Most of our examples that will be given are events that took place in America or in Europe. We will also be discussing the ethical and legal issues regarding Security vs. Privacy as well as incorporation of IT use.

Authors Avatar

SECURITY VS PRIVACY

Introduction

For this assignment we have chosen ‘Security vs. Privacy’ as our main topic area. We will be discussing the background underlying concepts including examples from current situation gathered from different sources and different media. Most of our examples that will be given are events that took place in America or in Europe. We will also be discussing the ethical and legal issues regarding Security vs. Privacy as well as incorporation of IT use.

"Today, we have the capability of putting a camera almost everywhere, do you believe that you would conduct yourself differently if you were on camera than if you weren't? I think so ... it wouldn't necessarily be something legal or illegal, but it would be different."

"You'd give up everything by way of individuality, privacy, anonymity ... and even then you would not have total security." 

James Gilmore

 (Chairman of the National Advisory Commission)

Background Underlying Concepts:

There's still a lot of confusion out there about just what privacy is and how we keep it or lose it.

Privacy can be described as the power to control what others can come to know about you and to determine the entry rules for your own private space.

Privacy is a concept which applies to an individual. It is the right of an individual to decide what information (s)he wishes to share with others and also what information (s)he is willing to accept from others. 

As more and more of individual’s daily activities involve some form of usage of electronic communication networks, the level of security of these networks against various types of intrusion or disruption has become a major concern. At stake are not only significant economic and financial interests but also public confidence in using communications networks for important transactions or for the exchange of sensitive information. If an acceptable level of security cannot be guaranteed, the information society will be unlikely to develop its full potential

One aspect of security is the protection against intrusion of people’s private sphere and against the unauthorised use of their personal data when they are transmitted over the public communications network. For example, if you visit a website and download information, you do not want others to be able to spy on you. When you buy a product or service via the internet, you do not want others to copy your credit card number or to be able to find out what you were buying.

Historical Examples

During March 2000 the following events took place due to lack of security:

  • For years, personal information has ‘leaked’ from Web sites (such as Intuit) to advertisers (such as DoubleClick). When visitors used various financial calculators on the Intuit site, a design glitch in the Web site’s programming allowed information they entered to be sent to DoubleClick. This happened without the users’ knowledge or consent, and surprisingly without Intuit’s knowledge or consent.
Join now!

Financial Times

  • Someone broke into the business-to-business Web site fro SalesGate.com and stole abut 3,000 customer records, including credit card numbers and other personal information. He posted some of the information on the Internet.

Telegraph

  • Convicted criminal hacker Kevin Mitnick testified before Congress. He told them that social engineering is a major security vulnerability. He can often get passwords and other secrets just by pretending to be someone else and asking.

The Independent

Current Situation:

Personal privacy today is a controversial and complex topic, which is influenced by a number of factors. There is an ...

This is a preview of the whole essay