StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

LOVE Individual privacy vs. national security - Essay Example

Cite this document
Summary
To counter these challenges, security agencies have proposed measures to intensify security. The individual privacy vs. national security research project will seek to establish…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
LOVE Individual privacy vs. national security
Read Text Preview

Extract of sample "LOVE Individual privacy vs. national security"

LOVE" Individual privacy vs. national security Following the September in US terrorist attacks, terrorism threat has been acknowledged as a reality. To counter these challenges, security agencies have proposed measures to intensify security. The individual privacy vs. national security research project will seek to establish whether the imposed anti-terrorism measure will compromise people’s freedom and privacy. This project will assist in evaluation of the level of democracy in the country.

Terrorism is a national as well as a global issue. This implies that compromise of individual privacy and freedom in pursuit of national security is a global as well as a national issue. The project will therefore utilize findings from the country to establish the severity of the issues on a global scale. Due to its scope and importance, the project will be conducted using primary sources such as journals, reports from various agencies and newspaper articles. Scholarly articles required in this project will be obtained from the library while relevant reports will be obtained from the concerned agencies.

Compromise of individual privacy in pursuit of national security existed before the September 11, attacks. At the heights of World War II, nearly 12,000 Japanese Americans were forced into concentration camps for reasons related to national security (ACLU, 2001). According to Avery (2004), the public feels that issues of national security compromise their privacy. Previous research findings on the issue have proved that intensification of surveillance by security agencies hamper formation of close relationships among people (Emanuel, 2004).

To enhance security, the government has authorized all telecom operators in the country to install systems that enable government agencies to access private communications. These preliminary findings will direct the research project. ReferencesACLU. (2001). Because freedom cannot protect itself, ACLU Press Release. [viewed February 12, 2012]Avery, G. (2004). Bioterrorism, Fear, and Public Health Reform: Matching a Policy Solution to the Wrong Window, Public Administration Review 64, no. 3: 275.Gross, E. (2004).

The struggle of a democracy against terrorism—Protection of human rights: The right to privacy versus the national interest—The proper balance, Cornell International Law Journal 37 (1), 27-32.Sunstein, C. R. (2003). Terrorism and probability neglect, Journal of Risk and Uncertainty, 26: 121-136

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“LOVE Individual privacy vs. national security Essay”, n.d.)
Retrieved from https://studentshare.org/english/1589181-love-individual-privacy-vs-national-security
(LOVE Individual Privacy Vs. National Security Essay)
https://studentshare.org/english/1589181-love-individual-privacy-vs-national-security.
“LOVE Individual Privacy Vs. National Security Essay”, n.d. https://studentshare.org/english/1589181-love-individual-privacy-vs-national-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF LOVE Individual privacy vs. national security

The Value of Digital Privacy in an Information Technology Age

Public sectors will have to avail highly developed technologies and security systems to manage the huge amount of information as well as threats.... The Value of Digital privacy in an Information Technology Age Name of Author Author's Affiliation Author Note Author's note with more information about affiliation, research grants, conflict of interest and how to contact 1....   This stores numerous reports including names, addresses, birth dates, court records, and cell phone numbers” (The Value of Digital privacy in an Information Technology Age, 2013, par....
4 Pages (1000 words) Research Paper

Personal and National Security

How far should we tread on personal and civil liberties to assure personal and national security?... NAME UNIVERSITY COURSE How far should we tread on personal and civil liberties to assure personal and national security?... national security is basically the security measures taken on the national level by the government in collaboration with the security agencies to ensure peace within the region.... How far should we tread on personal and civil liberties to assure personal and national security?...
3 Pages (750 words) Research Paper

Homeland Security and International Relations

Government officials and big players in various US industries agree that cyber-crime and cyber-terrorism are threatening national security as well as the economy of the US.... Topic: Homeland Information security Incentives Date: Overview Information and communication technology has advanced and become a tool that gives the security apparatus an edge in information gathering on intelligence.... To prevent this will call for protection of the internet space by implementing proper cyber security....
4 Pages (1000 words) Essay

The End of Privacy

The obtainment of personal information by FBI for national security purposes and the emphasis individuals are exerting on the privacy of their information.... ce, several bills have been presented before the Congress to retrieve this encrypted information for the national security means, as the security of state is integral than the privacy of few individuals.... These day to day technological tools may seem inevitable due to the ease and security they have produced for the mankind, but they have also posed a threat towards the civil liberty and personal privacy of many....
6 Pages (1500 words) Research Paper

The Idea of the Private Changes over Time

It states that: There shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others (Article 8) (Morrison, 2007) This law gives individuals the right to their privacy....
14 Pages (3500 words) Essay

Domestic Spying and Social Media

No one should ever have the moral authority to interfere with people's privacy, not even for the sake of national security.... For instance, the UK government has responded to a law suit brought to court by a civil rights agent about privacy by saying that the government has a right to carry out what they call legal spying.... I believe that it is obscene for the government to look through people's private information on social networks and phones because this goes against the constitutional right that guarantees privacy of individuals....
5 Pages (1250 words) Essay

Internet and Our Information Privacy

The paper "Internet security Debate Provoked by Invasive Techniques That Infringe on the Privacy Rights of Individuals" explores the privacy debate caused by intrusive techniques used by internet companies, governments, and individuals that infringe on the privacy rights of individuals.... hellip; Article 12 of the United Nations Charter defines privacy as the right of an individual to control his or her own individual information.... However, most people do not have an idea of how this information is used by the site owners and what it implies for their privacy....
9 Pages (2250 words) Literature review

Characteristics of Information Privacy

The paper "Characteristics of Information privacy" states that the internet brings up many issues of information privacy.... privacy over the internet is now a common news item with many questioning the right of internet companies like Facebook, Google, and Twitter to store and use personal information.... hellip; Internet social networks and email accounts have been subjected to hacking, therefore, violating the privacy of many individuals....
9 Pages (2250 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us