.

Friday, April 26, 2019

Topics in Information Technology Ethics Essay Example | Topics and Well Written Essays - 1500 words

Topics in Information Technology Ethics - Essay grammatical caseOf course, security reasons atomic number 18 not the only purposes for Internet surveillance corporations also subroutine surveillance for trade purposes. Paul Mobbs, in the article How and when organisations and the state can monitor your actions, discusses the potential threats to polite liberties posed by the use of electronic networks for the purposes of surveillance, by the state and private companies, and the potential damage of these for civil society in the long term. K aren McCullagh, in response to the growing security concerns after 9/11, also states that the modern use if the Internet has provided companies ad states with opportunities of surveillance that were not open to them previously. As she sees it, privacy and security are unite issues It is submitted that privacy and security are necessarily interrelated and interdependent. Therefore neither principle should ever be applied to the exclusion of t he other, as they are both essential tenets of a liberal democratic society. These are difficult issues, and there are no easy answers to them. It is necessary, though, for people to be certain of the extent to which they are or can be monitored. Security is a necessity, but no will could argue that civil liberties are not also a necessity.Mobbs splits surveillance into two different categories, corroboratory and directed. Under indirect surveillance, the practices of dataveillance and data profiling are the two most commonly used. These practices are used typically for the purposes of marketing, political lobbying, police investigations, and the protection of intellectual property. As most users of the Internet do not understand the applied science behind the Internet, these users are particularly susceptible to invasions of privacy. This is not to say that people are not aware that their privacy has been violated, though it does mean that people might attempt to protect their p rivacy by authority which could be

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.