Order For Custom Writing, Similar Answers & Assignment Help Services

Fill the order form details in 3 easy steps - paper's instructions guide.

Posted: January 26th, 2023

The Privacy Act of 1974 and other privacy statutes

Do you feel that information systems to fight terrorism should be developed and used even if they infringe on privacy rights or violate the Privacy Act of 1974 and other such statutes? It must be in APA format.
===
The issue of balancing privacy rights and the use of information systems to fight terrorism is a complex and controversial one. On one hand, information systems can be a valuable tool in detecting and preventing acts of terrorism. On the other hand, the use of these systems can raise serious concerns about privacy rights, particularly if they involve the collection, storage, and use of personal information in ways that are not authorized by law or are inconsistent with established privacy principles.

The Privacy Act of 1974 and other privacy statutes, such as the Electronic Communications Privacy Act (ECPA) and the Foreign Intelligence Surveillance Act (FISA), are designed to protect privacy rights and limit the government’s ability to collect and use personal information. These laws generally require that the government have a compelling need for the information and that it be obtained through lawful means, such as a warrant or court order.

While information systems can be a useful tool in the fight against terrorism, it is important to ensure that their use complies with privacy laws and principles and does not undermine the privacy rights of individuals. Ultimately, the proper balance between privacy rights and national security concerns is a matter of public policy that should be determined through a democratic and transparent process, taking into account the views of experts, stakeholders, and the general public.
====
Info Systems and the Fight against Terrorism
Information systems should be developed and used to fight terrorism since safety paramount to privacy. Information systems offer a wide range of capabilities and, under the hands of experts, can be used to accomplish milestones for government agencies. Recently, there have been concerns that the government infringes on people’s privacy to gain intelligence on terror. The Privacy Act of 1974 was amended to govern agencies’ collection, maintenance, use, and dissemination of citizen’s information (DoJ, 2020). Moreover, these agencies are supposed to make public notice of their activities. This has not been the case for government agencies hence the nationwide uproar. People feel that the data mining being conducted by the federal government is against privacy statues. However, they forget to consider the sensitivity of terrorism matters. After 9/11, the DHS has been hell-bent on protecting America regardless of the cost. This includes breaking specific laws to put the safety of Americans at a top priority. Data mining and profiling techniques have been used to narrow down on criminals planning to execute dangerous plans. Social media is a large platform, and terrorists have been known to liaise on the internet due to its global penetration. Emerging technologies such as smart tech can be used to notify law enforcement departments and help them arrive at a crime scene faster. Smart tech systems will be able to detect gunshots and offer crime-mapping platforms. The American Civil Liberties Union claims that government agencies are violating privacy statutes with the use of IT systems (Sorensen, 2017). It would be unreasonable for agencies to reveal projects on terrorism as they would compromise their mission. Therefore, it is fair to say that the development of information systems to fight terrorism is necessary even if it violates statutes. The most important thing is delivering safety across the nation.
References
DoJ. (2020). Privacy Act of 1974. Retrieved from https://www.justice.gov/opcl/privacy-act-1974
Sorensen, E. (2017). IRS breaking law by mining data, probing social media, says WSU professor. Retrieved from https://news.wsu.edu/2017/08/23/irs-breaking-law/
Smith, K.T., Smith, L.M., Burger, M. and Boyle, E.S., 2023. Cyber terrorism cases and stock market valuation effects. Information & Computer Security.
Spiekermann, S., Krasnova, H., Hinz, O., Baumann, A., Benlian, A., Gimpel, H., Heimbach, I., Köster, A., Maedche, A., Niehaves, B. and Risius, M., 2022. Values and Ethics in Information Systems: A State-of-the-Art Analysis and Avenues for Future Research. Business & Information Systems Engineering, 64(2), pp.247-264.
Singh, K. and Best, P., 2019. Anti-money laundering: Using data visualization to identify suspicious activity. International Journal of Accounting Information Systems, 34, p.100418.

Order | Check Discount

Tags: Best Assignment Help Australia, Can Someone Write My Assignment for Me, can you write my dissertation, Do my assignment Australia, do my dissertation

Assignment Help For You!

Special Offer! Get 15-30% Off on Each Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the most qualified writers are selected to be a part of our research and editorial team, with each possessing specialized knowledge in specific subjects and a background in academic writing.

Affordable Prices

Our prices strike the perfect balance between affordability and quality. We offer student-friendly rates that are competitive within the industry, without compromising on our high writing service standards.

100% Plagiarism-Free

No AI/chatgpt use. We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you decide to place an order with Nursing.StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much guidelines - instruction details as possible.

Assignment of Writer

We assess your order and pair it with a skilled writer who possesses the specific qualifications for that subject. They then start the research/writing from scratch.

Order in Progress and Delivery

You and the assigned expert writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also review testimonials from other clients, from where you can select your preferred professional writer to assist with your homework assignments.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00