Topic > Persuasive Essay on Data Security - 1570

The process of storing, using and analyzing this data can be seen as creating a power relationship between citizens and state institutions that reinforces powerlessness as decisions they are taken for the citizen while they are denied to let them know how their information is being used. One of the biggest challenges of data mining is the quality of the data, how it is collected and how it is analyzed. The two most important technological developments of our generation are the Internet and mobile telephony (Hyppönen 2014). Criticism has arisen as to whether the third party doctrine can be ethically applied today in a world where individuals are so dependent on and rely on third parties such as Google or Facebook. Orin Kerr argues that the use of the third party doctrine can be incorporated with new technologies without violating an individual's Fourth Amendment rights (Nojeim and Kerr 2012, 80). However, he emphasizes that this can only be done in a technology-neutral way that balances the priorities of deterring and punishing crime with respecting our right to privacy. Therefore, the third party doctrine can only be applied with a mandate so that governments cannot abuse their power (Nojeim and Kerr 2012, 84). Greg Nojeim differs from this argument, pointing out that if this