International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 149 - Number 7 |
Year of Publication: 2016 |
Authors: Sheema Zia, Afshar Alam |
10.5120/ijca2016910234 |
Sheema Zia, Afshar Alam . Incentives for and Against Pervasive Monitoring Threats. International Journal of Computer Applications. 149, 7 ( Sep 2016), 6-10. DOI=10.5120/ijca2016910234
Pervasive is defined as ‘spreading widely throughout an area or a group of people (Especially of an unwelcome influence or effect’. Pervasive monitoring is simply a case of continuous monitoring of people for the sake of checking conduct or watching over. After the recent Snowdonia occurrence, where Edward Snowden leaked classified information about the ongoing surveillance programs by the NSA of United States, pervasive monitoring became a hot topic of discussion and if it was beneficial for the users or internet or posed as a threat. The objective of the paper is to analyze whether pervasive monitoring is a threat or a necessity and also to compare the benefits and challenges of pervasive monitoring. The comparison between the importance of pervasive monitoring and that of its ill-effect argue that it helps in combating terrorism as it is unbiased and non-targeted. Moreover, it does not collect the meta-data but, only collects it. Besides its importance, it is also essential for network administrators to have plaintext for managing their networks. On the other hand, the STRINT workshop by IETF called it a technical attack same as any attack as it leads to some chilling effects like self censorship etc. If pervasive monitoring is being done by an organisation, it can lead to the database holder or admin to exercise undue influence on the employees of the organisation undergoing the monitoring. Even though it is against the basic human right to privacy but the public does not seem to care too much about it. The pervasive nature of this monitoring might help the governments but also has adverse affect. The beneficial and destructive effects of pervasive monitoring are tabulated according to different fields pervasive monitoring is done for. This includes the fields of organisation, future, software, law, networking and healthcare. Considering all the researched and analyzed fields, it can be stated that pervasive monitoring should be allowed at some levels as it becomes a necessity and also have some standards and protocols so as not to be misused for personal issues or motives. The standards and policies should be defined for all internet traffic without any bias whatsoever.