Why Security Keeps Winning Out Over Privacy - Assignment

Added on - 21 Apr 2020

  • 6

    pages

  • 1300

    words

  • 0

    views

  • 0

    downloads

Showing pages 1 to 3 of 6 pages
Running head: WHY SECURITY KEEPS WINNING OUT OVER PRIVACYWhy security keeps winning out over privacyName of Student:Name of University:Author’s Note:
1WHY SECURITY KEEPS WINNING OUT OVER PRIVACYIntroduction:Security and Privacy both are vitally important and are an integral part of ay successfulsociety. The balance between the both the fundamentally important aspects of any individual’slife need to be attained at any cost. Privacy is basically the state or the condition of being freefrom being observed by other people. It also refers to the freedom with which a person canindulge in one’s likes and dislikes without facing any sort of interference. Security is basicallydefined as the state of being free from any sort of danger or threat. Often it so happens, that boththe terms are interchanged and due to these cases are misinterpreted.Introduction to the discussed article:The present article “Why security keeps winning out over Privacy” is related to thediscussion on the different arguments related to the preference of privacy over security.Theethical dilemma is real regarding which we need to value the most. The vendors and thetechnological firms also have a responsibility of protecting their customers’ data.Summary of the article:In the provided article different arguments and theories pertaining to the topic of Securityand privacy have been discussed.In connection to the safety and security measures, the all-or-nothing fallacy has been discussed which mentions that many people think that privacy needs tobe completely given up in order to ensure their security. However this should not be the case andprivacy should not lose out to security and it should be balanced and the convenience of thegovernment needs to be adjusted.
2WHY SECURITY KEEPS WINNING OUT OVER PRIVACYThe deference argument as mentioned in the article states that the evaluation of thesecurity measures by the security proponents should involve the court. There needs to be aresponsibility of the courts to balance the privacy against the security. The level of the securityprovided needs to be evaluated at all times (Phillips & Bostian, 2011, p 499).Another argument that has been mentioned in this connection is the pendulum argument.This basically refers to the fact that the moments of crisis are majorly related to the compromiseson an individual’s privacy. This argument states that once the situation in a particular countrygets back o normal and the tension reduces, the privacy issue is solved and there is no sort ofencroachment on a person’s personal space (Phillips & Bostian, 2011, p 499)The war-powers argument mentions the fact that the wiretapping of the phone calls needsto be managed properly as the weight of this task is huge. The president has virtually unlimitedpower but the proper utilisation of power is necessary. The legal system needs to be properlydevised so that the price of privacy w3hich the citizens have to pay is genuine. In cases when arule of law is ignored it will be extremely terrifying.The Luddite argument has been discussed in the article. It has been stated that the privacyproponents are basically Luddites who are afraid of new technology. New technologies likebiometric identification are favoured by government officials. Biometric identification allowspeople to be recognised by their physical characteristics like fingerprint, eye pattern and so onbut often these technologies are not fully mature (Phillips & Bostian, 2011, p 500).Despite the technology having promise, the entire amount of dependency on the softwareor the technological device is not good as the loss of data might lead to be in a totally negativesituation without any sort of information at hand. Another benefit of the present system of
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document