Sunday, November 3, 2019

HOW IT SECURITY AND ROBUST TECHNOLOGY COMPROMISES PEOPLES FREEDOM AND Literature review

HOW IT SECURITY AND ROBUST TECHNOLOGY COMPROMISES PEOPLES FREEDOM AND HOW CAN PEOPLE, GOVERNMENT AND ORGANISATIONS ADAPT TO THESE CHALLENGES - Literature review Example The surveys were conducted between 1978 and 2004, and Westin used the data to build a privacy concern index. According to the index, there are three classifications; privacy fundamentalists (people generally distrustful of organizations asking for their personal data and use of computerized systems), privacy pragmatists (people with moderate concern on the use of technology for intrusion, 57% of US population), and privacy unconcerned (individuals who are trustful of organizations and are not bothered about privacy constrictions by using information technology) (Clarke, 2008). Bennet, (2005) explored the impacts of technology ion privacy; Clarke, (1988, Lyon, (1994) examined surveillance and privacy while Zureik, (2005) attempted communication interception in the age of technology. The innovation telecommunication sector triggered a number of legislations on surveillance. As indicated by Privacy International (2003) states moved in to update their surveillance laws. For instance, the case law in Strasbourg was used to update British legislation to take note of the technological advances. Though it can be argued that the intentions are good, the governments use old legislative instruments to apply new technologies to address the interception of information and networks without taking into account how the technology has altered the nature and sensitivity of information. The European Union introduced a number of legislations as an immediate response to terrorist threats after 2001 attack on the US. Though the trend was replicated by law enforcement agencies worldwide, in an attempt to adopt a more comprehensive approach to the capture, retention of information and access to information systems, Blakeney, (2007, quoted in Akrivopoulou, 2012) notes that the manner in which this was done this remains questionable. As the author notes, much of

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.