1. To what extent has technology had an impact on both privacy and security in your country? (Nov...

Get Started. It's Free
or sign up with your email address
Rocket clouds
1. To what extent has technology had an impact on both privacy and security in your country? (Nov 2009) by Mind Map: 1. To what extent has technology had an impact on both privacy and security in your country? (Nov 2009)

1. Less hassle for teachers. Save the environment also because no need to print attendance sheet for every class while still being able to ensure who is present for school

2. Eg. New radar systems with greater range and identification abilities would be able to detect probes or UAVs of other countries, and if need be shoot them down. Thus maintaining the privacy of Singapore and Singaporeans.

3. Eg. Predator UAVs allow spying of enemy positions without compromising the safety of service personnel and by constantly monitoring the activities of potential threats, are able to remove the threat when it materialises thus saving innocent civilian lives

4. Biometrics Identification Security http://www.nec.com/global/onlinetv/en/society/e_pass_l.html

4.1. Introduction of biometric passports(e-passports)

4.1.1. The new system means that if a passport number and thumbprint does not match at the security gates, the security services can be automatically alerted

4.1.1.1. This state-of-the art security solution will restrict the space for terrorist movements by tightening passport controls and border surveillance.

4.1.1.1.1. Security

4.1.1.1.2. Privacy

4.2. eIACS – Enhanced Immigration Automated Clearance System

4.2.1. A futuristic technology that allows Singapore citizens to make use of their machine-readable passports for automated clearance

5. Transport System

5.1. Bus

5.2. Mass Rapid Transport

5.2.1. Capabilities of closed circuit televisions (CCTVs)

5.2.1.1. Security

5.2.1.1.1. Fight Crime

5.2.1.1.2. Terrorism

5.2.1.1.3. Strong psychological deterrent effect

5.2.1.1.4. Provides Police with valuable real time information to apprehend offenders without undue delay

5.2.1.1.5. Set on areas with high incidence of cimes

5.2.1.1.6. Detect suspicious behaviours and activites

5.2.1.2. Privacy

5.2.1.2.1. People have no liberty to do what they want

5.2.1.2.2. Every moment of a person's life is captured

5.2.1.2.3. Deprived of human rights

5.2.1.2.4. Intimate scenes may be captured on tape

5.2.1.2.5. Foreigners may not be able to tolerate such infringment of privacy which would inevitably inflict a poor image on Singapore

5.3. Airport

5.3.1. Metal Detector

5.3.1.1. Security

5.3.1.1.1. Prevent weapons to be brought on board

5.3.1.1.2. Ensure safety of the passengers

5.3.2. X-Ray machines

5.3.2.1. Security

5.3.2.1.1. Prevent chemicals to be brought on board

5.3.2.1.2. Prevent explosive to be broought on board

5.3.2.2. Privacy

5.3.2.2.1. Personal items are seen

5.3.2.2.2. No control as to what one can bring on board

5.4. Operates in an open environment

5.4.1. Commuters could switch from one mode of transport to another with ease

5.4.1.1. Vulnerable and favourable terrorist target

5.4.2. Highly integrated

5.5. New node

5.6. New node

5.6.1. New node

6. How technology promotes security and its implications - 3rd Gen SAF

6.1. New tech has improved information transfer allowing commanders to see the battlefield with greater clarity allowing them to make more informed decisions thus reducing casualties and ensuring peace ensues in the region

6.2. Improved technology improves privacy as the technology is used to counter the monitoring of actions and movements of individuals in Singapore thus allow Singapore to maintain an advantage be it in economic or military applications

7. How schools use technology for security and how it affects rivacy

7.1. eg.: School: VJ

7.1.1. Technology used: Fingerprinting

7.1.1.1. Security: Can keep track of everyone who is inside the school

7.1.1.1.1. Implication: Ability of teachers and school administrators to keep track of who is inside the school - in the event of fire or fire drill, easy to account for missing people

7.1.1.2. Privacy: The school administration has a record of the arrival time of everyone

7.1.1.2.1. The fingerprints are an individuals personal identity

7.1.1.2.2. By possesing a database of all students fingerprints, the school has within its power to use it against the student

7.2. New node

8. How technology helped to solve crime thus ensuring security - xin chen

8.1. Technology has invented new methods of investigations and procedures that helped to solve crime case at a much higher efficiency, and also to prevent crime from occurring.

8.1.1. Handphone IMEI Tracing System

8.1.1.1. Helps to deter handphone thieves from selling their stolen handphones to the public and/or secondhand dealers

8.1.1.1.1. By screeing the handphone's IMEI number, buyers can see if the phone is reported stolen or lost

8.1.2. Computer forensics

8.1.2.1. can be used to track emails, instant messaging and just about any other form of computer related communications.

8.1.2.1.1. can be used to hunt down illegal money transactions, also attacking drug dealers by tracking their communication records.

8.1.2.1.2. can be used to protect privacy as any changes to things such as bank accounts, company account and networking siting can be tracked down using computer forensics.

8.1.3. DNA database

8.1.3.1. used by law enforcement agencies to identify suspects of crimes.

8.1.3.1.1. this helps in crim e prevention as anyone who has committed crimes will have their DNA stored in police's database. They will be identified immedaitely just by comparing the DNA samples.