Expert answer:please see attached
discussion_post_5.docx
Unformatted Attachment Preview
1. Government and private sector databases contain personal identifying information
and historical records about residents of the US. Proposals for a national
identification system arise regularly. Privacy advocates express concern about
potential misuses of a national identification system. Considering this information
with that from your textbook and external readings, please comment on the
following:
o Cite “pros and cons” stemming from a national identification system.
o Will the benefits of a national identification system countermand violations
of individual privacy invasive surveillance?
o Cite programs and systems in use today posing threats to personal privacy
and security.
o What are the implications for the long term storage and later use of historical
data?
2. Databases contain sensitive personal information about citizens and residents in the
U.S. (and elsewhere). In decades past, this capability was largely under the control of
the private sector. Insurance companies, credit reporting agencies, banks, and other
commercial entities regularly compiled this data and shared it “for business
purposes”. In the past, the threat to individual privacy stemmed from these sources
(because of the perceived lack of controls). As well, citizens and residents worried
about Governmental access to and abuses of privacy data. Today, we face different
challenges. Now, the Government can access Governmental and key private sector
systems easily stemming from integration efforts since 9-11 and the Snowden NSA
revealations. New initiatives for oversight and surveillance are proposed regularly.
This causes many to worry in our post 9-11/NSA environment that the Government
has too much power that is too easily abused or misused.
o Will privacy data matter in the future?
o Is it already too late to control invasions of our privacy given the explosion of
databases and surveillance technologies?
o Will we continue to waive our rights from monitoring every time we agree to
use a new technology?
For example: cell phones used to be solely radio-telephones. Now, they have GPS’ built into them
making them personal tracking devices of movements.
Example #2: future medical procedures will involve embedding novel technology devices in our
bodies for monitoring, healing, etc. Insurance companies may require us to grant them access to
all that we do with our bodies involving these novel tech. procedures to “cover their interests
about our qualification for insurability”).
3. Discuss a current case involving privacy.
…
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more