SlideShare a Scribd company logo
1 of 2
A contemporary issue facing technology innovation today is the tension between personal
privacy and public security. Discuss in-depth how this issue effects and drives the development
of devices or software. Provide at least one example. (Write at least 2 - 3 paragraphs)
Solution
Answer:
Personal privacy is the ability of an individual or group to seclude themselves, or information
about themselves from the face of the public or anyone else since probably that information is
inherently special or sensitive to them, (Oulasvirta, Suomalainen, Hamari, Lampinen, &
Karvonen, 2014), while on the other hand, public security is a function of a governments that
ensures the security of its citizens, organizations, and institutions against threats for their well-
being and to the prosperity of their communities.
Government and law enforcement officials have unprecedented powers to collect, correlate and
act upon mountains of digital data on individuals all in the name of public security. They
compromises privacy and demands access to protected information of people in the name of
preserving national security. However according to Privacy activists view such deep data mining
as an unjustified invasion of personal privacy, undermining civil liberties and eroding
longstanding constitutional protections, (Rothbard, 2011). There are a lot of advantages by
keeping an eye on everyone but when done so deep it takes away people’s privacy.
This tension has led to innovations in technologies on both hands, people are trying to find ways
to protect their personal information from the public or anyone else while still on the other hand
the government is trying to create new ways to gather private information. For example, in 2001
in United States, thermal imaging devices were invented to reveal previously unknown
information without a warrant.
A contemporary issue facing technology innovation today is the tension.docx

More Related Content

Similar to A contemporary issue facing technology innovation today is the tension.docx

E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal PrivacyEmerson Bryan
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Outline D
Outline DOutline D
Outline Dbutest
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityDon Edwards
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxtoltonkendal
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismUniversity of Sydney
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5mataharitimoer MT
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docxBHANU281672
 
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docxlorainedeserre
 
Big Data Analysis and Terrorism
Big Data Analysis and TerrorismBig Data Analysis and Terrorism
Big Data Analysis and TerrorismAmanda Tapp
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGZac Darcy
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextInfo_Studies_Aberystwyth
 

Similar to A contemporary issue facing technology innovation today is the tension.docx (13)

E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Outline D
Outline DOutline D
Outline D
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
 
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
 
Big Data Analysis and Terrorism
Big Data Analysis and TerrorismBig Data Analysis and Terrorism
Big Data Analysis and Terrorism
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice Context
 

More from ljohn878

A field F is called a prime field if it has no proper subfields- If E.docx
A field F is called a prime field if it has no proper subfields- If E.docxA field F is called a prime field if it has no proper subfields- If E.docx
A field F is called a prime field if it has no proper subfields- If E.docxljohn878
 
A heterogeneous top management team A- Relies on the similar nat.docx
A heterogeneous top management team       A- Relies on the similar nat.docxA heterogeneous top management team       A- Relies on the similar nat.docx
A heterogeneous top management team A- Relies on the similar nat.docxljohn878
 
A grand tour of four cities begins at CityAand makes successive stops.docx
A grand tour of four cities begins at CityAand makes successive stops.docxA grand tour of four cities begins at CityAand makes successive stops.docx
A grand tour of four cities begins at CityAand makes successive stops.docxljohn878
 
A function is given- Determine the average rate of change of the funct.docx
A function is given- Determine the average rate of change of the funct.docxA function is given- Determine the average rate of change of the funct.docx
A function is given- Determine the average rate of change of the funct.docxljohn878
 
A description about the tool used to perform the scan A list of identi.docx
A description about the tool used to perform the scan A list of identi.docxA description about the tool used to perform the scan A list of identi.docx
A description about the tool used to perform the scan A list of identi.docxljohn878
 
A CPA firm has audited the financial statements included in a Form S-1.docx
A CPA firm has audited the financial statements included in a Form S-1.docxA CPA firm has audited the financial statements included in a Form S-1.docx
A CPA firm has audited the financial statements included in a Form S-1.docxljohn878
 
Conduct an External Environmental Scan for your selected company- Iden.docx
Conduct an External Environmental Scan for your selected company- Iden.docxConduct an External Environmental Scan for your selected company- Iden.docx
Conduct an External Environmental Scan for your selected company- Iden.docxljohn878
 
Computing an average mark for four tests Design the algorithm and the.docx
Computing an average mark for four tests  Design the algorithm and the.docxComputing an average mark for four tests  Design the algorithm and the.docx
Computing an average mark for four tests Design the algorithm and the.docxljohn878
 
Computer Networks- Write either True or False 1- In LTE- a mobile devi.docx
Computer Networks- Write either True or False 1- In LTE- a mobile devi.docxComputer Networks- Write either True or False 1- In LTE- a mobile devi.docx
Computer Networks- Write either True or False 1- In LTE- a mobile devi.docxljohn878
 
Computation of weighted average shares outstanding during the year- J.docx
Computation of weighted average shares outstanding during the year-  J.docxComputation of weighted average shares outstanding during the year-  J.docx
Computation of weighted average shares outstanding during the year- J.docxljohn878
 
Comprehensive Problem 5 (Part Level Submission) On December 1- 2014- J.docx
Comprehensive Problem 5 (Part Level Submission) On December 1- 2014- J.docxComprehensive Problem 5 (Part Level Submission) On December 1- 2014- J.docx
Comprehensive Problem 5 (Part Level Submission) On December 1- 2014- J.docxljohn878
 
Completely classify liquid FeFe- Pure Substance Compound Mixture Eleme.docx
Completely classify liquid FeFe- Pure Substance Compound Mixture Eleme.docxCompletely classify liquid FeFe- Pure Substance Compound Mixture Eleme.docx
Completely classify liquid FeFe- Pure Substance Compound Mixture Eleme.docxljohn878
 
Complete the following table by calculating the missing entries and in.docx
Complete the following table by calculating the missing entries and in.docxComplete the following table by calculating the missing entries and in.docx
Complete the following table by calculating the missing entries and in.docxljohn878
 
Compare the models and information found with NonakaSolutiondeveloped.docx
Compare the models and information found with NonakaSolutiondeveloped.docxCompare the models and information found with NonakaSolutiondeveloped.docx
Compare the models and information found with NonakaSolutiondeveloped.docxljohn878
 
Compare the models and information found with NonakaSolutiondeveloped (2).docx
Compare the models and information found with NonakaSolutiondeveloped (2).docxCompare the models and information found with NonakaSolutiondeveloped (2).docx
Compare the models and information found with NonakaSolutiondeveloped (2).docxljohn878
 
Complete the following Java code such that it opens a file named Fruit.docx
Complete the following Java code such that it opens a file named Fruit.docxComplete the following Java code such that it opens a file named Fruit.docx
Complete the following Java code such that it opens a file named Fruit.docxljohn878
 
Compare the models and information found with NonakaSolutiondeveloped (1).docx
Compare the models and information found with NonakaSolutiondeveloped (1).docxCompare the models and information found with NonakaSolutiondeveloped (1).docx
Compare the models and information found with NonakaSolutiondeveloped (1).docxljohn878
 
Compare the models and information found with NonakaSolutiondeveloped (3).docx
Compare the models and information found with NonakaSolutiondeveloped (3).docxCompare the models and information found with NonakaSolutiondeveloped (3).docx
Compare the models and information found with NonakaSolutiondeveloped (3).docxljohn878
 
Compare and contrast the Internal Rate of Return (IRR)- the Net Presen.docx
Compare and contrast the Internal Rate of Return (IRR)- the Net Presen.docxCompare and contrast the Internal Rate of Return (IRR)- the Net Presen.docx
Compare and contrast the Internal Rate of Return (IRR)- the Net Presen.docxljohn878
 
Consider a system consisting of processes P1- P2- --- - P11- each of w.docx
Consider a system consisting of processes P1- P2- --- - P11- each of w.docxConsider a system consisting of processes P1- P2- --- - P11- each of w.docx
Consider a system consisting of processes P1- P2- --- - P11- each of w.docxljohn878
 

More from ljohn878 (20)

A field F is called a prime field if it has no proper subfields- If E.docx
A field F is called a prime field if it has no proper subfields- If E.docxA field F is called a prime field if it has no proper subfields- If E.docx
A field F is called a prime field if it has no proper subfields- If E.docx
 
A heterogeneous top management team A- Relies on the similar nat.docx
A heterogeneous top management team       A- Relies on the similar nat.docxA heterogeneous top management team       A- Relies on the similar nat.docx
A heterogeneous top management team A- Relies on the similar nat.docx
 
A grand tour of four cities begins at CityAand makes successive stops.docx
A grand tour of four cities begins at CityAand makes successive stops.docxA grand tour of four cities begins at CityAand makes successive stops.docx
A grand tour of four cities begins at CityAand makes successive stops.docx
 
A function is given- Determine the average rate of change of the funct.docx
A function is given- Determine the average rate of change of the funct.docxA function is given- Determine the average rate of change of the funct.docx
A function is given- Determine the average rate of change of the funct.docx
 
A description about the tool used to perform the scan A list of identi.docx
A description about the tool used to perform the scan A list of identi.docxA description about the tool used to perform the scan A list of identi.docx
A description about the tool used to perform the scan A list of identi.docx
 
A CPA firm has audited the financial statements included in a Form S-1.docx
A CPA firm has audited the financial statements included in a Form S-1.docxA CPA firm has audited the financial statements included in a Form S-1.docx
A CPA firm has audited the financial statements included in a Form S-1.docx
 
Conduct an External Environmental Scan for your selected company- Iden.docx
Conduct an External Environmental Scan for your selected company- Iden.docxConduct an External Environmental Scan for your selected company- Iden.docx
Conduct an External Environmental Scan for your selected company- Iden.docx
 
Computing an average mark for four tests Design the algorithm and the.docx
Computing an average mark for four tests  Design the algorithm and the.docxComputing an average mark for four tests  Design the algorithm and the.docx
Computing an average mark for four tests Design the algorithm and the.docx
 
Computer Networks- Write either True or False 1- In LTE- a mobile devi.docx
Computer Networks- Write either True or False 1- In LTE- a mobile devi.docxComputer Networks- Write either True or False 1- In LTE- a mobile devi.docx
Computer Networks- Write either True or False 1- In LTE- a mobile devi.docx
 
Computation of weighted average shares outstanding during the year- J.docx
Computation of weighted average shares outstanding during the year-  J.docxComputation of weighted average shares outstanding during the year-  J.docx
Computation of weighted average shares outstanding during the year- J.docx
 
Comprehensive Problem 5 (Part Level Submission) On December 1- 2014- J.docx
Comprehensive Problem 5 (Part Level Submission) On December 1- 2014- J.docxComprehensive Problem 5 (Part Level Submission) On December 1- 2014- J.docx
Comprehensive Problem 5 (Part Level Submission) On December 1- 2014- J.docx
 
Completely classify liquid FeFe- Pure Substance Compound Mixture Eleme.docx
Completely classify liquid FeFe- Pure Substance Compound Mixture Eleme.docxCompletely classify liquid FeFe- Pure Substance Compound Mixture Eleme.docx
Completely classify liquid FeFe- Pure Substance Compound Mixture Eleme.docx
 
Complete the following table by calculating the missing entries and in.docx
Complete the following table by calculating the missing entries and in.docxComplete the following table by calculating the missing entries and in.docx
Complete the following table by calculating the missing entries and in.docx
 
Compare the models and information found with NonakaSolutiondeveloped.docx
Compare the models and information found with NonakaSolutiondeveloped.docxCompare the models and information found with NonakaSolutiondeveloped.docx
Compare the models and information found with NonakaSolutiondeveloped.docx
 
Compare the models and information found with NonakaSolutiondeveloped (2).docx
Compare the models and information found with NonakaSolutiondeveloped (2).docxCompare the models and information found with NonakaSolutiondeveloped (2).docx
Compare the models and information found with NonakaSolutiondeveloped (2).docx
 
Complete the following Java code such that it opens a file named Fruit.docx
Complete the following Java code such that it opens a file named Fruit.docxComplete the following Java code such that it opens a file named Fruit.docx
Complete the following Java code such that it opens a file named Fruit.docx
 
Compare the models and information found with NonakaSolutiondeveloped (1).docx
Compare the models and information found with NonakaSolutiondeveloped (1).docxCompare the models and information found with NonakaSolutiondeveloped (1).docx
Compare the models and information found with NonakaSolutiondeveloped (1).docx
 
Compare the models and information found with NonakaSolutiondeveloped (3).docx
Compare the models and information found with NonakaSolutiondeveloped (3).docxCompare the models and information found with NonakaSolutiondeveloped (3).docx
Compare the models and information found with NonakaSolutiondeveloped (3).docx
 
Compare and contrast the Internal Rate of Return (IRR)- the Net Presen.docx
Compare and contrast the Internal Rate of Return (IRR)- the Net Presen.docxCompare and contrast the Internal Rate of Return (IRR)- the Net Presen.docx
Compare and contrast the Internal Rate of Return (IRR)- the Net Presen.docx
 
Consider a system consisting of processes P1- P2- --- - P11- each of w.docx
Consider a system consisting of processes P1- P2- --- - P11- each of w.docxConsider a system consisting of processes P1- P2- --- - P11- each of w.docx
Consider a system consisting of processes P1- P2- --- - P11- each of w.docx
 

Recently uploaded

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

A contemporary issue facing technology innovation today is the tension.docx

  • 1. A contemporary issue facing technology innovation today is the tension between personal privacy and public security. Discuss in-depth how this issue effects and drives the development of devices or software. Provide at least one example. (Write at least 2 - 3 paragraphs) Solution Answer: Personal privacy is the ability of an individual or group to seclude themselves, or information about themselves from the face of the public or anyone else since probably that information is inherently special or sensitive to them, (Oulasvirta, Suomalainen, Hamari, Lampinen, & Karvonen, 2014), while on the other hand, public security is a function of a governments that ensures the security of its citizens, organizations, and institutions against threats for their well- being and to the prosperity of their communities. Government and law enforcement officials have unprecedented powers to collect, correlate and act upon mountains of digital data on individuals all in the name of public security. They compromises privacy and demands access to protected information of people in the name of preserving national security. However according to Privacy activists view such deep data mining as an unjustified invasion of personal privacy, undermining civil liberties and eroding longstanding constitutional protections, (Rothbard, 2011). There are a lot of advantages by keeping an eye on everyone but when done so deep it takes away people’s privacy. This tension has led to innovations in technologies on both hands, people are trying to find ways to protect their personal information from the public or anyone else while still on the other hand the government is trying to create new ways to gather private information. For example, in 2001 in United States, thermal imaging devices were invented to reveal previously unknown information without a warrant.