Balancing Privacy, Public Safety, and Network Security Concerns after September 11

نویسندگان

  • Mark A. Rush
  • Lucas G. Paglia
چکیده

n the aftermath of the September 11, 2001, terrorist attacks on America, Congress and the President acted swiftly to pass new legislation to make it easier for federal, state, and local law enforcement to investigate and avert suspected acts of terrorism. On October 26, 2001, President Bush signed into law the U.S.A. PATRIOT Act of 2001 (PATRIOT Act, or “the Act”). As indicated by its short title — “Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism” — the PATRIOT Act was promulgated with the paramount goal of seriously enhancing the ability of America’s intelligence and law enforcement communities to proactively prevent terrorism. True to its aim, the Act provides literally scores of amendments to existing federal statutes, all of which, to varying degrees, remove obstacles to investigating terrorist acts and acts related to or in furtherance of terrorism. At the same time, the PATRIOT Act’s broad amendments present a number of new concerns for all businesses operating in the Internet age. As critical financial and technological infrastructures continue to serve legitimate and illicit needs — from legitimately driving America’s struggling economy to unwittingly serving as the platforms for illegal international money laundering by terrorists and their sympathizers — business owners face the threat of a “dragnet” approach to surveillance and investigation of suspected terrorists and terrorism. To I S E C U R I T Y M A N A G E M E N T

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

On Effective Protection of Security and Privacy in XML Information Brokering

In contrast with the situations when the information seeker knows where the needed data is located, XML Information Brokering System (IBS) needs to help each information seeking query ”locate” the corresponding data source(s). Unlike early information sharing approaches that only involve a small number of databases, new information sharing applications are often assumed to be built atop a large...

متن کامل

Biometrics: A Double Edged Sword - Security and Privacy

Certainly, one cannot ignore that the events of September 11th have spurred an increased activity of private and public interest in security and especially, biometrics. This has raised concerns that reacting too quickly with rapid implementations of a technology that some are still trying to grapple with, may result in sacrificing privacy rights in the name of security. In fact, it is highly li...

متن کامل

Analysis and Evaluation of Privacy Protection Behavior and Information Disclosure Concerns in Online Social Networks

Online Social Networks (OSN) becomes the largest infrastructure for social interactions like: making relationship, sharing personal experiences and service delivery. Nowadays social networks have been widely welcomed by people. Most of the researches about managing privacy protection within social networks sites (SNS), observes users as owner of their information. However, individuals cannot co...

متن کامل

High Secure Crypto Biometric Authentication Protocol

Concerns on widespread use of biometric authentication systems are primarily centered around template security, revocability, and privacy. The use of cryptographic primitives to bolster the authentication process can alleviate some of these concerns as shown by biometric cryptosystems. In this paper, we propose a provably secure and blind biometric authentication protocol, which addresses the c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Information Systems Security

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2002