Security and privacy must not be traded off against each other
Last week, a United States federal judge ordered Apple to assist the Federal Bureau of Investigation to gain entry into an encrypted iPhone used by Syed Rizwan Farook to know where Farook and his wife had been and who had helped them in their terrorist act last December. Farook and his wife shot and...
Saved in:
Main Author: | EUGENE, Tan K. B. |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2016
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sol_research/3872 https://ink.library.smu.edu.sg/context/sol_research/article/5830/viewcontent/security_and_privacy.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Milky Way and Andromeda: Privacy, Confidentiality and Freedom of Expression
by: WEI, George S. S.
Published: (2006) -
Wither privacy protection in the law of nuisance
by: SAW, Cheng Lim, et al.
Published: (2022) -
Whither privacy protection in the law of nuisance
by: SAW, Cheng Lim, et al.
Published: (2022) -
Remedying a Technological Challenge: Individual Privacy and Market Efficiency; Issues and Perspectives on the Law Relating to Data Protection
by: DAM, Shubhankar
Published: (2005) -
The federalist provenance of the principle of privacy
by: LIM, Elvin T.
Published: (2015)