Preview

Analytical and Synthetic Approach

Good Essays
Open Document
Open Document
764 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Analytical and Synthetic Approach
ANALYTICAL AND SYNTHETIC PARADIGM

Problem Statement:
Conflict between people’s right to privacy and government’s right to information to ensure the security of the country. (Case in discussion: RIM’s Blackberry)

Problem Description:
The Indian government is expressing security concerns over some Blackberry services that cannot be kept under electronic surveillance. The government demands access to tap BlackBerry’s highly encrypted corporate email and messenger services. They have asked the RIM officials to provide them a key to monitor their content and threatened to block their services, in India, if they fail to oblige.

Social networks, location-based services on mobile phones and a host of other innovations have greatly increased our ability to share large amount of personal information online. Yet, it leaves us vulnerable to the scrutiny of criminals, companies and control-freak governments.

ANALYTICAL PARADIGM

Q. What are the possible options available with the company (RIM)?

A. As the concerns of the government are linked with security, there is very little probability that RIM will be able to get away with this without making arrangements for sharing real time data. The options that the company has are: 1. Establish a server in India which would provide real time access to the data being transferred between the two parties. 2. Provide a system which provides lawful access to customer data. 3. Do not compromise on its security and exit its operations from the country.

Q. What is the scale of operations which will be affected by the ban?

A. According to official figures, there are over a million Blackberry users in India. Hundreds of companies and even government officials in India are using Blackberry services. The ban will mean losing out on a growing market like India which is projected to have the largest cellular customer base in the world. As RIM has penetrated through most of corporate India, this would also affect

You May Also Find These Documents Helpful

  • Good Essays

    With the advent of RIM’s BlackBerry’s email service this let to a four year patent battle between RIM and NTP. This disagreement nearly caused an end of service to their email service to their US customers. In an effort to protect their intellectual property, in 2006 RIM had to settle the fight by paying NTP $612.5 million in exchange of NTP’s rights to its patents going toward. According to the Datamonitor’s publication dated 27 August for RIM’s swot analysis it stated that RIM continues to have intellectual property battles. In 2009 RIM settled with Motorola as well as Visto to enable it to access to “perpetual and fully paid license of certain…

    • 527 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    In addition, organizations constantly face legal, ethical, and regulatory requirements from governments, business partners, and others they work with. These will add additional factors when weighing the costs and benefits of different solutions to information security risks. In fact, these requirements may even make some risks more important, often because a company will not want to get in trouble with a government even though they might normally live with the risk they are being forced to resolve through regulations. Understanding the various laws that will affect data is of prime importance to any security…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Case study 1

    • 466 Words
    • 2 Pages

    The blackberry controversy is prominent in Asia, particularly in the Middle East, and not anywhere else in the world because of the instability of the region, government corruption, and restricted freedoms. The governments in the Middle East are under threat and need all of the information on potential terrorist plots so they can get to protect their sovereignty. In order to protect the people, or to maintain a dictatorial grip on the power they wield, they suppressed freedoms for the populace. Also because of the different laws and attitudes towards privacy and human rights along with the differing degrees in the capabilities of governments to crack encryption; finally because of the domestic and regional political instability along with the occurrence of certain incidents that highlighted the security threats posed and the RIM’s secrecy.…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The year is 2010, the era is the 21st century; and we, citizens of the world, are living in the Information Age. Our information is made available on the Internet where it can be viewed by millions. The days where our data was recorded on scraps of paper and left in a box in an office along with thousands of other registers are long gone. Our personal data is permanently recorded in the hard drives of computers where they can be analysed and exploited by anyone with access to that computer; or worse, identity thieves and hackers may get their hands on the data.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    In today’s society, technology has made countless advances skyrocketing towards the future. Thus the arguments about whether or not security is needed for this amount of power. There are many good aspects of the internet; including social media, messaging, games, and even dating. But, with these things, comes bad that we don't know much about; including catfishing, tracking, and also spying. With the click a button, everything done online can be seen by anyone.…

    • 974 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    This article focuses in how devices can transmits a consumer private information to third parties, and how consumers have little knowledge that their information is kept in databases to be sold. In 2020 most home devices will interconnected both wire and wireless to each other across a network, giving unlimited potential to create personal profiles…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    The World Wide Web was created far enough back for most people not to care about the specific date. It is a great asset for school, work, and general entertainment. But, with all the good things it brings, there are some negatives as well. The internet, once a new place of discovery, is now a place of caution with danger lurking around every corner. Lori Andrews writes about the privacy issues of the web in her essay, “George Orwell…Meet Mark Zuckerburg.” Already, in her title she emphasizes Orwell’s rational fear of “Big Brother” is happening now on Zuckerburg’s social media site, Facebook. It is not just Facebook that has fallen to data aggregators invading the privacy of anyone online. Andrews describes data aggregators as people or companies…

    • 1630 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    1984

    • 514 Words
    • 2 Pages

    Keeping pace with the ever evolving technological world, brings the idea of our personal information can be accessed by a weak firewall and breakable password. All these, however, also have a drawback in common they serve as locating devices for each and every one of us. Privacy has vanished. In George Orwell’s novel, 1984, Big Brother was a character of fiction. Yet he was able to oversee everything and virtually controlled the daily lives of millions of people. Now, as we advance technologically, the thought of Big Brother watching over us isn’t so far-fetched.…

    • 514 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Privacy is a person’s right to control access to his or her personal information. Everybody value the protection of their personal information. No one wants to see some of their personal information made public, especially on the internet. However, the recent evolution of technology has started to threaten every individual’s privacy by reducing the amount of control that they had over their personal data and making it possible for people who do not have the proper authority to access them. According to Zalta (2014), the 21st century has become the century of Big Data and advanced Information Technology allows for the storage and processing of exabytes of data. The combination of increasing power of new technology and the declining clarity and agreement on privacy give…

    • 480 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Apple App Store

    • 1453 Words
    • 6 Pages

    Internet-capable phones are on the rise in India. Telecom companies are developing 3G licenses and access to provide to the citizens. A surge in number of users connecting to the internet through their mobile phone will be expected for the over the next few years. India’s internet traffic on mobile devices will surpass desktop devices significantly over the next few years. Various devices such as tablet computers, smartphones, and laptops will increase internet traffic and mobile applications will be the main focus for the next few years. Mobile payments and mobile commerce should be a big part of India’s economic growth in the next few years.…

    • 1453 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Of this week’s reading by Julia Angwin draw on her observation and experience that highlights how the technology we use every day to converse, could easily be used against us by interfering with our privacy .Because our privacy is not really private, it could it up hurting up as well, Angwin found this to be true when Face book decided to change its policy, which made it possible for people to see you friends list even if you had a private account. As a result, not only was her life in danger but everyone she communicates with.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Almost everyone now days has some computer device on them almost all the time, people are always checking social media through smartphones or performing some online activity. The online infrastructure has endpoints; these endpoints transmit data. Businesses use many technologies to assist them in providing certain personal information that needs to be protected. For example, law enforcement uses computer devices to search for information on a suspect. There are other technologies such as monitoring devices from hospitals that allow real-time feedback of the patient's vitals. Many individuals use laptops or smartphones to access his or her online banking account to transfer, withdraw, or deposit money. All of the information that is gathered and stored online becomes vulnerable, and if…

    • 780 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Surveillance In 1984

    • 540 Words
    • 3 Pages

    Today, the advancement in surveillance secretly results in control of one’s life by the government and is hard to avoid in modern American society. The government collects phone and internet records from technology and communications companies. They track every phone call, purchases, emails, text messages, internet searches, social media communications, and more. If one wants privacy then it is best said by David Von Drehle that “Privacy is mostly an illusion”. It is a fact that over 85% of computers worldwide are being monitored by government agencies, banks, corporations, and others too.…

    • 540 Words
    • 3 Pages
    Good Essays
  • Better Essays

    There are many Americans that worry about the invasion of their privacy. An American’s privacy can be lost by- an IP address internet cookies, government surveillance cameras, and social networking sites. There are many ways Americans can control their privacy, but sometimes the invasion of privacy is out of their control. For example, computers save all of the American’s private information without their consent.…

    • 1379 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Contemporary information systems technology, including internet technologies, challenges traditional regimens for protecting individual privacy and intellectual property. Data storage and data analysis technology enables companies to easily gather personal data about individuals from many different sources and analyze these data to create detailed electronic profiles about individuals and their behaviors. Data flowing over the Internet can be monitored at many points. The activities of website visitors can be closely tracked using cookies and other web monitoring tools. Not all websites have strong privacy protection policies, and they do not always allow for informed consent regarding the use of personal information.…

    • 385 Words
    • 2 Pages
    Good Essays