Sunteți pe pagina 1din 8

Security and Privacy

Students name
Date
Module
Institutes name

Running Head: Security and Privacy

Page | 2

Table of Content
1

Introduction.........................................................................................................................3

Literature review.................................................................................................................3
2.1

Privacy and Security at Digital workplace..................................................................3

2.1.1

Importance and Issues in E-Commerce................................................................4

2.1.2

Importance and Issues in Cloud Computing........................................................5

2.1.3

Importance and Issues in Sensor Networks.........................................................5

Conclusion..........................................................................................................................6

Reference list......................................................................................................................6

Running Head: Security and Privacy

Page | 3

Introduction
The term privacy refers to the control over the ones private information while the term

security refers to the situation of being free from all dangers and threats (Ackerman &
Donald T. Davis, 2003). When accessing the data and opts uses are concerned then it could be
stated that the data privacy and security are considered symbiotic elements. Therefore, this
paper reviews the literature of privacy and security in the 21 st century, under the context of
digital workplace. The areas under the digital workplace that are considered in this paper
includes E-commerce, cloud computing and sensors networks. Thus, the paper highlights the
importance and the issues related to the privacy and security in these areas.

2
2.1

Literature Review
Privacy and Security at Digital Workplace
The privacy and security in a digital workplace have always been on the top of

discussion due to its sensitive nature. Thus, large number of researches conducted many
studies on these aspects under various fields. For example, Christine Miller and F. Stuart
Wells (2007) wrote a journal article related to the change in management in which they
mentioned that the advancement in information technology has been increased in the recent
century and this has shown a significant increase in the workers productivity. It has
recognized various new security risks as well, responded by introducing new tools to restrain
these risks.
According to Miller and Wells (2007), there are intrinsic exchange among the
effectiveness in new tools and the extent to which they produce breach regarding worker
privacy. All organizations look for suitable compromises than it is their responsibility to deal
with noteworthy legal as well as social challenges. The main purpose of their article was to

Running Head: Security and Privacy

Page | 4

widen the awareness in management in terms of the security risk within the digital
workplace.
Further, they demonstrated the legal, ethical, as well as practical constrictions that are
bear by the employee privacy. Concerning these issues, the authors anticipated a three-step
process that is considered to encompass the corporate reactions to change in all possible
ways. They produced a win-win solution for the respected stakeholders.
2.1.1

Importance and Issues in E-Commerce


To study the impact of privacy and security, Mark S. Ackerman and Donald T. Davis

(2003) reviewed a chapter from the book related to e-commerce. They considered privacy
and security as two crucial problems for the consumers of e-commerce and for respected
sites. These two aspects are interconnected as in the absence of any one, neither the
consumers will visit the site and shop, nor will the respected sites be affective without the
consideration of both. The chapter reviewed by them was based on the current situation of the
art and significance for privacy as well as its security. In their report, the authors inspected
the privacy from the perspectives of social psychological, technical, organizational,
regulatory, and economic aspects.
In the end of their review, they found interesting and important findings and
concluded that in the last five years, e-commerces sites, and their consumers has gone
through many imperative consequences. Privacy is considered as the part of the social
construction, expecting this as the largest concern. Although, it has been assumed as a public
issue by the controllers, however, they usually allow the technology to open up to the date.
On the other hand, security today is considered imperfect because of the continuous conflicts
among their experts and the hackers. However, organizational policies play the vital part in

Running Head: Security and Privacy

Page | 5

these site securities. This detailed study was largely based on the economic as well as
sociological analysis of privacy and security (Ackerman & Donald T. Davis, 2003).
2.1.2

Importance and Issues in Cloud Computing


Cloud computing has changed the way in which the information technology was

utilized and managed, before the 21st century. It has enabled transformation in terms of cost
efficiency, accelerated the modification, and extended the applications of demand. Therefore,
one of the researcher Sen, Jaydip (2013) in his report concerning the privacy and security of
the cloud computing, stated that the cloud computing is emerging rapidly in both aspects
conceptually as well as in reality, legal, service quality, economic, security and privacy issues
are posing major challenges (Sen, 2013). The three main challenges that author discussed
were regularity, privacy, and security issues in terms of cloud computing. Furthermore, he
provided solutions to overcome these challenges by presenting the future trends in the
deployment of cloud computing (Sen, 2013).
Keiko Hashiume, David G Rosado, Eduardo Fernandez-Medina and Eduardo B
Fernandez (2013), also demonstrated in their paper that cloud computing is considered
flexible and cost effective. It is a platform providing an authentic delivery of business or IT
services through the internet (Hashizume et al., 2013). However, it has also increased the
level of the risks, as the necessary services usually involves the third party in terms of
outsource. This makes the data security and privacy harder to maintain as it supports the
availability of the data as well as demonstrate the observance. In this paper, the authors
discussed the security issues inherited by the cloud computing. They identified the main
vulnerabilities that occur in these types of the systems and recommended the possible
solutions (Hashizume et al., 2013).

Running Head: Security and Privacy

Page | 6

2.1.3

Importance and Issues in Sensor Networks


Chan & Perrig (2003) write a report based on the sensor networks in which they

demonstrated that sensor networks are economical feasible solution for the numerous
applications. They considered the examples like the current implementation that observes the
efficiency of the factory instrumentations, measurement of the pollution levels, observing the
free way of the traffic, as well as the structural incorporation of the building (Chan & Perrig,
2003). These networks played the crucial role in the formation of smart spaces, entrenching
information technology in the environment of home and the building. Along with large
number of benefits, the sensor network posed numerous issues in terms of the privacy and
security that give a large field to the research problems (Chan & Perrig, 2003).
In another paper, Moshaddique Al Ameen, Jingwei Liu, and Kyungsup Kwak (2012)
wrote about the security and privacy issues that are raised in the sensor networks for the
healthcare applications. They demonstrated that its use is growing in a fast pace as large
number of the applications such as the monitoring of the heart rate and blood pressure as well
as the use of endoscopic capsules are adopting it (Ameen et al., 2012). To identify the use of
the sensor technology a completely new field appeared known as the Wireless Body Area
Networks (WBAN). Since most of the devices are wireless, thus the security and privacy
issues are of great concern (Ameen et al., 2012). The privacy concerns directly restrict
individual from taking over all advantages from this technology. Thus, the people do not
consider these devices safe for their daily use. It is assumed that there is a social insecurity in
terms of the fear that these devices are under the control of government agencies or other
organization and they are using them to monitor or track an individual (Ameen et al., 2012).

Running Head: Security and Privacy

Page | 7

Conclusion
The literature reviewed above concludes that the security and privacy have a major

impact in all the workplaces. It has provided numerous benefits in all the fields. When it
comes to the digital workplace, it has transformed the utilisation and the management of the
information technology in the 21st century. However, along with the numerous benefits
security and privacy also possess the darker side as it has increased the level of risks as well.
At the same time, the innovation of technological tools has also restrained these risks at some
extent, but still it requires improvement in this area.

Running Head: Security and Privacy

Page | 8

Reference

Ameen, M.A., Liu, J. & Kwak, K., 2012. Security and Privacy Issues in Wireless Sensor
Networks for Healthcare Applications. Journal of Medical Systems, 36(1), pp.93-101.
Chan, H. & Perrig, A., 2003. Security and privacy in sensor networks. Computer.
Hashizume, K., Rosado, D.G., Fernndez-Medina, E. & Fernandez, E.B., 2013. An analysis
of security issues for cloud computing. Journal of Internet Services and Applications .
Mark S. Ackerman and Donald T. Davis, J., 2003. Privacy and Security Issues in ECommerce. New Economy Handbook.
Sen, J., 2013. Security and Security andPrivacy Privacy Privacy Issues in Cloud Computing.
Architectures and Protocols for Secure Information Technology Infrastructures.
WELLS, C.M.a.F.S., 2007. Balancing Security; Privacy in the Digital Workplace. Journal of
Change Management, 7(3-4), pp.315-28.

S-ar putea să vă placă și