SlideShare a Scribd company logo
A contemporary issue facing technology innovation today is the tension between personal
privacy and public security. Discuss in-depth how this issue effects and drives the development
of devices or software. Provide at least one example. (Write at least 2 - 3 paragraphs)
Solution
Answer:
Personal privacy is the ability of an individual or group to seclude themselves, or information
about themselves from the face of the public or anyone else since probably that information is
inherently special or sensitive to them, (Oulasvirta, Suomalainen, Hamari, Lampinen, &
Karvonen, 2014), while on the other hand, public security is a function of a governments that
ensures the security of its citizens, organizations, and institutions against threats for their well-
being and to the prosperity of their communities.
Government and law enforcement officials have unprecedented powers to collect, correlate and
act upon mountains of digital data on individuals all in the name of public security. They
compromises privacy and demands access to protected information of people in the name of
preserving national security. However according to Privacy activists view such deep data mining
as an unjustified invasion of personal privacy, undermining civil liberties and eroding
longstanding constitutional protections, (Rothbard, 2011). There are a lot of advantages by
keeping an eye on everyone but when done so deep it takes away people’s privacy.
This tension has led to innovations in technologies on both hands, people are trying to find ways
to protect their personal information from the public or anyone else while still on the other hand
the government is trying to create new ways to gather private information. For example, in 2001
in United States, thermal imaging devices were invented to reveal previously unknown
information without a warrant.
A contemporary issue facing technology innovation today is the tension.docx

More Related Content

Similar to A contemporary issue facing technology innovation today is the tension.docx

E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
Emerson Bryan
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Outline D
Outline DOutline D
Outline Dbutest
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
Don Edwards
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
toltonkendal
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
University of Sydney
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5
mataharitimoer MT
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
whittemorelucilla
 
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
BHANU281672
 
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
lorainedeserre
 
Big Data Analysis and Terrorism
Big Data Analysis and TerrorismBig Data Analysis and Terrorism
Big Data Analysis and TerrorismAmanda Tapp
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
Zac Darcy
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice Context
Info_Studies_Aberystwyth
 

Similar to A contemporary issue facing technology innovation today is the tension.docx (13)

E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Outline D
Outline DOutline D
Outline D
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
 
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
 
Big Data Analysis and Terrorism
Big Data Analysis and TerrorismBig Data Analysis and Terrorism
Big Data Analysis and Terrorism
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
 
Privacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice ContextPrivacy in a Human Rights and Social Justice Context
Privacy in a Human Rights and Social Justice Context
 

More from ljohn878

A field F is called a prime field if it has no proper subfields- If E.docx
A field F is called a prime field if it has no proper subfields- If E.docxA field F is called a prime field if it has no proper subfields- If E.docx
A field F is called a prime field if it has no proper subfields- If E.docx
ljohn878
 
A heterogeneous top management team A- Relies on the similar nat.docx
A heterogeneous top management team       A- Relies on the similar nat.docxA heterogeneous top management team       A- Relies on the similar nat.docx
A heterogeneous top management team A- Relies on the similar nat.docx
ljohn878
 
A grand tour of four cities begins at CityAand makes successive stops.docx
A grand tour of four cities begins at CityAand makes successive stops.docxA grand tour of four cities begins at CityAand makes successive stops.docx
A grand tour of four cities begins at CityAand makes successive stops.docx
ljohn878
 
A function is given- Determine the average rate of change of the funct.docx
A function is given- Determine the average rate of change of the funct.docxA function is given- Determine the average rate of change of the funct.docx
A function is given- Determine the average rate of change of the funct.docx
ljohn878
 
A description about the tool used to perform the scan A list of identi.docx
A description about the tool used to perform the scan A list of identi.docxA description about the tool used to perform the scan A list of identi.docx
A description about the tool used to perform the scan A list of identi.docx
ljohn878
 
A CPA firm has audited the financial statements included in a Form S-1.docx
A CPA firm has audited the financial statements included in a Form S-1.docxA CPA firm has audited the financial statements included in a Form S-1.docx
A CPA firm has audited the financial statements included in a Form S-1.docx
ljohn878
 
Conduct an External Environmental Scan for your selected company- Iden.docx
Conduct an External Environmental Scan for your selected company- Iden.docxConduct an External Environmental Scan for your selected company- Iden.docx
Conduct an External Environmental Scan for your selected company- Iden.docx
ljohn878
 
Computing an average mark for four tests Design the algorithm and the.docx
Computing an average mark for four tests  Design the algorithm and the.docxComputing an average mark for four tests  Design the algorithm and the.docx
Computing an average mark for four tests Design the algorithm and the.docx
ljohn878
 
Computer Networks- Write either True or False 1- In LTE- a mobile devi.docx
Computer Networks- Write either True or False 1- In LTE- a mobile devi.docxComputer Networks- Write either True or False 1- In LTE- a mobile devi.docx
Computer Networks- Write either True or False 1- In LTE- a mobile devi.docx
ljohn878
 
Computation of weighted average shares outstanding during the year- J.docx
Computation of weighted average shares outstanding during the year-  J.docxComputation of weighted average shares outstanding during the year-  J.docx
Computation of weighted average shares outstanding during the year- J.docx
ljohn878
 
Comprehensive Problem 5 (Part Level Submission) On December 1- 2014- J.docx
Comprehensive Problem 5 (Part Level Submission) On December 1- 2014- J.docxComprehensive Problem 5 (Part Level Submission) On December 1- 2014- J.docx
Comprehensive Problem 5 (Part Level Submission) On December 1- 2014- J.docx
ljohn878
 
Completely classify liquid FeFe- Pure Substance Compound Mixture Eleme.docx
Completely classify liquid FeFe- Pure Substance Compound Mixture Eleme.docxCompletely classify liquid FeFe- Pure Substance Compound Mixture Eleme.docx
Completely classify liquid FeFe- Pure Substance Compound Mixture Eleme.docx
ljohn878
 
Complete the following table by calculating the missing entries and in.docx
Complete the following table by calculating the missing entries and in.docxComplete the following table by calculating the missing entries and in.docx
Complete the following table by calculating the missing entries and in.docx
ljohn878
 
Compare the models and information found with NonakaSolutiondeveloped.docx
Compare the models and information found with NonakaSolutiondeveloped.docxCompare the models and information found with NonakaSolutiondeveloped.docx
Compare the models and information found with NonakaSolutiondeveloped.docx
ljohn878
 
Compare the models and information found with NonakaSolutiondeveloped (2).docx
Compare the models and information found with NonakaSolutiondeveloped (2).docxCompare the models and information found with NonakaSolutiondeveloped (2).docx
Compare the models and information found with NonakaSolutiondeveloped (2).docx
ljohn878
 
Complete the following Java code such that it opens a file named Fruit.docx
Complete the following Java code such that it opens a file named Fruit.docxComplete the following Java code such that it opens a file named Fruit.docx
Complete the following Java code such that it opens a file named Fruit.docx
ljohn878
 
Compare the models and information found with NonakaSolutiondeveloped (1).docx
Compare the models and information found with NonakaSolutiondeveloped (1).docxCompare the models and information found with NonakaSolutiondeveloped (1).docx
Compare the models and information found with NonakaSolutiondeveloped (1).docx
ljohn878
 
Compare the models and information found with NonakaSolutiondeveloped (3).docx
Compare the models and information found with NonakaSolutiondeveloped (3).docxCompare the models and information found with NonakaSolutiondeveloped (3).docx
Compare the models and information found with NonakaSolutiondeveloped (3).docx
ljohn878
 
Compare and contrast the Internal Rate of Return (IRR)- the Net Presen.docx
Compare and contrast the Internal Rate of Return (IRR)- the Net Presen.docxCompare and contrast the Internal Rate of Return (IRR)- the Net Presen.docx
Compare and contrast the Internal Rate of Return (IRR)- the Net Presen.docx
ljohn878
 
Consider a system consisting of processes P1- P2- --- - P11- each of w.docx
Consider a system consisting of processes P1- P2- --- - P11- each of w.docxConsider a system consisting of processes P1- P2- --- - P11- each of w.docx
Consider a system consisting of processes P1- P2- --- - P11- each of w.docx
ljohn878
 

More from ljohn878 (20)

A field F is called a prime field if it has no proper subfields- If E.docx
A field F is called a prime field if it has no proper subfields- If E.docxA field F is called a prime field if it has no proper subfields- If E.docx
A field F is called a prime field if it has no proper subfields- If E.docx
 
A heterogeneous top management team A- Relies on the similar nat.docx
A heterogeneous top management team       A- Relies on the similar nat.docxA heterogeneous top management team       A- Relies on the similar nat.docx
A heterogeneous top management team A- Relies on the similar nat.docx
 
A grand tour of four cities begins at CityAand makes successive stops.docx
A grand tour of four cities begins at CityAand makes successive stops.docxA grand tour of four cities begins at CityAand makes successive stops.docx
A grand tour of four cities begins at CityAand makes successive stops.docx
 
A function is given- Determine the average rate of change of the funct.docx
A function is given- Determine the average rate of change of the funct.docxA function is given- Determine the average rate of change of the funct.docx
A function is given- Determine the average rate of change of the funct.docx
 
A description about the tool used to perform the scan A list of identi.docx
A description about the tool used to perform the scan A list of identi.docxA description about the tool used to perform the scan A list of identi.docx
A description about the tool used to perform the scan A list of identi.docx
 
A CPA firm has audited the financial statements included in a Form S-1.docx
A CPA firm has audited the financial statements included in a Form S-1.docxA CPA firm has audited the financial statements included in a Form S-1.docx
A CPA firm has audited the financial statements included in a Form S-1.docx
 
Conduct an External Environmental Scan for your selected company- Iden.docx
Conduct an External Environmental Scan for your selected company- Iden.docxConduct an External Environmental Scan for your selected company- Iden.docx
Conduct an External Environmental Scan for your selected company- Iden.docx
 
Computing an average mark for four tests Design the algorithm and the.docx
Computing an average mark for four tests  Design the algorithm and the.docxComputing an average mark for four tests  Design the algorithm and the.docx
Computing an average mark for four tests Design the algorithm and the.docx
 
Computer Networks- Write either True or False 1- In LTE- a mobile devi.docx
Computer Networks- Write either True or False 1- In LTE- a mobile devi.docxComputer Networks- Write either True or False 1- In LTE- a mobile devi.docx
Computer Networks- Write either True or False 1- In LTE- a mobile devi.docx
 
Computation of weighted average shares outstanding during the year- J.docx
Computation of weighted average shares outstanding during the year-  J.docxComputation of weighted average shares outstanding during the year-  J.docx
Computation of weighted average shares outstanding during the year- J.docx
 
Comprehensive Problem 5 (Part Level Submission) On December 1- 2014- J.docx
Comprehensive Problem 5 (Part Level Submission) On December 1- 2014- J.docxComprehensive Problem 5 (Part Level Submission) On December 1- 2014- J.docx
Comprehensive Problem 5 (Part Level Submission) On December 1- 2014- J.docx
 
Completely classify liquid FeFe- Pure Substance Compound Mixture Eleme.docx
Completely classify liquid FeFe- Pure Substance Compound Mixture Eleme.docxCompletely classify liquid FeFe- Pure Substance Compound Mixture Eleme.docx
Completely classify liquid FeFe- Pure Substance Compound Mixture Eleme.docx
 
Complete the following table by calculating the missing entries and in.docx
Complete the following table by calculating the missing entries and in.docxComplete the following table by calculating the missing entries and in.docx
Complete the following table by calculating the missing entries and in.docx
 
Compare the models and information found with NonakaSolutiondeveloped.docx
Compare the models and information found with NonakaSolutiondeveloped.docxCompare the models and information found with NonakaSolutiondeveloped.docx
Compare the models and information found with NonakaSolutiondeveloped.docx
 
Compare the models and information found with NonakaSolutiondeveloped (2).docx
Compare the models and information found with NonakaSolutiondeveloped (2).docxCompare the models and information found with NonakaSolutiondeveloped (2).docx
Compare the models and information found with NonakaSolutiondeveloped (2).docx
 
Complete the following Java code such that it opens a file named Fruit.docx
Complete the following Java code such that it opens a file named Fruit.docxComplete the following Java code such that it opens a file named Fruit.docx
Complete the following Java code such that it opens a file named Fruit.docx
 
Compare the models and information found with NonakaSolutiondeveloped (1).docx
Compare the models and information found with NonakaSolutiondeveloped (1).docxCompare the models and information found with NonakaSolutiondeveloped (1).docx
Compare the models and information found with NonakaSolutiondeveloped (1).docx
 
Compare the models and information found with NonakaSolutiondeveloped (3).docx
Compare the models and information found with NonakaSolutiondeveloped (3).docxCompare the models and information found with NonakaSolutiondeveloped (3).docx
Compare the models and information found with NonakaSolutiondeveloped (3).docx
 
Compare and contrast the Internal Rate of Return (IRR)- the Net Presen.docx
Compare and contrast the Internal Rate of Return (IRR)- the Net Presen.docxCompare and contrast the Internal Rate of Return (IRR)- the Net Presen.docx
Compare and contrast the Internal Rate of Return (IRR)- the Net Presen.docx
 
Consider a system consisting of processes P1- P2- --- - P11- each of w.docx
Consider a system consisting of processes P1- P2- --- - P11- each of w.docxConsider a system consisting of processes P1- P2- --- - P11- each of w.docx
Consider a system consisting of processes P1- P2- --- - P11- each of w.docx
 

Recently uploaded

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
JezreelCabil2
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 

Recently uploaded (20)

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 

A contemporary issue facing technology innovation today is the tension.docx

  • 1. A contemporary issue facing technology innovation today is the tension between personal privacy and public security. Discuss in-depth how this issue effects and drives the development of devices or software. Provide at least one example. (Write at least 2 - 3 paragraphs) Solution Answer: Personal privacy is the ability of an individual or group to seclude themselves, or information about themselves from the face of the public or anyone else since probably that information is inherently special or sensitive to them, (Oulasvirta, Suomalainen, Hamari, Lampinen, & Karvonen, 2014), while on the other hand, public security is a function of a governments that ensures the security of its citizens, organizations, and institutions against threats for their well- being and to the prosperity of their communities. Government and law enforcement officials have unprecedented powers to collect, correlate and act upon mountains of digital data on individuals all in the name of public security. They compromises privacy and demands access to protected information of people in the name of preserving national security. However according to Privacy activists view such deep data mining as an unjustified invasion of personal privacy, undermining civil liberties and eroding longstanding constitutional protections, (Rothbard, 2011). There are a lot of advantages by keeping an eye on everyone but when done so deep it takes away people’s privacy. This tension has led to innovations in technologies on both hands, people are trying to find ways to protect their personal information from the public or anyone else while still on the other hand the government is trying to create new ways to gather private information. For example, in 2001 in United States, thermal imaging devices were invented to reveal previously unknown information without a warrant.