Chapter 1 SECURITY AT WHAT COST ?
نویسندگان
چکیده
In the presently heightened security environment in the United Kingdom there are a number of examples of policy that must strike a delicate balance between strengthening security and endangering civil liberties and personal privacy. The introduction of national identity cards and biometric passports, expansion of the National DNA Database and interdepartmental sharing of personal information raise a number of privacy issues. Human rights may also be suspended by the exercise of stop-andsearch powers by the police or the detention of suspects prior to trial. However, much of the current debate concerning civil liberties and security is adversarial, and little robust research data informs arguments on both sides. This paper outlines the results of a study that attempts to objectively understand the real privacy, liberty and security trade-offs made by individuals, so that policymakers can be better informed about the preferences of individuals with regard to these important issues.
منابع مشابه
Conceptualization of Baghy (Revolt) in the Interpretation of Verse Nine of Chapter Hujarat
Maintaining Islam and Islamic values depends on the existence of powerful Islamic sovereignty. Islamic sovereignty should be protected so that the five interests of the Islamic society i.e. intellect, religion, life, property and honor are not jeopardized. Verse nine of chapter Hujarat is one of the verses of the Qur'ān which refers to the necessity of peace in the Islamic society and the maint...
متن کاملSocial Cybersecurity
............................................................................................................................................... 2 ACKNOWLEDGEMENTS ........................................................................................................................ 3 CHAPTER 1: INTRODUCTION AND MOTIVATION ...........................................................................
متن کاملReport of the National Commission on Social Security Reform.
On January 20, 1983, the National Commission on Social Security Reform, established 13 months earlier to provide a bipartisan solution to the financing problems of the Social Security program, sent its recommendations to the President and the Congress. In the interest of making the Commission’s Report available to its readers, the Bulletin is reprinting all four chapters of that document in thi...
متن کاملSecurity for Ubiquitous Computing
Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes security challenging and what the risks predominant in ubiquitous computing are. The major part of this chapter is dedicated to the description of sample solutions in order to illustrate the wealth of protection mechanisms. A background in IT security ...
متن کاملCosts and Security in Clouds
Cloud computing has emerged as an important paradigm for deploying services and applications for both enterprises and end-users. In this chapter, we explore two important aspects of cloud computing – costs and security. We aim to answer two questions: (1) Is cloud computing a cost effective endeavor? (2) How much security can we afford in the cloud while maintaining the cost benefits of outsour...
متن کامل