Everyone is「Truman」:Conflict of technology control,Human Rights and national security
碩士 === 國立中正大學 === 戰略暨國際事務研究所 === 103 === National security is an important issue to respect for every country's ruler. Especially, after the terrorist attacks in the United States, each country will be counter-terrorism as an important indicator of national affairs. When Snowden events Occurred...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2015
|
Online Access: | http://ndltd.ncl.edu.tw/handle/qt56px |
id |
ndltd-TW-103CCU00322012 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-103CCU003220122019-05-15T21:59:30Z http://ndltd.ncl.edu.tw/handle/qt56px Everyone is「Truman」:Conflict of technology control,Human Rights and national security 人人都是「楚門」:科技監控與人權、國家安全之關聯 YANG HSUAN LING 楊璿凌 碩士 國立中正大學 戰略暨國際事務研究所 103 National security is an important issue to respect for every country's ruler. Especially, after the terrorist attacks in the United States, each country will be counter-terrorism as an important indicator of national affairs. When Snowden events Occurred in May 2014, and Taiwan also occurred phone tapping controversy Politically. We must think in the premise of safeguarding national security, whether excessive violations of human rights. Use of monitoring equipment, originated in invention of technological equipment. The present day, everything is connected to the network information, in order to protect national security, each of our behavior seems to be uncovered to spread under the sunlight.In recent years, began to promote the basic rights of the people. In the twentieth century, the United States was the first country to "privacy" seriously, "privacy" was interpreted as a kind of "the right to be let alone", we can not give up privacy for national security. We use the way of monitoring, surveillance and search network information, In order to achieve the purpose of criminal investigation and safeguarding national security, whether it will conflict between monitoring equipment and National Security, the reason is that the purpose of the use of the product. When we use on the legitimate, although the violation of basic rights of the people, based on a measure of national public interest, such an approach should be accepted. People have become accustomed to rely on high-tech products. Absolutely impossible to prevent data to be theft or to avoid unauthorized use of doubts, then Abandon to use, Let yourself return to primitive life(NO TECHNOLOGY LIFE) is difficult! When we use these devices, which is transferred to the privacy management technology equipment; Therefore, before using it should be possible to expect to be violated, the ultimate result of technological development is causing humans from nature. Views about the importance of privacy, people are not allowed to be infringement outside. But in fact, we often ignore the safety of self-protection, according to browse the internet and basic personal information registered through the internet platform, people usually do not go to peruse the contents of web pages for privacy, just because we are accustomed to the norm, we often forget the sense of self-protection; Government must establish clear legal and effective control and people's self-restraint, in order to stop the abuse of high-tech, and the use of equipment in proper purposes— the purpose of safeguarding national security. And now the three major technological equipment that is smart phones, monitors and Internet, These three technological equipment for the maintenance of global security, social and personal have great impact, we can't be ignored. Yu-tai Ts'ai 蔡育岱 2015 學位論文 ; thesis 170 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中正大學 === 戰略暨國際事務研究所 === 103 === National security is an important issue to respect for every country's ruler. Especially, after the terrorist attacks in the United States, each country will be counter-terrorism as an important indicator of national affairs. When Snowden events Occurred in May 2014, and Taiwan also occurred phone tapping controversy Politically. We must think in the premise of safeguarding national security, whether excessive violations of human rights.
Use of monitoring equipment, originated in invention of technological equipment. The present day, everything is connected to the network information, in order to protect national security, each of our behavior seems to be uncovered to spread under the sunlight.In recent years, began to promote the basic rights of the people. In the twentieth century, the United States was the first country to "privacy" seriously, "privacy" was interpreted as a kind of "the right to be let alone", we can not give up privacy for national security.
We use the way of monitoring, surveillance and search network information, In order to achieve the purpose of criminal investigation and safeguarding national security, whether it will conflict between monitoring equipment and National Security, the reason is that the purpose of the use of the product. When we use on the legitimate, although the violation of basic rights of the people, based on a measure of national public interest, such an approach should be accepted.
People have become accustomed to rely on high-tech products. Absolutely impossible to prevent data to be theft or to avoid unauthorized use of doubts, then Abandon to use, Let yourself return to primitive life(NO TECHNOLOGY LIFE) is difficult! When we use these devices, which is transferred to the privacy management technology equipment; Therefore, before using it should be possible to expect to be violated, the ultimate result of technological development is causing humans from nature.
Views about the importance of privacy, people are not allowed to be infringement outside. But in fact, we often ignore the safety of self-protection, according to browse the internet and basic personal information registered through the internet platform, people usually do not go to peruse the contents of web pages for privacy, just because we are accustomed to the norm, we often forget the sense of self-protection; Government must establish clear legal and effective control and people's self-restraint, in order to stop the abuse of high-tech, and the use of equipment in proper purposes— the purpose of safeguarding national security.
And now the three major technological equipment that is smart phones, monitors and Internet, These three technological equipment for the maintenance of global security, social and personal have great impact, we can't be ignored.
|
author2 |
Yu-tai Ts'ai |
author_facet |
Yu-tai Ts'ai YANG HSUAN LING 楊璿凌 |
author |
YANG HSUAN LING 楊璿凌 |
spellingShingle |
YANG HSUAN LING 楊璿凌 Everyone is「Truman」:Conflict of technology control,Human Rights and national security |
author_sort |
YANG HSUAN LING |
title |
Everyone is「Truman」:Conflict of technology control,Human Rights and national security |
title_short |
Everyone is「Truman」:Conflict of technology control,Human Rights and national security |
title_full |
Everyone is「Truman」:Conflict of technology control,Human Rights and national security |
title_fullStr |
Everyone is「Truman」:Conflict of technology control,Human Rights and national security |
title_full_unstemmed |
Everyone is「Truman」:Conflict of technology control,Human Rights and national security |
title_sort |
everyone is「truman」:conflict of technology control,human rights and national security |
publishDate |
2015 |
url |
http://ndltd.ncl.edu.tw/handle/qt56px |
work_keys_str_mv |
AT yanghsuanling everyoneistrumanconflictoftechnologycontrolhumanrightsandnationalsecurity AT yángxuánlíng everyoneistrumanconflictoftechnologycontrolhumanrightsandnationalsecurity AT yanghsuanling rénréndōushìchǔménkējìjiānkòngyǔrénquánguójiāānquánzhīguānlián AT yángxuánlíng rénréndōushìchǔménkējìjiānkòngyǔrénquánguójiāānquánzhīguānlián |
_version_ |
1719121859192029184 |