ICT Omnipresence and the Rights to Privacy

Abdulkadir Bolaji Abdulkadir, Abdulrazaq Owolabi Abdulkadir

Abstract


The development of technology and online communication has also led to the appearance of what seem to be certain new types of criminal activity. Cyber security faced difficulties as a result of the rise in criminal behavior and the potential for the creation of new types of criminal activity online. This study evaluates the value of cyber security in an effort to stop cybercrimes based on this assumption. The research methodology used in this work is triangulation, which entails using many approaches to corroborate findings. The goal of this essay is to strike a balance between the requirement for cybersecurity and cybercrimes prevention and the right to privacy.


Keywords


Omnipresence; ICT; security, right; privacy

Full Text:

PDF

References


Abdulkadir, A.B. & Abdulkadir, A.0. 2019. Cybercrimes Act in Nigeria: Experimenting compliance with internationally recognized human rights provisions. Journal of International Studies 15: 119.

American Declaration of the Rights and Duties of Man 1992.

Anon. 2004. Florida Cyber-Security Manual. Secure Florida. https://secureflorida.org [7 October 2019].

Anon. 2013. Types/Incidences of Cybercrime in Nigeria. Martins Library. http://martinslibrary/blogspot. com/2013/08/type-incidence-of-cybercrime-in-nigeria.html [14 July 2017].

Arquilla, J. & Ronfeldt, D. 1993. Cyberwar is coming. Comparative Strategy 12(2): 141-165. https://doi. org/10.1080/01495939308402915.

Barlow, J.P. 1996. A Declaration of the Independence of Cyberspace. Electronic Frontier Foundation, 8 February. https://www.eff.org/cyberspace-independence [7 October 2019].

Berlin, I. 1958. Two Concepts of Liberty. Oxford: Clarendon Press.

Cairo Declaration on Human Rights in Islam, (UN Doc A/45/421/5/21797, 199).

Carter, D.L. 1995. Computer Crime Categories: How Techno-Criminals Operate. FBI Law Enforcement Bulletin. www.fiu.edu/~cohne/Theory%20F08/ Ch%2014%20- %20Types%20of%20computer%20 crime.pdf [1 March 2023].

Charney, S. 1994. Computer Crime: Law enforcement’s shift from a corporeal environment to the intangible, electronic world of cyberspace. Federal Bar News 41(7): 489.

Clarke, R. 2006. What’s ‘Privacy’? Workshop at the Australian Law Reform Commission, 28 July. http:// www.rogerclarke.com/DV/Privacy.html [14 July 2017].

Constitution of the Federal Republic of Nigeria 1999 [as amended] 2011.

Crimes related to computer networks. 2000. Background paper for the workshop on crimes related to the computer network, 10th UN Congress on the Prevention of Crime and the Treatment of Offenders, A/CONF.187/10. http://www.uncjin.org/Documents/ congr10/10e.pdf [1 March 2023].

Devlin, J.M. 1990. State Constitutional autonomy rights in an age of Federal retrenchment: Some thoughts on the interpretation of State rights derived from Federal sources. Emerging Issues in State Constitutional Law 3: 197.

Emmanuel, O. 2013. Elbit Systems officials arrive, begin installation of $ 40 million internet spy facility for Nigeria. Premium Times, 26 November. https:// www.premiumtimesng.com/news/150333-exclusive-elbitsystems-officials-arrive-begin-installation-40- million-internet-spy-facility-nigeria.html [7 October 2014].

Fried, C. 1968. Privacy. The Yale Law Journal 77(3): 475-493.

Goffman, E. 1963. Behavior in Public Places. New York: Free Press of Glencoe.

Goffman, E. 1959. The Presentation of Self in Everyday Life. New York: Anchor Books/Doubleday.

Goodman, M.D. 1997. Why the policy don’t care about computer crime. Harvard Journal of Law & Technology 10(3): 466-494.

Hale, C. 2002. Cybercrime: Facts & figures concerning this global dilemma. Crime & Justice International 18(65). http://www.cjcenter.org/cjcenter/publications/ cji/archives/cji.php?id=37 [7 October 2019].

Hare, F. 2009. Borders in cyberspace: Can sovereignty adapt to the challenges of cyber security? In Czosseck, C. & Geers, K. (eds.). The Virtual Battlefield: Perspectives on Cyber Warfare. Amsterdam: IOS Press.

Human Rights Indicators: A Guide to Measurement and Implementation. 2013. Office of the High Commissioner for Human Rights, https://unp.un.org/ Details.aspx?pid=23745 [1 December 2018].

International Covenant on Civil and Political Rights 1966.

Irwin, L. 2022. The GDPR: What Exactly is Personal Data. IT Governance, 22 March. https://www. itgovernance.eu/blog/en/the-gdpr-what-exactly-is-personal-data [4 February 2023].

Jarvis, J. 2010. A Bill of Rights in Cyberspace. Buzz Machine, 27 March. http://buzzmachine. com/2010/03/27/a-bill-of-rights-in-cyberspace [7 October 2019].

Kiskis, M. 2011. Entrepreneurship in Cyberspace: What do we know? Social Technologies 1(1): 37-48.

Konvitz, M.R. 1966. Privacy and de Law: A Philosophical Prelude. Law and Contemporary Problems 31: 272- 280.

Merrills, J.G. 1993. The Development of International Law by the European Court of Human Rights. 2nd Edn. Manchester University Press.

Nissenbaum, H. 1997. Toward an approach to privacy in public: Challenges of information technology. Ethics & Behavior 7(3): 207-219. http://www.nyu.edu/ projects/nissenbaum/papers/toward_an_approach.pdf [7 October 2019].

Prosser, W.L. 1960. Privacy. California Law Review 48: 383-423. http://dx.doi.org/10.2307/3478805.

Ranking Digital Rights project. Business and Human Right Resource Center. http://www.business-humanrights.org/Documents/Ranking_Digital_ Rights [1 December 2013].

Report of the World Conference on Human Rights by the UN Secretary-General. 1993, UN Doc, GA A/CONF.157/24 (Part I). http://www. unhchr.ch/Huridocda/Huridoca.nsf/(Symbol)/A. CONF.157.24+(Part+I).En [14 July 2017].

Rodriguez, K. 2013. Internet Surveillance and Free Speech: the United Nations Makes the Connection. Electronic Frontier Foundation, 4 June. https://www. eff.org/deeplinks/2013/06/internet-and-surveillance- UN-makes-the-connection [7 October 2019].

Rushinek, A. & Rushinek, SF. 1993. Using experts for detecting and litigating computer crime. Managerial Auditing Journal 8(7): 19-22.

Simpson, D. 2000. Feds Find Dangerous Cyber stalking Hard to Prevent. CNN, 12 June. https://edition.cnn. com/2000/TECH/computing/06/12/cyberstalkers.idg/ index.html [14 July 2017].

The promotion, protection and enjoyment of human rights on the Internet. 2012. UN Doc. Doc. A/HRC/20/L.13. Human Rights Council, 29 June.

Turkington, R.C. & Allen, A.L. 2002. Privacy Law: Cases and Materials. 2nd Edn. St. Paul: West Group.

Warren, S.D. & Brandeis, L.D. 1890. The right to privacy. Harvard Law Review 4(5): 193-220.


Refbacks

  • There are currently no refbacks.