Should public safety ever trump private security

Assignment Help Management Information Sys
Reference no: EM131680544

• Security vs. Privacy

Please respond to the following discussion topic and submit it to the discussion forum as a single post. Your initial post should be 75-150 words in length. Then, make at least two thoughtful responses to your fellow students' posts. If you haven't recently, please review the Rules of Discussion.

On December 2, 2015, Syed Farook and his wife Tashfeen Malik shot and killed 14 people and injured 22 more in San Bernadine, California. After the shooting, the couple fled in a rented SUV. Four hours later, police located and pursued the suspect vehicle which ended in a shootout where the suspects were both killed.

If you are not familiar with the details of this attack, here is an ABC News report on the basics:

San Bernardino Shooting Suspects' Violent Standoff with Police

The next day, the FBI opened a counter-terrorism investigation of this case. Part of that investigations was the FBI's attempt to access Farook's Apple I-phone to look for possible evidence of the case.

Because the I-phone was locked, the FBI didn't have the technology to open it to review its contents. Because they were not able to open it, the FBI asked Apple to unlock the phone. Apple refused citing privacy and security issues.

To this, the FBI requested a court order ordering Apple to unlock the phone, telling the court, it needed access to the phone so it could complete its investigation and to keep America safe. The court sided with the FBI and issued a court order ordering Apple to unlock the phone.

Again, Apple refused citing privacy and security issues.

This has opened a whole new conversation about security vs. privacy in America.

On one side, it is argued in situations such as this, where the safety and security of others is at stake, personal security takes a backseat to those privacy issues.

On the other side, it is argued this is exactly what terrorist want, to sacrifice our personal privacy to stay safe against possible terrorist attacks. This side also argues privacy is a basic American concept and should never be overridden for security reasons.

They argue the US Supreme Court has consistently ruled in favor of what's known as the expectation of privacy which basically says if you do something about which you have a reasonable expectation of privacy being preserved, it should take extreme measures to allow that right to be overridden.
Eventually the FBI was able to hire a hacker to break into the phone and the FBI found little information of use.

Here is an ABC piece on the issue of the request for Apple to make a program that would allow the FBI to access the phone. Watch the video and then respond to the following question.

Apple vs. the FBI - Syed Farook's iPhone - San Bernardino

In your initial post, cover the events behind the San Bernadine terror attack (as it has been designated by our government) which lead up to the request by the FBI, to Apple, to create a program so they could unlock Farook's phone.

After that, discuss your thoughts on the question of personal security vs. safety of the general public. Should public safety ever trump private security?

Should the threat of a terror attack allow the overriding of personal security? If so, when? If not, why? How should this be administered and monitored should the courts allow this?

Take a stand and defend your position.

should be 150 words, but may go longer depending on the topic. If you use any source outside of your own thoughts, you should reference that source. Include solid grammar, punctuation, sentence structure, and spelling.

Reference no: EM131680544

Questions Cloud

Do you feel this would help to guide you in eating a healthy : Do you feel this would help to guide you in eating a healthy diet? State specific reasons why or why not as you answer this question.
Sustainable development and land use challenge : Conduct research on the sustainability challenges this area faces - create a sustainable development and land use plan for New Orleans, Louisiana
What is japan or japanese civilization : What is Japan or Japanese Civilization? Borgen and Ury, "Readable Japanese Mythology" pp.65-73 (Kojiki), pp.75-87 (Nihon shoki).
How do you see the confucian ethos : How do you see the Confucian ethos and the Confucian virtues exemplified in Reid's experiences in Japan? What might these possibly be?
Should public safety ever trump private security : Discuss your thoughts on the question of personal security vs. safety of the general public. Should public safety ever trump private security?
What is your opinion on jobs vs the environment : What is your opinion on jobs vs the environment? What limits do you set to allow for economic growth with the least environmental impact?
Discuss the us government role in food regulation : Discuss the U.S. Government's role in food regulation.
Causes of climate change that are human related : Discuss whether you support or do not support climate change as a human-caused event. Identify possible causes of climate change that are human related
Estimate the latitude and longitude : Using a world map or globe, estimate the latitude and longitude to the nearest 1 of Los Angeles in California and Sydney in Australia

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd