Privacy In Information Systems

Read Complete Research Material



Privacy in Information Systems

By

TABLE OF CONTENTS

LITERATURE REVIEW1

Introduction1

Privacy1

Concern1

Proof2

Caught in the Act2

Quality2

Printed in the record3

Private locations monitored3

Ethical and Social Issues in Privacy3

Arguments against privacy4

The Effect of the Law over CCTV surveillance5

Proposed Solution5

REFERENCES8

LITERATURE REVIEW

Introduction

This chapter of the research study provides the relevant literature that is previously written by various researchers on the legal, ethical and social issues related to the privacy of the information systems. The chapter is focused over the privacy concerns associated with CCTV surveillance and later the chapter concludes with the possible solutions to the issues being mentioned by various researchers.

Privacy

It is being said that currently we are living in the technological era and indeed, as it has been stated by various researchers that technology and science are playing key roles in holding the societies together and they are equally central in every kind of event that is threatening the stability. Technology and science are the platforms that are usually being used for seeking as a solution to various problems and on the other hand are becoming source for different problems as well. So, it is not surprising that we have a very optimist-pessimist and love-hate sort of a relationship with new technologies and that there are attempts of anticipation of problems that could be regulating against these earlier developments.

Concern

Privacy has always been an important issue and concern of people. The difficulty in defining privacy is that it is as much a concept as it is a thing, making it hard to define. (Newton and Holt, 2004, p. 147), a prominent consumer advocate, contends that privacy rests upon the principle of individuals having the ability to control their personal information. The concern that arises is the ever increasing nature of electronic media. To date the legal right to privacy defined by Warren and Brandeis has not been enacted into law in the United Kingdom.

Proof

The images are considered as a real element of proof. Today, there is indeed a system of freedom of the evidence providing is not prohibited and is used with lawful and fair means, explains Baase (2007). However, respect for privacy, which is controlled by the Commission for Protection of Privacy Act, has been scrupulously observed, the researcher continues. The images of these cameras in public places are available and cannot be used to find an adulterer.

Caught in the Act

Various researchers argue that the use of CCTV in public places must respect a number of principles. There is first the principle of transparency: that one should know, for example by placing a sticker, there is a camera. Security cameras can be used for the purpose for which they were placed. The principles of subsidiary and proportionality must be respected again. “If other evidence exist, such as a red-handed, it is not necessary to use them,” says Fafinski (2009).

Quality

The issue of exploitation arises. These images are not always top quality. With digital cameras, however, that quality is improving over time. That's when the judge (or jury in the case of Assizes) to ...
Related Ads