CJUS 401_Chapter 15 Assignment

docx

School

Eastern New Mexico University *

*We aren’t endorsed by this school

Course

401

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

2

Uploaded by DannyR08

Report
Discussion Questions 1. How serious is the threat from abuses in the use of new technologies? The threat of abuse in the use of new technologies is heavily serious and should be treated as such. Though the development and uses of modern technology have been beneficial to all, new technologies still pose a threat to data and security. Developments in science and technology can be used for harmful purposes, such as computer hackers causing widespread disruption. Hackers can infiltrate high profile personnel and steal valuable information such as bank account information, private documents and many more. As the growth and development of new technologies grows, so does the risk of cyber-attacks. 2. How should new technologies be regulated? Can they be regulated? Yes, I believe new technologies can be regulated. New technologies can be regulated by following the common practice of the CIA Triad, which stands for confidentiality, integrity, and availability. New technologies products and services should follow strict protocols to protect the security of their product and their customers. This is to include privacy as well. Having a solid foundation of these three principles allows the product and company to thrive. 3. Is it sometimes necessary to sacrifice a few freedoms to protect national security and to ensure the long-term viability of civil liberty? In times of emergency, civil liberties can be lost, and I believe it is necessary to sacrifice a few freedoms to protect national security and ensure the long-term viability of civil liberties. In my opinion, in times of emergency such as the attacks on September 11, the loss of liberties and their absence become temporarily normalized and justified. I believe this to be true because the defense and protection of national security are at stake therefore more are willing to sacrifice to regain normality and security in their own country; their homes. 4. Should the same protocols be used for domestic electronic surveillance and foreign surveillance? Why? No, I don’t believe the same protocols can or should be used for domestic electronic surveillance and foreign surveillance. This is my opinion because I don’t believe that citizens of the United States should be controlled and or surveillance under a microscope like are foreign countries. Despite my opinion, I am not ignorant to the fact that their enemies within our own borders can be a potential threat. Because of this fact, I still believe that surveillance should only be acquired and used appropriately to resolve the matter, nothing more. I should feel safe with privacy and security within my own country. 5. What is the likelihood that new surveillance technologies will be used as tools of repression by authoritarian regimes in the near future? It is very much possible that the new surveillance technologies will be used as tools of repression by authoritarian regimes. The use of new surveillance technologies are being used now in present time. For example, countries like North Korea are already using modern technologies to repress citizens. Repression and control can be seen in various forms, such as control news outlet,
televising one controlled view of the story. Other forms of repression are the monitoring and control of citizen activities. New technologies can be used to control information gained or seen on the internet. These are just a few examples of the likelihood new surveillance technologies can do and have been doing in other countries.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help