Introduction
For this assignment, I will analyze at least three different research methodologies that I would consider relevant to the information security in ambient intelligence and the proposed solution that I have formulated, noting the general limitations of your research study. After I have analyzed the three methodologies, I will choose one of the methodologies to use in the study, and state the reasons that I made the choice, citing research for support in your decision.
Ambient intelligence
The emerging ubiquitous information society also known as ambient intelligence, ubiquitous networking, or pervasive computing raises content dependent concerns of trust and privacy issues). Ambient intelligence an approach that combines intelligence user interfaces and ubiquitous computing (Brey, 2006). While some call ambient intelligence more human version of ubiquitous computing and maybe the successor an information technology aimed at integrating computation into the environment to computing everywhere embedded in objectives in an unobtrusive and invisible way (Brey, 2006).
Privacy and fair information practices in ubiquitous environments
Responsive to the presence of people through intelligent and friendly user interfaces including being aware of the environment describes ambient intelligence (AmI) an extension of ubiquitous computing describing digital environments (Karyda, Gritzalis, Park, & Kokplakis, 2009). AmI environments focus on user interactions with electronic devices including a primary concern being the empowerment of humans in their everyday life to improve through the interaction of smart environments resulting in improved cost savings an, time and increased convenience, along with security, more entertainment...
... middle of paper ...
...nto step as Shining light on Ambient intelligence.
Conclusion
For this assignment, I analyzed at least three different research methodologies that I would consider relevant to the information security in ambient intelligence and the proposed solution that formulated, noting the general limitations of your research study. I chose one of the methodologies to use in the study, and stated the reasons that I made the choice, citing research for support in your decision. Ambient intelligence is a very interesting subject, but I agree it has a dark side. My degree is for Information Security because I am a very private person, one of those people who would not dare have a web cam; and only use face book as a way of staying in touch with my family, do not take self-photos, and no profile listed check it once a month. I do not like the idea of invasion of privacy rights.
"Security & Surveillance." Center for Democracy & Technology. Center for Democracy & Technology, 2013. Web. 08 Feb. 2014.
The twenty first century in the century of technology, where technology is heavily used in the people daily lives. One of the field where technology is being utilized in is monitoring people through cameras and phone calls. Although it might be interfering with people privacy, but it has its advantages that might outweigh the disadvantages. This essay will discuss both points of view, and try to decide which one is more reasonable than the other.
The feeling that someone is always watching, develops the inevitable, uncomfortable feeling that is displeasing to the mind. For years, the National Security Agency (NSA) has been monitoring people for what they call, “the greater good of the people” (Cole, February 2014). A program designed to protect the nation while it protects the walls within as it singles people out, sometimes by accident. Whether you are a normal citizen or a possible terrorist, the NSA can monitor you in a variation of ways. The privacy of technology has sparked debates across the world as to if the NSA is violating personal rights to privacy by collecting personal data such as, phone calls and text messages without reason or authorization (Wicker, 2011). Technology plays a key role in society’s day to day life. In life, humans expect privacy, even with their technology. In recent news, Edward Snowden leaked huge pieces from the NSA to the public, igniting these new controversies. Now, reforms are being pressed against the government’s throat as citizens fight for their rights. However, American citizens are slammed with the counterargument of the innocent forte the NSA tries to pass off in claims of good doing, such as how the NSA prevents terrorism. In fear of privacy violations, limitations should be put on the NSA to better protect the privacy of our honest citizens.
Computers, tablets, cellphones and all modern tenchnology has decrease our expectations of privacy in this digital age. People don't care anyone for their privacy, they only want the benefits that modern technology has brought to them. In the essay, “Privacy is Overrated” by David Plotz (2003), argues that it is sometimes good to be open and not be bother by privacy. In Jack Shafer's (2010) essay, “The Invasion of the Cookie Monster” he argues that we are the ones to be blame for the lost of our online privacy. The didgital age has created an extremely big problem of privacy for people.
Rosen, David. Four ways your privacy is being invaded. 11 september 2012. 13 february 2014 .
Ever since day one, people have been developing and creating all sorts of new methods and machines to help better everyday life in one way or another. Who can forget the invention of the ever-wondrous telephone? And we can’t forget how innovative and life-changing computers have been. However, while all machines have their positive uses, there can also be many negatives depending on how one uses said machines, wiretapping in on phone conversations, using spyware to quietly survey every keystroke and click one makes, and many other methods of unwanted snooping have arisen. As a result, laws have been made to make sure these negative uses are not taken advantage of by anyone. But because of how often technology changes, how can it be known that the laws made so long ago can still uphold proper justice? With the laws that are in place now, it’s a constant struggle to balance security with privacy. Privacy laws should be revised completely in order to create a better happy medium between security and privacy. A common misconception of most is that a happy medium of privacy and security is impossible to achieve. However, as well-said by Daniel Solove, “Protecting privacy doesn’t need to mean scuttling a security measure. Most people concerned about the privacy implications of government surveillance aren’t arguing for no[sic] surveillance and absolute privacy. They’d be fine giving up some privacy as long as appropriate controls, limitations, oversight and accountability mechanisms were in place.”(“5 Myths about Privacy”)
The computer is considered one of the most important technological advances of the twentieth century. Security and privacy issues have been in existence long before the computer became a vital component of organizations' operations. Nevertheless, the operating features of a computer make it a double-edged sword. Computer technologies with reliable error detection and recording capabilities, permit the invasion of a supposedly secure environment to occur on a grand scale and go undetected. Furthermore, computer and communications technology permit the invasion of a persons' privacy and likewise go undetected. Two forces threaten privacy: one, the growth of information technology with its enhanced capacity for surveillance, communication, computation, storage and retrieval and two, the more insidious threat, the increased value of information in decision making. Information has become more vital in the competitive environment, thus, decision makers covet it even if it viol!
The world erupted in outrage following revelations by Edward Snowden regarding the extent of surveillance perform by the National Security Agency. Privacy becomes one of the hottest topic of 2013 and was chosen by the world’s most popular online dictionary, Dictionary.com, as the Word of the Year. However, the government is not the only one that conduct data gathering and surveillance. Employers often monitor their employees, and businesses collect data on theirs customer. The morality of these practices is a topic that generates heated debate.
Physical security cannot be wholly successful without the human factor element and the active support of these user groups. For example, when the aim is to protect a critical facility from attack or to provide access control for an office building it is necessary to engage people on the proper use of any security systems that are in place, for instance security alarms. If the alarm goes off and employees have no idea what it signifies
Privacy threats are currently the biggest threat to National Security today. The threats are not only concerning to the government, however. An alarming 92% of Americans are concerned that the power grid may be vulnerable to a cyber-attack (Denholm). Although this is a more recent development to the cyber threats we have experienced, this is not the first time that privacy threats have stepped into the limelight as people are forced to watch their every online move.
In this new era of the Internet, most people use the Internet to acquire information of one kind or other. But what these people are not aware of is that the Internet is collecting information about them. Every time we get onto the Internet there might be a compromise of privacy of our personal information. The information flows both ways. With every clock of the mouse on a hyperlink, or an addition to the mailing list, someone out there might be gathering information about us. This raises the seriousness of privacy of our information on the Internet.
Powell, Robert. "Four Ways Technology Invades Your Privacy." Lovemoney.com. N.p., 5 Oct. 2011. Web. 15 Apr. 2014.
The way we interact with the world around us has developed significantly since the first desktop computers. First access to the internet for general, public use was really only available to those who were able to afford the large, expensive desktop computer systems, but as computing evolved and smaller, higher performing systems were becoming more available and affordable, our dependence on having this connection to the internet was also developing. The trend continues to grow with the conti...
The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad. The following report will provide you guidance about auditing and hardening techniques applied though the 7 Domains by utilizing IT Security Best Practices.
While much research into the specific causes and effects of different applications, sites, and devices is still needed there is sufficient evidence to support the research and weigh the consequences of the effect of technology on privacy. The issue of privacy walks a fine line between having freedoms and losing freedoms. “Siitis’s most crucial insight is that privacy can both support and undermine democracy.” (Morozov 2013) The focus for further development and research would be a probe into the personal desires of people to maintain their privacy and the consequences for those who did not.