Overview

The Fourth Industrial Revolution has the potential to empower individuals and communities, as it creates new opportunities for economic, social, and personal development. But it also could lead to the marginalization of some groups, exacerbate inequality, create new security risks, and undermine human relationships.

Klaus Schwab

Source: JSTOR, 2018

We saw earlier that security and technology are interdependent variables. This Study Unit examines the relationship between legislation, enforcement, as well as security technology in Southeast Asia. In this Study Unit, we have leveraged on the dominant assumption that technology systems and platforms are a “given” in today’s day and age; furthermore, the notion that technology will continue to serve the master that pays for it. The assumption therein is that the highest bidder controls the use of technology. Present realities, with the dropping cost of technology however, have resulted in the questioning of these governing norms. The dropping cost of technology in turn will continue to open doors for explorative avenues wherein attempts are made across sectors to navigate the complex terrain of technology. The ability for technology to open the doors and push the envelope vis-à-vis security and privacy amongst others will remain a dominant challenge.

This Study Unit also invites students to consider different variations of models of security technology and the impact that it in turn shares with legislation. At the end of this Study Unit, students should be able to discuss the relationship between technology, criminals and terrorists. Students should also be able to appraise models of security technology. The links between security, technology, crime and terrorism are akin to a spider web of intersecting and interlocking attachments, relationships, and hierarchies.