Friday, February 21, 2020

Information System Essay Example | Topics and Well Written Essays - 2000 words - 2

Information System - Essay Example Essentially, ICT ensures people are freed from restrictions of personification, leading to advanced solution. As a matter of fact, Information and Communications Technology levels the playing field. Nonetheless, the relationship between information technology and access is remarkable. As innovations become smaller, quicker and less expensive, technology becomes simpler to utilize and obtain. Nevertheless, the information and communications technology gap is not about accessing technology, but the deeper hidden implications of access. At the end of the day, the politics of IT is that access to IT is more than a divergence between of "haves" and the poor. For example, despite the fact that Information and Communication Technology is ordinarily associated with access and inclusion, modernization of technology can create isolation of individuals, making particular types of social segregation. Discrimination can happen in subtler ways. ICT, for example, benefits specific ways of living, which are founded in standardizing, societal, communal and monetary practices, further advanced in the structu re, production, showcasing and usage of technology. The internet, specifically, seems to offer the guarantee of free-streaming worlds where character, exemplification, and subjectivity can be designed and refashioned without restraint (Goggin and Newell, 2003). In online connections, the postmodern individual can decide to possess distinctive sexual orientations, racial foundations, and sexualities. Bodily properties, as well, can be deliberately made in online connections – permitting people to gain and, naturally, shed them. The postmodern Internet then gets to be all the more a decision than a fixed reality. Accordingly, information technology guarantees new realities where substantial confinements can be risen above, and new flexibilities discovered mostly for individuals with handicaps, who are viewed as exceptional recipients of technology (Goggin and

Wednesday, February 5, 2020

Mock Interview with Edward Snowden Assignment Example | Topics and Well Written Essays - 1000 words

Mock Interview with Edward Snowden - Assignment Example Throughout my working, I have learned our government is doing the exact opposite of what it purports to do in our name. Edward Snowden: I have worked thought in security settings, and more particularly in the settings of information security. I can assure you what the government is doing against you against the law the very laws it is supposed to protect are a lot. They pretend to be following the law, protecting your security, your privacy and working for the interest of the nation when in actual sense they are just working for their interests. They intercept all your telephone conversations; your activity on social media is spied on in the name of national security including your very private pictures yet the law protects the privacy of every individual. I thought things would change when President Barrack Obama was elected but to my shock, whistleblowers have been prosecuted at an alarming rate in this administration. It came to my realization that I was just part of the harm and nothing was going to happen to make the truth known unless I acted myself on what I strongly believe in. My experience o f what our government is doing against us and other people the world over informs and more especially my stint in Geneva strongly informed my decision to do at least something. Interviewer: Do you ever ponder the fact that it was actually wrong to release the documents and circulate them against our employer and government? Didn’t you think you were betraying and actually sabotaging? Edward Snowden: One may want to look at it the same way you are doing but for me, it was a bigger picture. A strong belief in the rule of law, the right to privacy as envisaged in America’s own constitution and equality for all are principles dear to my heart. I worked shortly in the military, at the CIA, NSA, and for private companies.Â