Tuesday 17 July 2012

HARI KEMERDEKAAN


Hari Kebangsaan Malaysia


Yang Di-Pertuan Agong Tuanku Abdul Rahman ibni Almarhum Tuanku Muhammad dibawa menyaksikan perbarisan ketika Hari Kebangsaan Tanah Melayu

Akta Kemerdekaan Persekutuan Tanah Melayu 1957 (c. 60)

Hari Kebangsaan Malaysia disambut di seluruh negara pada setiap 31 Ogos setiap tahun bagi menandakan negara bebas daripada belenggu penjajahan sejak 1511. Hari kebangsaan merupakan peristiwa utama dan disambut secara besar-besaran dengan mengadakan perarakan warna warni, konsert, pertunjukan pentas, pertandingan dan pelbagai lagi pertunjukan yang diadakan di tempat-tempat yang ditetapkan setiap tahun. Pada 31 Ogos, 2007, Malaysia telah menyambut ulangtahun hari kemerdekaan yang ke-50.

Kemeriahan Hari Kebangsaan dapat dirasakan bermula menjelangnya pukul 12.00 malam di mana bunga api yang berwarna-warni bergemerlapan di udara. Begitu juga acara perbarisan yang diwakili oleh pelbagai agensi turut diadakan bagi memeriahkan lagi suasana hari tersebut. Hari kebangsaan disambut paling meriah di Kuala Lumpur terutama di Dataran Merdeka.

Sambutan hari kebangsaan secara besar-besaran juga dibuat di Putrajaya. Bangunan- bangunan perniagaan, rumah kediaman dan kereta-kereta akan memasang dan mengibarkan bendera Malaysia, Jalur Gemilang, dan ini menyemarakkan lagi suasana perayaan. Hari kebangsaan merupakan hari cuti am di Malaysia.


TahunTema
1970Muhibah dan    Perpaduan
1971Masyarakat     Progresif
1972Masyarakat Adil
1973Masyarakat Kebudayaan Malaysia
1974Sains dan Teknologi Alat Perpaduan
1975Masyarakat Berdikari
1976Ketahanan Rakyat
197720 Tahun Bersatu Maju
1978Kebudayaan Seni Perpaduan
1979Bersatu Berdisiplin
1980Berdisiplin Berbakti
1981Berdisiplin Berharmoni
1982Berdisiplin Giat Maju
1983Bersama ke Arah Kemajuan
1984Amanah Asas Kejayaan
1985Nasionalisme Teras Perpaduan
1986Bangsa Tegas Negara Teguh
1987Setia Bersatu Berusaha Maju
1988-1989Bersatu
1990Berjaya
1991Wawasan 2020
1992Wawasan Asas Kejayaan
1993Bersatu Menuju Wawasan
1994Nilai Murni Jayakan Wawasan
1995Jatidiri Penggerak Wawasan
1996Budaya Penentu Kecapaian
1997Akhlak Mulia Masyarakat Berjaya
1998Negara Kita Tanggungjawab Kita
1999Bersatu Ke Alaf Baru
2000-2006Keranamu Malaysia
2007Malaysiaku Gemilang
2008Perpaduan Teras Kejayaan
20091Malaysia - Rakyat Didahulukan, Pencapaian Diutamakan
20101Malaysia Menjana Tranformasi
20111Malaysia. Transformasi Berjaya, Rakyat Sejahtera.
20121Malaysia. Janji Ditepati[1]
Berikut merupakan tema-tema Hari Kebangsaan dari tahun 1970 sehingga kini.

Tuesday 24 April 2012


Network devices are components used to connect computers or other electronic devices together so that they can share files or resources like printers or fax machines. Devices used to setup a Local Area Network (LAN) are the most common type of network devices used by the public. A LAN requires a hub, router, cabling or radio technology, network cards, and if online access is desired, a high-speed modem. Happily this is much less complicated than it might sound to someone new to networking.
In a network, one computer is designated as the server, and the others, clients. The server is connected to an external hub, which the clients are also connected to. Now that the computers each have one foot in a common electronic door (the hub), they can use the hub to pass signals back and forth. To direct these signals, the hub contains a device known as a router. The router is the equivalent of an electronic traffic cop that handles data traffic between the computers.
Sounds good, but how does the router know one computer from another? The answer is that every computer in the network must have a network card installed. These network devices each contain a unique address. In a hard-wired network, special cabling called Ethernet runs from the network card to the hub. In a wireless network the nNetwork cards identify themselves on the network, sending all requests to the router with the unique return-address included. The router reads the “To” address and “From” address, and routes the traffic accordingly. In other types of networks all requests made on the localnetwork are broadcast by the router to all machines on the network, but only the machine with the matching address responds, however this isn’t as secure because other machines can trap traffic that is not addressed to them.
Online access is optional in a local area network, but if included, a single online account can be shared by all computers on the network. When online access is available, the router not only directs traffic on the local network, but also handles requests made to the Internet and subsequent replies. The router acts as a gateway to the Internet, and also serves as ahardware firewall to keep unsolicited traffic from flowing back into the network from the wild.
One can add online access to a LAN by either attaching a router/hub to a high-speed modem, or by acquiring a high-speed modem that has a router/hub built-in. The high-speed modem must be compatible with the online service. Most modems are designed specifically for use with DSL, cable or fiber optics, though some models might be made to work with more than one technology, such as being DSL and cable compatible.
When setting up a LAN all network devices must be compatible. If building a hard-wired LAN using Ethernet cabling, the network cards will be designed with an Ethernet port. If building awireless LAN, all network devices must not only be designed for wireless use, but must speak the same wireless language or protocol. As of spring 2009 the fastest and most current protocol available is 802.11n, while the older protocol still in widespread use is 802.11g. The router/modem and network cards must all be compatible with the same protocol to communicate with one another.
Wireless network devices can also carry Wi-Fi® certification, guaranteed to be fully compliant with the standards or protocol(s) that the product supports. Wi-Fi certification comes from the Wi-Fi Alliance, the organization responsible for developing wireless protocols. Many wireless network devices are marketed as being compatible with one or more protocols, but lack certification. The guarantee might be an important consideration when setting up a business LAN, but probably isn’t a concern for home LANs.etwork cards and router/hub communicate using radio waves.

Sunday 22 April 2012


What is a Topology?

The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should not be confused with logical topology which is the method used to pass information between workstations. Logical topology was discussed in the Protocol chapter.

 MainTypes of Physical Topologies

The following sections discuss the physical topologies used in networks and other related topics.

 BusLinear

A linear bus topology consists of a main run of cable with a terminator at each end (See fig. 1). All nodes (file server, workstations, and peripherals) are connected to the linear cable.
Fig. 1. Linear Bus topology

Advantages Linear Bus Topology

  • Easy to connect a computer or peripheral to a linear bus.
  • Requires less cable length than a star topology.

Disadvantages of a Linear Bus Topology

  • Entire network shuts down if there is a break in the main cable.
  • Terminators are required at both ends of the backbone cable.
  • Difficult to identify the problem if the entire network shuts down.
  • Not meant to be used as a stand-alone solution in a large building.

Star

A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub, switch, or concentrator (See fig. 2).
Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The hub, switch, or concentrator manages and controls all functions of the network. It also acts as a repeater for the data flow. This configuration is common with twisted pair cable; however, it can also be used with coaxial cable or fiber optic cable.
Fig. 2. Star topology

Advantages of a Star Topology

  • Easy to install and wire.
  • No disruptions to the network when connecting or removing devices.
  • Easy to detect faults and to remove parts.

Disadvantages of a Star Topology

  • Requires more cable length than a linear topology.
  • If the hub, switch, or concentrator fails, nodes attached are disabled.
  • More expensive than linear bus topologies because of the cost of the hubs, etc.

Tree or Expanded Star

A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured workstations connected to a linear bus backbone cable (See fig. 3). Tree topologies allow for the expansion of an existing network, and enable schools to configure a network to meet their needs.
Fig. 3. Tree topology

Advantages of a Tree Topology

  • Point-to-point wiring for individual segments.
  • Supported by several hardware and software venders 

    Disadvantages of a Tree Topology

  • Overall length of each segment is limited by the type of cabling used.
  • If the backbone line breaks, the entire segment goes down.
  • More difficult to configure and wire than other topologies.

5-4-3 Rule

A consideration in setting up a tree topology using Ethernet protocol is the 5-4-3 rule. One aspect of the Ethernet protocol requires that a signal sent out on the network cable reach every part of the network within a specified length of time. Each concentrator or repeater that a signal goes through adds a small amount of time. This leads to the rule that between any two nodes on the network there can only be a maximum of 5 segments, connected through 4 repeaters/concentrators. In addition, only 3 of the segments may be populated (trunk) segments if they are made of coaxial cable. A populated segment is one that has one or more nodes attached to it . In Figure 4, the 5-4-3 rule is adhered to. The furthest two nodes on the network have 4 segments and 3 repeaters/concentrators between them.
NOTE: This rule does not apply to other network protocols or Ethernet networks where all fiber optic cabling or a combination of a fiber backbone with UTP cabling is used. If there is a combination of fiber optic backbone and UTP cabling, the rule would translate to a 7-6-5 rule.The speed of networking switches is vastly improved over older technologies, and while every effort should be made to limit network segment traversal, efficient switching can allow much larger numbers of segments to be traversed with little or no impact to the network.

Considerations When Choosing a Topology

  • Money. A linear bus network may be the least expensive way to install a network; you do not have to purchase concentrators.
  • Length of cable needed. The linear bus network uses shorter lengths of cable.
  • Future growth. With a star topology, expanding a network is easily done by adding another concentrator.
  • Cable type. The most common cable in schools is unshielded twisted pair, which is most often used with star topologies.

Summary Chart

Physical Topology Common Cable   Common Protocol
Linear Bus Twisted Pair
Coaxial
Fiber
Ethernet
Star Twisted Pair        
Fiber
Ethernet
Tree Twisted Pair
Coaxial
Fiber
Ethernet

Sunday 18 March 2012

motherboard

storage

In a computer, storage is the place where data is held in an electromagnetic or optical form for access by a computer processor. There are two general usages.
1) Storage is frequently used to mean the devices and data connected to the computer through input/output operations - that is, hard disk and tape systems and other forms of storage that don't include computer memory and other in-computer storage. For the enterprise, the options for this kind of storage are of much greater variety and expense than that related to memory. This meaning is probably more common in the IT industry than meaning 2.
2) In a more formal usage, storage has been divided into: (1) primary storage, which holds data in memory (sometimes called random access memory or RAM


) and other "built-in" devices such as the processor's L1 cache, and (2) secondary storage, which holds data on hard disks, tapes, and other devices requiring input/output operations.
Primary storage is much faster to access than secondary storage because of the proximity of the storage to the processor or because of the nature of the storage devices. On the other hand, secondary storage can hold much more data than primary storage.
In addition to RAM, primary storage includes read-only memory (ROM) and L1 and L2 cachememory. In addition to hard disks, secondary storage includes a range of device types and technologies, including diskettes, Zip drives, redundant array of independent disks (RAID) systems, and holographic storage. Devices that hold storage are collectively known asstorage media.
A somewhat antiquated term for primary storage is main storage and a somewhat antiquated term for secondary storage is auxiliary storage. Note that, to add to the confusion, there is an additional meaning for primary storage that distinguishes actively used storage from backup storage.

output divice

Output devices are things we use to get information OUT of a computer.
Here are some examples of output devices.
Monitor - A monitor is the screen on which words, numbers, and graphics can be seem.  The monitor is the most common output device.
Compact Disk - Some compact disks can be used to put information on.  This is called burning information to a CD.
NOTE:  A CD can also be an input device.
Printer - A printer prints whatever is on the monitor onto paper.  Printers can print words, numbers, or pictures.
Speaker - A speaker gives you sound output from your computer.  Some speakers are built into the computer and some are separate.
Disk Drives - A disk drive is used to record information from the computer onto a floppy disk or CD.
Floppy Disk - A floppy disk is used to record information on.  The information is stored on the floppy disk and can be used later or used on another computer.
Headphones - Headphones give sound output from the computer.  They are similar to speakers, except they are worn on the ears so only one person can hear the output at a time.

input device

Input devices are things we use to put information INTO a computer.
Here are some examples of input devices.
Note:  An APPLICATION is a type of computer program.
Some applications are word processing, spreadsheets, databases, and games.



Camera - most cameras like this are used during live conversations.  The camera transmits a picture from one computer to another, or can be used to record a short video.
Compact Disc (CD) - CDs store information.  The CD can then be put into another computer, and the information can be opened and added or used on the second computer.
Note:  A CD-R or CD-RW can also be used as an OUTPUT device.

Keyboard - The keyboard is a way to input letters or numbers into different applications or programs.  A keyboard also has special keys that help operate the computer.
Mouse - The mouse is used to open and close files, navigate web sites, and click on a lot of commands (to tell the computer what to do) when using different applications.
Digital Camera - A digital camera can be used to take pictures.  It can be hooked up to a computer to transfer the pictures from the camera to the computer.  Some digital cameras hold a floppy disk, and the floppy disk can be taken out of the camera and put directly into the computer.
Drawing Tablet - A drawing tablet is similar to a white board, except you use a special pen to write on it and it's connected to the computer.  Then the word or image you draw can be saved on the computer.
Microphone - A microphone is used to record sound.  The sound is then saved as a sound file on the computer.
Scanner - A scanner is used to copy pictures or other things and save them as files on the computer. 
Disk Drive - A disk drive can hold a CD or a floppy disk.  It reads the information on the disk so that the computer can use it.
Joystick - A joystick is used to move the cursor from place to place, and to click on various items in programs.  A joystick is used mostly for computer games.
Touch Screen - A touch screen is a computer screen or other screen that you can touch with your finger to enter information.  Examples of touch screens include a smart board, a microwave, a dishwasher, or an ATM at a bank.
Bar Code Scanner - A bar code scanner scans a little label that has a bar code on it.  The information is then saved on the computer.  Bar code scanners are used in libraries a lot.

Friday 24 February 2012


What is Intellectual Property?
Intellectual property is any innovation, commercial or artistic, or any unique name, symbol, logo or design used commercially.
Intellectual property is protected by
•  patents on inventions;
•  trademarks on branding devices;
•  copyrights on music, videos, patterns and other forms of expression;
•  trade secrets for methods or formulas having economic value and used commercially

Computer Crime And Security

Introduction
Data technologies poses numerous threats to businesses, institutions and people alike. Personal computer related threats might be either unintended or intended. Individuals with criminal intentions normally conduct the latter. Technology has transformed seemingly timid individuals into high tech criminals. In the past, one could simply utilize Security camera systems for protection, but not with these types of attacks. They have the potential to destroy the integrity or confidentiality of documents thus utilizing the information for their own ill intentioned purposes. The essay shall examine web crime and methods one can deal with it through IT security. (Honeynet, 2005)
How personal computer crime occurs
The world today is filled with malicious, careless or unscrupulous people. Some internet crimes are committed by members of the same organization although others could be committed by specialists who may have specialized in on-line crime. (Honeynet, 2005)
The initial category of criminals are disloyal staff members. These are individuals who have access to sensitive data and decide to dispense it to companies competitors or to company enemies. In such companies, employees have minimal sense of responsibility. It is likely that when they dispense sensitive data to competitors, they get material advantages in return. Ultimately, companies loose their competitive benefit.
Computer crime might happen in the form of unauthorized access to data. Here, people can gain access to information by figuring out passwords. In this case, passwords that are really obvious or those one that are shorter than six letters or also those ones that have been utilized for too lengthy are particularly susceptible.
Sometimes, the individuals who could bring about serious security threats are administrators themselves. Companies that face the highest risk are those ones that have 1 system both for normal production and for other specialized purposes. Also, such firms tend to give privileges to personal computer programmers who could abuse their positions. It is also likely that such businesses do not have a two-sided system of clarification. (Mandia and Prosise, 2001)
1 can assert that the worst threat emanates from external sources. For instance, some people may possibly specialize in permeating firewalls. Besides that, there are some personal computer wizards who know methods of dodging firewalls. Such wizards may access info or they may send harmful viruses, worms or other kinds of software program that might grow to be dangerously hazardous. There are pc wizards who dedicate a lot of time creating these viruses so that they can destroy innocent user’s info. The victim is then forced to contact them and invest substantial amounts of cash to eradicate the virus. Others have the capability of altering information with out knowledge from the user. Here, they master the architecture of the laptop or computer and then manipulate it. (Oaks, 2002)
At other times, it is likely that a malicious individual gets hold of back up storage data. Businesses that are most susceptible to this kind of crime are those ones are those ones that do not lock up their back up media appropriately or those ones with loose rules about accessing firm archives. (Viega and McGraw, 2004)
Approaches of enhancing net security
Prevention
This kind of approach refers to limiting the level of data available to personnel. In this case, businesses can guarantee that their employees only gain access to data that they will need to complete certain tasks. This indicates that even those who modify info really should only do this inside their own jurisdictions. Additionally, businesses really should restrict data availability fully for documents that are extremely sensitive. (Roily, 2007)
All the latter categories ought to be determined by the process of information classification. 1 can define data classification as the method of labeling information on the basis of security vulnerability or sensitivity. Organizations ought to location their documents into the following categories
Top secret
Open
Secret
Confidential
The classification system is the 1st step in protecting one’s documents because it lays out the significant framework for security. The person who really should do the classification is the owner of the details. Besides the latter, it is extremely needed for businesses to document all the classifications systems inside a security handbook. This is instrumental in the event that a security crisis occurs. (Fraser et al, 2005)
Policy changes
No approach of data security can be profitable without having changing the policies and procedures within organizations. Organizations should struggle to produce an environment where workers respect the problem of internet security. Here, it would be necessary to generate a disciplined environment where work practices foster details security. Additionally, those men and women who are given confidential info need to be capable of maintaining its integrity. This means that they should be trustworthy. Companies ought to also explain to their staff about the most vital data and information that is not. This means that a significant percentage of them will need to keep off sensitive data. (Garfinkel, 2001)
Organizations ought to train their employees about security threats. Here, the training sessions are supposed to inform the employees about how to use security tools, how to detect threats and how to deal with them. Here, employees need to know the experts they can contact in case of a perceived security threat. Besides that, they really should also be informed about how to make back up systems. Training is specifically essential for new employees within the company.
Clarification of problems
Security threats differ from company to organization. Some groups could be very vulnerable to internet crime even though some may possibly not. Consequently, guidelines ought to be laid out as to what constitutes a security threat and how vulnerable 1 is. The following should be outlined clearly
Security targets
Principles of info classification
Responsible personnel
Principles for reaching targets
In line with the latter, organizations really should develop a well laid out security plan. Even though curbing net crime can be carried out in variety of methods, businesses should prioritize the most essential security measures. Management and users will need to be told about their responsibilities. (Grimes, 2004)
Implementing web security
Security implementation can be carried out through a variety of methods. The 1st one is by means of authorization. Authorization ought to be accomplished via two key steps validation and identification.
Identification can be carried out via basic or far more complicated techniques. Some firms opt to use password systems. Here, particular people are given passwords that act as keys to info. Businesses that manage to use this system successfully are those ones that have one password for every individual. When everyone can use a password, then it makes it a lot less complicated for net crime to happen. Great passwords must be distinct, ought to be changed often and ought to not be repeated if they had ever been used in the past. Lastly, passwords need to be changed when people leave job positions or change departments. (Dekker, 2006)
These days, security systems have improved tremendously. The latter technique of passwords merely depends on something that a user possesses. However, far more powerful security measures depend on issues that one has and things that one knows. For example, an organization could ask for a password along with a magnetic card in order to enhance security.  The magnetic card contains some confidential details which can be identified by the personal computer system. Additionally, companies can use chip cards. The chip usually has memory. (Van and Forno, 2001)
A far more successful system is one that combines, some thing one has, with something 1 owns and some thing that is such as biometric systems. Here, people are only allowed to access particular categories of info soon after their physical functions have been verified. 1 of the examples consists of finger print and retina patterns.
Internet security can also be enhanced via backing up information. This is due to the fact some viruses have the capacity to destroy ones’ documents entirely. In order to counter such actions, then it is necessary for businesses or individuals  back up their data through another system of storage such as a removable device. The device can then be placed in a locked cabinet or a location that is completely secured.
Organizations should be careful about their back up systems since one can focus on the primary source of info and then ignore the other source of info. This means that in case the main details is destroyed, 1 would be forced to contend with obsolete info. Organisations need to be keen about editing and changing their back up details from time to time. This will go a lengthy way in promoting the reliability of the back up systems (Anderson, 2003)
Alternatively, organizations can choose to set up firewalls for their information. This is a system that prevents access to information between two networks. Firewalls can be divided into two. Some of them focus on restricting access although other people dwell on permitting selective access.  A packet filter firewall allows packets of details to enter a protected server or they may have the ability to block those respective packets. The other kind of firewall called the application gateway is 1 that acts as a go between two servers by addressing packets to user application. (Zwicky et al, 2000)
Conclusion
The proliferation of Information Technology into all aspects of life has made users really vulnerable. Personal computer crimes could happen via a number of strategies and seriously compromise the user’s functions. It is as a result needed to implement a wide range of security measures that can avoid world wide web crime. Some of these measures contain preventive measures, changing security policies, creating data back ups, making use of firewalls, using biometrics, employing efficient passwords and lastly utilizing tangible methods of identification such as magnetic cards.
CONTROVERSIAL CONTENT
CONTROVERSIAL CONTENT
A controversial content is information that causes disagreement in opinions and may cause
the disruption of peace because different people or culture will have different views about the
contents.
ISSUES ON CONTROVERSIAL CONTENTS
The issues on controversial contents are always focusing on
pornography and slander. Malaysia considers pornography and slander
as illegal.
Pornographic and slanderous activities can be in the forms of plots and
actions displayed on video games, controversial rhythm or lyrics of
music, controversial contents of books and controversial issues on
religion and philosophy.
Pornography: Creative activity (writing or pictures or films etc.) of no literary or artistic value
other than to stimulate sexual desire.
Slander:  Oral communication of false statements injurious to a person's reputation. A false
and malicious statement or report about someone.
DEFINITION OF PORNOGRAPHY
The definition of pornography is any form of media  or material (like books or photographs)
that depicts erotic behaviour and is intended to cause sexual excitement. Pornography tends
to exploit men, women and children in a distasteful manner.
SLANDER
Slander is another example of controversial content.
Slander is a legal term for false and malicious statement (meaning knowing
that it is false, or “reckless disregard” that it was false) about someone.
Examples :
You wrote an e-mail that a fellow classmate was having an affair with a teacher, even though
it was not true. You then sent it to five other friends.
Ahmad is a muslim. One day, he received a “spam” e-mail stating that his favourite soda drink
“Moda Soda” uses non-halal food colouring, but he does not know if the source of the content
is credible or true.  He decides to forward the e-mail to 50 of his friends.
Chin Wei spreads a rumour that a Government Minister is receiving bribes from an enemy
government.
IMPACTS ON MALAYSIAN SOCIETY
Pornography
• can lead to criminal acts such as exploitation of women and children
• can lead to sexual addiction or perversion
• can develop low moral value towards other men, women or children
• can erode good religious, cultural and social beliefs and behaviour
Slander
• can develop into a society that disregards honesty and truth  
• can develop bad habit of spreading untruths and rumours
• can lead to unnecessary argument
• can cause people to have negative attitudes towards another person

Privacy and technology

Advertisement for dial telephone service available to delegates to the 1912 Republican convention in Chicago. A major selling point of dial telephone service was that it was "secret", in that no operator was required to connect the call.
As technology has advanced, the way in which privacy is protected and violated has changed with it. In the case of some technologies, such as the printing press or the Internet, the increased ability to share information can lead to new ways in which privacy can be breached. It is generally agreed [7] that the first publication advocating privacy in the United States was the article by Samuel Warren and Louis BrandeisThe Right to Privacy, 4 Harvard L.R. 193 (1890), that was written largely in response to the increase in newspapers and photographs made possible by printing technologies.[8]
New technologies can also create new ways to gather private information. For example, in the U.S. it was thought that heat sensors intended to be used to find marijuana growing operations would be acceptable. However in 2001 in Kyllo v. United States(533 U.S. 27) it was decided that the use of thermal imaging devices that can reveal previously unknown information without a warrant does indeed constitute a violation of privacy.[9]
Generally the increased ability to gather and send information has had negative implications for retaining privacy. As large scale information systems become more common, there is so much information stored in many databases worldwide that an individual has no practical means of knowing of or controlling all of the information about themselves that others may have hold or access. Such information could potentially be sold to others for profit and/or be used for purposes not known to or sanctioned by the individual concerned. The concept of information privacy has become more significant as more systems controlling more information appear. Also the consequences of privacy violations can be more severe. Privacy law in many countries has had to adapt to changes in technology in order to address these issues and, to some extent, maintain privacy rights. But the existing global privacy rights framework has also been criticized as incoherent and inefficient. Proposals such as the APEC Privacy Framework have emerged which set out to provide the first comprehensive legal framework on the issue of global data privacy.

[edit]Privacy and the Internet

The Internet has brought new concerns about privacy in an age where computers can permanently store records of everything: "where every online photo, status update, Twitter post and blog entry by and about us can be stored forever," writes law professor and author Jeffrey Rosen.[10]
This currently has an effect on employment. Microsoft reports that 75 percent of U.S. recruiters and human-resource professionals now do online research about candidates, often using information provided by search engines, social-networking sites, photo/video-sharing sites, personal web sites and blogs, and Twitter. They also report that 70 percent of U.S. recruiters have rejected candidates based on internet information.[10] This has created a need by many to control various online privacy settings in addition to controlling their online reputations, both of which have led to legal suits against various sites and employers.[10]
The ability to do online inquiries about individuals has expanded dramatically over the last decade. Facebook for example, as of July 2010, was the largest social-networking site, with nearly 500 million members, or 22 percent of all Internet users, who upload over 25 billion pieces of content each month. Twitter has more than 100 million registered users. The Library of Congress recently announced that it will be acquiring — and permanently storing — the entire archive of public Twitter posts since 2006, reports Rosen.[10]
According to some experts, many commonly used communication devices may be mapping every move of their users. Senator Al Franken has noted the seriousness of iPhones and iPads having the ability to record and store users locations in unencrypted files,[11] although Apple denied doing so.[12]
Andrew Grove, co-founder and former CEO of Intel Corporation, offered his thoughts on internet privacy in an interview in 2000:[13]
Privacy is one of the biggest problems in this new electronic age. At the heart of the Internet culture is a force that wants to find out everything about you. And once it has found out everything about you and two hundred million others, that's a very valuable asset, and people will be tempted to trade and do commerce with that asset. This wasn't the information that people were thinking of when they called this the information age.

[edit]