Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Write 6 page essay on the topic Homeland Security Organization.ople, who are being tracked by the information collection and technologies, understand and approve the use of the same?” It is being se

Write 6 page essay on the topic Homeland Security Organization.

ople, who are being tracked by the information collection and technologies, understand and approve the use of the same?” It is being seen that government and organizations alike are using radio frequency identification (RFID) tags and the smart cards etc. which are basically very handy information collection and transmission technology, in the working of their homeland security, information security, security of the physical premises, as well as the control of supplies in commerce. Most of these applications basically track the activities of an individual, yet it cannot be said unambiguously that to what extent, if at all, the common people understand the use of these technologies and whether they approve to these information practices. These unanswered questions are the research questions of the article under review. (Strickland and Hunt, 2005, p. 221)

This article has some clearly stated hypothesis. Two types of information professionals were surveyed, namely the public librarians and the technology-oriented librarians and their understanding of the uses and privacy issues related to the RFIDs and Smart Cards were compared. The hypothesis was that the functioning of these technologies would be better known to the technology-oriented librarians but none of them would fully understand the inbuilt threat to individual privacy. It was further believed that both of these groups would have concern over the use of these devices but would in general have a supportive attitude towards homeland security. Lastly, it was also hypothesized that these findings about the specific groups can be extended to the common people of America. (Strickland, and Hunt, 2005, pp. 221-222)

This article is unique from the point of view that it explains in details the technologies that are being used for different security practices, the existing laws regarding these and using the collected primary data, citizen’s knowledge and consent to the use of these technologies is ascertained.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question