THE VALUE OF DIGITAL PRIVACY
IN AN INFORMATION TECHNOLOGY AGE.
BY: JERMAINE WEST
1)
1) List and describe at least three (3) technologies that allow an individual to research citizens’ private data.
The first technology that is looked into is cloud computing. Cloud computing in
General is for anything that involves delivering hosted services over the internet. These services are broadly divided into three categories: Infrastructure-as-a Service (IaaS), Platforn-as-a Service (Paas) and Software-as-a Service (SaaS). The name cloud computing was inspired by the cloud symbol that’s often used to represent the internet flowcharts and diagrams. (Search Cloud Computing by Margaret Rouse: Dec 2010) A second form of technology that has been around is Facial Recognition technology. Facial recognition has been around for three decades. But mobile and social revolutions are rapidly driving the field forward, as digital photos proliferate, cloud computing powers accelerate and software capabilities advance. Tech giants including Google, Apple, Microsoft, and Yahoo also employ facial recognition technology in photo, video and gaming products, as do a handful of lesser known mobile application companies. Facial recognition is a computer application for automatically identifying of verifying a person from digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features rom the image and a facial database. The third form of technology that is being used is called Detective Mode. The Federal Trade Commission (FTC) said “a software company called DesignWare sold a 2)
Program that helped rent-to-own stores track and recover rented computers. The software contained a program known as “Detective Mode” that tracked renter locations and collected payments from them if the computer was not returned”, the FTC said.
The program could log
References: Search Cloud Computing by Margaret Rouse: Copyright Dec 2010 Information Commissioner’s Office (ICO) Website, What Security Measures Should I take To Protect the Personal Data I Hold? Opposing Views Website Patriot Act: Pros and Cons By: Alex Groberman copyright May 30, 2011 EPIC. Org (Electronic Privacy Information Center)