. Have you ever travelled by train? If not go to question 6. Yes No Q4. What was your main reason for commuting?

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work