Abstract

is defined as spreading widely throughout an area or a group of people (Especially of an unwelcome influence or effect. Pervasive monitoring is simply a case of continuous monitoring of people for the sake of checking conduct or watching over. After the recent Snowdonia occurrence, where Edward Snowden leaked classified information about the ongoing surveillance programs by the NSA of United States, pervasive monitoring became a hot topic of discussion and if it was beneficial for the users or internet or posed as a threat. The objective of the paper is to analyze whether pervasive monitoring is a threat or a necessity and also to compare the benefits and challenges of pervasive monitoring. The comparison between the importance of pervasive monitoring and that of its ill-effect argue that it helps in combating terrorism as it is unbiased and non-targeted. Moreover, it does not collect the meta-data but, only collects it. Besides its importance, it is also essential for network administrators to have plaintext for managing their networks. On the other hand, the STRINT workshop by IETF called it a technical attack same as any attack as it leads to some chilling effects like self censorship etc. If pervasive monitoring is being done by an organisation, it can lead to the database holder or admin to exercise undue influence on the employees of the organisation undergoing the monitoring. Even though it is against the basic human right to privacy but the public does not seem to care too much about it. The pervasive nature of this monitoring might help the governments but also has adverse affect. The beneficial and destructive effects of pervasive monitoring are tabulated according to different fields pervasive monitoring is done for. This includes the fields of organisation, future, software, law, networking and healthcare. Considering all the researched and analyzed fields, it can be stated that pervasive monitoring should be allowed at some levels as it becomes a necessity and also have some standards and protocols so as not to be misused for personal issues or motives. The standards and policies should be defined for all internet traffic without any bias whatsoever.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.