StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Personal Encryption: Should We Permit It - Research Paper Example

Cite this document
Summary
[Enter name] [Enter [Enter Subject] [Enter Date] Personal Encryption: Should We Permit It? The era of capitalism and globalization has brought about phenomenal change in the flow of information around the world. This change took place with the explosion in information technologies that has been taking place in every facets of life at markedly rapid speeds…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
Personal Encryption: Should We Permit It
Read Text Preview

Extract of sample "Personal Encryption: Should We Permit It"

Download file to see previous pages

Phenomenal growth, as well as dependence on computer-related services, has resulted to greater worldwide demand for- and use of computers. Computers and their connecting networks have rapidly become a dominant force in government, business, education, recreation, and in virtually all other aspects of society in the United States and worldwide. Thus, according to Cate, more data are more than ever being digitized and are made available in digital format (1). Digital information is also now significantly easier to access, store and change than analog and nondigital data.

Sending and receiving digital information is also much easier, especially from one geographic location to another. To borrow from Inda and Rosaldo (8), such technological information in the time of globalization has brought about a seeming compression of our sense of time and space as communication systems have made remote encounters possible. Data generation is also increasing because of the ease and very low cost of doing so and also due to increased valuation of data in the growing information-based world.

Particular physical transactions have also been lessened with data substitution (Cate 2). For example, actual currencies need not be exchanged or handled in the process of electronic banking transactions and only data are manipulated. Various computer programs and websites have been programmed to automatically generate back-up copy of documents and other accessed data. As a result of such ease in computing and information technologies, more and more people could have access to information about other people.

Cate shares that it is estimated that in 1994, U.S. computers alone hold and trade more than five billion records and information on every man, woman, and child an average of five times every day (5). The proliferation of- and our increasing dependence on computers and their effect on the volume of data created and recorded and on the ease and relatively low cost of data collection, manipulation and storage have prompted increased concern about privacy. Sadly, most people do not understand clearly that when one sends information over the internet which is a public network, anybody can read it by making a little bit of effort.

Files with weak passwords and security measures are also prone to being accessed. Along with the revolution in information and computing came the rise in computer crimes due to the “borderless nature of cyberspace” and the openness of computer networks. Computer crime is defined by Saunders as “any conduct that employs information technology to accomplish an illegal purpose” (103). Collecting and personal data and private files are now vulnerable to computer hacking, cracking and criminal misuse.

More so, access to the internet and to computers is relatively easy and cheap, and the ability to victimize a huge number of individuals and businesses is virtually unlimited. Thus, personal encryption is of ultimate importance in this era. Technically, encryption is the process of transforming information using an algorithm to make it unreadable to anyone, except those possessing special knowledge, usually referred to as a key. It is a practice of encoding data so that even when a computer or a network becomes unfortunately compromised, the data content will remain safe from access.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Personal Encryption: Should We Permit It Research Paper”, n.d.)
Retrieved from https://studentshare.org/creative-writing/1428203-personal-encryption-yt-should-we-permit-it
(Personal Encryption: Should We Permit It Research Paper)
https://studentshare.org/creative-writing/1428203-personal-encryption-yt-should-we-permit-it.
“Personal Encryption: Should We Permit It Research Paper”, n.d. https://studentshare.org/creative-writing/1428203-personal-encryption-yt-should-we-permit-it.
  • Cited: 0 times

CHECK THESE SAMPLES OF Personal Encryption: Should We Permit It

Personal Statement ( Can be assigned by the writter)

prepared personal MENT I.... On a personal note, there are things that need to wait for a while, and I am happy that my family understands that getting a bachelor's degree is my short term goal for now.... As I was empowered to make appropriate decisions, I learned to feel responsible for the choices that I made, not only in the workplace but on a personal level....
2 Pages (500 words) Personal Statement

My Education in Information Security

For the brief period, we have been with him, he has proven to be hardworking, punctual and reliable individual who is courteous in dealing with colleagues, creative, eager to learn new things and willing to take new challenges.... we believe he gained valuable practical experience that will enable him to progress in his career, and therefore we recommend him in your organization.... we therefore recommend him in your organization....
2 Pages (500 words) Personal Statement

Personal Improvement Project

In the paper “personal Improvement Project” the author discusses the general aim of his project where he wants to get rid of his frequent stomach ache.... He intends to reduce by 75% the amount of coffee he consumes daily (from 4 to 1 cup per day) by April 12.... hellip; The author states that he is currently pursuing his master's degree here in the US....
3 Pages (750 words) Personal Statement

Assessment and Measurement

These interactions I believe are very important in the learning process as they permit cultural exchange and practical learning as well as understanding of cultural moderators of our behaviours and assessment needs.... Our accomplishment in live I believe is not only determined by our material and academic success but also how we use… It is therefore my goal to attain a holistic transformation through quality education.... Our accomplishment in live I believe is not only determined by our material and academic success but also how we use this knowledge to serve humanity....
2 Pages (500 words) Personal Statement

Personal Activity paper

The first thing after my death, a funeral memorial service should be arranged a day after my death.... It should not take long because I never want my family and friends undergo the psychological stress and trauma of seeing my body.... My current priest should lead the mass and the function should be very brief being attended only by my family members, close friends and enemies.... My body should not be viewed by anyone....
2 Pages (500 words) Personal Statement
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us