In matters of national cybersecurity, the US authorities should rely only on their own capabilities. This is determined by the fact that individual user privacy is a priority for many companies.
Problem Statement
The idea of protecting personal data from anyone, including the state, grew out of the very foundations of Western — and primarily American – ideas about human rights, democracy, and privacy. Moreover, it once served as the foundation of modern information technologies, which allowed the West to talk about technological and moral superiority over competitors. The main problem, in this case, lies precisely in the dilemma that faces in order to determine what is more important. The fact is that national security is a matter of protecting the country’s entire population from more global threats, such as terrorism. However, the difficulty arises at the stage that the privacy of each person decreases from year to year.
Apple’s actions may indicate that they are trying to take care of their client’s information. In addition, the power of corporations is growing, and they can determine for themselves which policy to adhere to, regardless of what the state requires. Thus, a fundamental question is raised – are people ready to trust state structures and sacrifice privacy in favor of national security? Alternatively, Apple’s actions are fully justified, and national cybersecurity should not be part of their competence. In this case, the US government should realize that national security issues do not depend on large corporations.
US legislation in the Field of National Cybersecurity
In order to improve its security and economic development, the United States is going to achieve the most orderly and coordinated actions when making decisions in cyberspace at the state level. Therefore, in this matter, attention should be paid to the previously adopted laws defining the scope of activities of authorized bodies. In this paragraph, attention should also be paid to the latest changes in national security adopted by both Trump and Biden. Thus, the main issue is to study the strategies that the government applies in cybersecurity. It is necessary to determine the extent to which their requirements to various corporations are justified.
Apple’s Position on User Security
Apple restricts access to iPhone owners’ data not only to third-party applications but also to its own. Many Internet services, collecting data, form digital profiles of users to offer targeted advertising of various products, depending on their needs and habits. In this case, it is necessary to determine to whom and according to what principles the company transmits data. This is important in order to understand whether Apple shows this attitude to all countries or whether there are differences.
Cases of Conflict of Interests Between Apple and the United States
In this paragraph, an important aspect is to determine the degree of interaction between the two structures. In addition, it is essential to consider cases when their interests intersected and in what context these situations occurred. The fact is that several significant events took place, determining the way of interaction between Apple and the US government. Thus, the motivation of the two structures should be determined, which led to the defense of their positions on cybersecurity issues. Subsequently, to determine the possible positive outcomes from their interaction. Alternatively, to identify possible ways to resolve conflicts that could lead to a common benefit.
Annotated Bibliography
Opderbeck, D. W. (2017). Cybersecurity, encryption, and corporate social responsibility.Georgetown Journal of International Affairs, 18(3), 105–111.
This paper argues that in times of crisis, such powers should be surrendered to the more considerable public interest of national security. Moreover, it should become a part of a new form of corporate social responsibility.
Ahlam, R. (2020). Apple, the government, and you: Security and privacy implications of the global encryption debate. Fordham, 44, 771.
This article focuses on the new issue that has arisen because of the development of importance on customer security and privacy.
Kokas, A. (2019). Cloud control: China’s 2017 cybersecurity law and its role in US data standardization. Communication, Information and Internet Policy, 1–32.
This paper argues that by influencing the security issues raised by global corporate data investments through a combination of domestic policymaking, market dominance.
Shah, M. U. (2020). Access permissions for apple watch applications: A study on users. International Conference on Communications, Computing, Cybersecurity, and Informatics.
Researchers analyze the privacy challenges raised by Apple’s permission requests framework on wearables in this article and how end users’ perceptions of these issues might inform better and more inclusive privacy.
Burt, A. (2019). Privacy and cybersecurity are Converging. Here’s why that matters for people and for companies. Harvard Business Review, 1–4.
The article analyzes the attitude of people and companies to various aspects of privacy and cybersecurity.
Ameen, N. (2021). Keeping customers’ data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce. Computers in Human Behavior, 114, 106531.
The article examines how the amount of data breaches is on the rise, posing a threat to client data security.
Deibert, R. (2018). Toward a human-centric approach to cybersecurity. Ethics and International Affairs, 32(4), 411–424.
This article discusses a different approach to cybersecurity that is based on the human security approach.
Lewallen, J. (2021). Emerging technologies and problem definition uncertainty: The case of cybersecurity.Regulation and Governance, 15(4), 1035–1052.
This article examines the role that changing technology has played in the development of cybersecurity policy in the United States.