To what extent has technology had an impact on both privacy and security in your country?

Get Started. It's Free
or sign up with your email address
To what extent has technology had an impact on both privacy and security in your country? by Mind Map: To what extent has technology had an impact on both privacy and security in your country?

1. FOR: Technology has a large impact on both privacy and security in your country

1.1. As technology has advanced, the way in which privacy is protected and violated has changed with it

1.1.1. Privacy law

1.1.2. Intellectual Property Rights

1.1.3. Cyberthief/hacker

1.1.3.1. "phishing" scams - hyperlinks take users to phony sites posing as legitimate banks and credit card companies for the purpose of stealing passwords and account information.

1.2. Security

1.2.1. Breaching Security

1.2.1.1. Modern telecommunications have given criminal networks to move people, money and goods across our borders with greater ease than before.

1.2.1.2. People who make racially discriminating remarks on their blog, ie teenager who flame other races, may create discord between races in the country as countless people may access the internet daily, hence causing it to be a threat to security

1.3. Technology impacts security Singapore as it may unintentionally expose sensitive information on the web

1.3.1. Via the use of Google Maps/ Google Earth, the world is literally at the fingertips of anyone who is looking for information.

1.3.1.1. Terrorists can plot their movements by viewing these maps

1.4. Better military forces and protection increasing state security

1.4.1. The government has bought more advance and state of the art weaponry from various other countries, allowing more wellrounded state security

1.4.1.1. The Singapore Army is currently undergoing the transformation into a 3rd Generation fighting force which involves combining advances in technology and training while using networking to integrate the tri-services into an integrated fighting force. This will provide even greater operational-readiness and flexibility during war and peace time.

1.5. The internet has created many platforms for the circulation of illegal material, breaching privacy

1.5.1. Social networking sites such as Facebook allows strangers to view one's personal information and photos without their knowledge, this is a breach of their personal privacy

1.5.1.1. However having said so, people usually have a choice in whether they want to show their information to people by altering security settings.

1.5.2. Internet Eavesdropping - Calls made online can be tapped by a hacker and recorded down.

1.5.3. For example, porn video made by local polytechnic student, Tammy created much controversy. While, it may have been against social conventions, it was obtained without her knowledge or permission, hence causing it to be a breach of privacy

1.6. The Internet technology has brought about a significant impact in doing business. (entails privacy and security of a company)

1.6.1. It promotes the new way of doing business by enabling new system such as electronic commerce (e-commerce) to the worldwide users

1.6.1.1. As a result, new privacy and security laws have to be made to cater to electronic transactions like online payment, electronic cart shopping and ordering, and online tracking

1.7. Privacy of the people

1.7.1. Internal GPS system in mobile devices allow people to see who is around them, stranger or not.

1.7.2. Blogs, Facebook etc

1.8. Technology is pervasive in privacy as well as security. With technology comes security and privacy enhancement. However technology also allows security and privacy to be more easily breached.

2. AGAINST: Technology has a small impact on privacy and security in the country

2.1. In terms of privacy, technology is a double edge sword, meaning that while it make seemingly create easier access to information, it is also countered with tighter and harder to crack security

2.2. Same to be said for security

3. Definitions

3.1. Privacy: Rights to a certain degree of

3.1.1. How we use our Information

3.1.2. How Third-Party Vendors, Sites, and Sponsors use our Information

3.2. Security:freedom from danger, risk, precautions taken to guard against crime, attack, sabotage, espionage

3.3. In your country: Singapore

4. Conclusion

4.1. While most things come in an action-reaction pair to balance things out, we believe that technology is an exception, having a large impact in both privacy and security in Singapore.

4.2. Technology nowadays has become so advance and far-reaching, permeating every nook and crevice of our society. It is like a lighted matchstick placed in a barn of dried hay, once it spreads, it is almost an unstoppable force of nature.

5. Colours

5.1. Red

5.1.1. Xinying

5.2. Blue

5.2.1. Yijun

5.3. Green

5.3.1. Claire Lim

5.4. Pink

5.4.1. Jun Wei

5.5. Purple

5.5.1. Ashvin

5.6. Orange

5.6.1. Veronica