Value Digital Privacy Information Technology
The Value Digital Privacy in an Information Technology Age
National security concerns in society and the continual investing in Internet, telephone, text and e-mail monitoring systems by enterprises are reshaping the individual citizen's rights to privacy. For U.S. citizens and employees, this is particularly challenging to accept and is often outright rejected as this nations' culture has been predicated on individual liberties and an assurance of privacy.
The technologies that are being used for national security and surveillance, combined with those used by corporations together have the ability to capture, aggregate, create analytical models and predict behavior over time (Ottensmeyer, Heroux, 1991). Monitoring and the analysis of data from the many technologies used from surveillance can today be used for behavioral modeling and gaining insights into peoples' and organizational behavior to a level never before possible or with as much precision (Riedy, Wen, 2010). As technologies continue to accelerate in terms of their sophistication, surveillance capability and analytical insights, both governments and enterprises can monitor every signal or message that has a digital footprint. This includes Wi-Fi, e-mail, text messaging, cellular traffic and Internet traffic, in addition to traditional landline phone monitoring as well. All of these technologies taken together will lead to even more personal and corporate privacy being compromised, with the rationalization being the need to protect governments and enterprise information assets. This paper begins with an analysis of three dominant technologies that give individuals the ability to research another's background including much of the personal data that is readily accessible online, comparing the advantages and disadvantages of each.
1. Thoroughly list and describe at least three (3) technologies that allow an individual to research citizens' private data.
The continually rising anxiety and acts of terrorism at a national security level and the near-daily announcements by corporations of having their customer and financial data compromised are leading to a very rapid proliferation of technologies being used for monitoring employees and citizens (Jeng-Chung, Ross, 2005). According to research completed for this analysis, this trend will continue to accelerate over the next three to five years as the venture capital (VC) community continues to see the potential for high Return on Investment (ROI) in these areas of investment.
Website monitoring is the first of three technologies one citizen can use to monitor another. The basics of this technology include parsing though weblogs, historical browsing history, and the use of advanced analytics to capture behavioral trends and insights. Advanced forms of this type of analysis include Latent Semantic Indexing (LSI), or the creation of linguistic models based on accumulations of unstructured content (Wood, 1998). State-of-the-art website monitoring includes the use of analytical techniques to combine unstructured textual data with structured numerical data to create an entire spectrum of monitoring not possible before, and the foundation of this is often website monitoring.
The second most common monitoring technology is e-mail intercepts and the use of packet-level analysis to capture the context and content of e-mail messages. This technology has long been used across TCP/IP-based networks as their packet-based transmission is well-adapted to this approach to monitoring (Freeh, 1999). Capturing digital footprints of all e-mail and network traffic is possible using the baseline configurations of these technologies. Current generations of these technologies can even monitor cell-phone conversations, keystrokes, text and e-mails initiated from a mobile device (Jeng-Chung, Ross, 2005). Over two dozen nations use these technologies today to monitor their citizens with the infamous Libyan government being one of the worst offenders, often building terabytes of data profiles on citizens through to be threats to the totalitarian state (Jeng-Chung, Ross, 2005).
The third and most advanced technology is the use of electromagnetic signature analysis. The U.S. Government leads all nations in the adoption and use of this technology, often using it for validating bank transfers and digital identity management (Kidwell, Kidwell, 1996). The National Security Administration (NSA) uses these techniques to ensure compliance of its TEMPEST-class enclosures and to protect highly confidential documents and systems (Jeng-Chung, Ross, 2005). The NSA has also created a Big Data initiative that is using electromagnetic signature analysis that can immediately recognize digital signatures and determined their authenticity. Given the size of the data sets, this project is called Project Pinwhale, and has a very broad scope of capturing website traffic, monitoring websites, e-mail, text, cell phone and all other digital signatures...
Digital Privacy in an Information Technology Age Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy and its impacts (Belanger & Crossler, 2011). There are many definitions for information privacy, but there is little variance in the elements of the definitions, which typically include some form of control over the potential secondary
The company's consistent top line revenue growth also illustrates it has been successful in transforming its supplier network into one that operates more on knowledge, less on purely price or product decisions. As a result the company is capable of competing more at the process level and less at the purely price-driven one (Reese, 2007). In terms of the company's factors for success, the greater opportunities is to move into
However, a complex project might need a higher level of expertise that not only requires project management skills but also experience with technology. What are the pros and cons of the following statement? If the Internet is to flourish, the creators of the information on our information superhighway must be protected. Intellectual property rights must be respected. If First Amendment rights are used as a justification for violating property rights, the
" (Doukas, Maglogiannis and Kormentzas, 2006) The following illustration shows the evaluation Platform Architecture. Figure 3 The Evaluation Platform Architecture Doukas, Maglogiannis and Kormentzas (2006) state that the patient state vital signs are monitored through a PDA device attached to the patient and transmitted to a computer for evaluation through wireless access or Bluetooth. Additionally the patient site is monitored through use of a camera. The software that has been developed is used
Information Technology holds great promise for improving the way a government serves its citizens in various services it conducts to the citizens. This rapid adoption of information technology has produced substantial benefits to the citizens, tax payers, and businesses alike. It is therefore recommended for every particular government to develop digital services to streamline all its operations. One area where governments should enhance its key functions is the establishment of
Communications This age is often referred to as the information era: the last two decades have given birth to some of the most staggering advancements that the human race has ever been capable of -- advancements which have changed the way that we live, do business, stay healthy, fight disease and defend our nation. It's vital to have a comprehensive and concrete understanding of some of the more basic concepts
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now