Introducing computing and IT
Introducing computing and IT

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

Free course

Introducing computing and IT

Security and risk

The twentieth century saw a dramatic change in the role of the state in many countries. During most of the nineteenth century, an individual might only have come into contact with the state for the purposes of taxation, marriage and death. At the end of that century and the beginning of the next, however, a series of social revolutions saw the state becoming involved in our health care, pensions and education. Unsurprisingly, each of these developments was accompanied by a significant increase in the amount of personal information stored about every one of us.

Computer technologies were developed especially to serve the enormous projects involved. IBM became a highly successful company due to its work on censuses in the USA and Europe, while the world’s first business computer, LEO, was used for a variety of tasks including the calculation of tax tables for the British Treasury in the 1950s.

With the vast amount of personal information being held about us in various places, it is becoming increasingly important for us to be able to prove our identities – not just for travel but for other activities such as purchasing expensive or restricted items, paying bills and opening bank accounts. The UK is unusual in Europe in that (at the time of writing in 2019) it does not have a compulsory identity card system, despite the fact that identity cards were put in place during both world wars. However, effectively, driving licences, passports and some types of travel pass have become forms of identity card. In several countries, identity card or passport schemes are being upgraded with new biometric technologies such as iris or face recognition, which claim to identify individuals uniquely.

As well as the personal information that we know about, there may also exist information about us of which we are unaware. Since the terrorist attacks on the USA in 2001, much of the western world has become far more security conscious, and governments and companies alike have developed and deployed technological countermeasures. These range from smart video surveillance systems that can identify an individual in a crowd and track their movements, through the biometric technologies mentioned above, to the searching of databases for suspicious activity.

Activity 6 (exploratory) Experience of technological security issues

Can you recall an occasion when you have been personally aware of technological security measures?

Discussion

My own experience of security measures at airports involves checking in online and giving details of my own passport and that of my travelling companion several weeks before travelling to mainland Europe. A colleague who visited the USA recently went through a range of airport security screenings. In addition to having his belongings checked, he was photographed at least twice (as well as being under almost constant video surveillance in the airports), had his fingerprints scanned electronically, and was required to fill in numerous online and paper forms.

The promise is that such technologies will make us safer but could they turn the world we live in into a society strangely reminiscent of the nightmare vision of ‘Big Brother’ in George Orwell’s novel Nineteen Eighty-Four?

As you’ve seen so far in this section, there is plenty of opportunity for digital information about each of us to be created. Some of this information we might intentionally give out ourselves – on social networking sites, for example. Other information about us may, as described above, be gathered more surreptitiously by various agencies.

In general, we have little control over how digital information about us is used or who receives it. We might assume that information gathered legally by a government agency, for instance, will be handled appropriately and used only for our benefit. Yet there have been many examples of governments and private organisations ‘losing’ confidential data by storing or transferring it insecurely. For example, in 2015, the communications company TalkTalk was forced to issue a warning to its customers that their data had been hacked and that criminals were using the stolen information to trick people into handing over their bank details.

TM112_1

Take your learning further

Making the decision to study can be a big step, which is why you'll want a trusted University. The Open University has 50 years’ experience delivering flexible learning and 170,000 students are studying with us right now. Take a look at all Open University courses.

If you are new to University-level study, we offer two introductory routes to our qualifications. You could either choose to start with an Access module, or a module which allows you to count your previous learning towards an Open University qualification. Read our guide on Where to take your learning next for more information.

Not ready for formal University study? Then browse over 1000 free courses on OpenLearn and sign up to our newsletter to hear about new free courses as they are released.

Every year, thousands of students decide to study with The Open University. With over 120 qualifications, we’ve got the right course for you.

Request an Open University prospectus371