...Ethics and Privacy of Communications in the E-Polis Gordana Dodig-Crnkovic and Virginia Horniak Department of Computer Science and Electronics Mälardalen University Västerås, Sweden I N T R O D U C T I O N The electronic networking of physical space promises wide-ranging advances in science, medicine, delivery of services, environmental monitoring and remediation, industrial production, and the monitoring of persons and machines. It can also lead to new forms of social interaction [..]. However, without appropriate architecture and regulatory controls it can also subvert democratic values. Information technology is not in fact neutral in its values; we must be intentional about design for democracy. (Pottie, 2004) Information and communication technology, ICT, has led to the emergence of global web societies. The subject of this article is privacy and its protection in the process of urbanization and socialization of the global digital web society referred to as the e-polis. Privacy is a fundamental human right recognized in all major international agreements regarding human rights such as Article 12 of the Universal Declaration of Human Rights (United Nations, 1948), and it will be discussed in the chapter under the heading Different Views of Privacy. Today’s computer network technologies are sociologically founded on huntergatherer principles. As a result, common users may be possible subjects of surveillance and sophisticated Internet-based attacks. A user may be completely...
Words: 3586 - Pages: 15
...Information (PPI) and other ethical issues related to the use of information technology through research, and 2) learn to correctly use the tools and techniques within Word to format a research paper including using Word’s citation tools. These skills will be valuable throughout students’ academic career. The paper will require a title page, 2-3 pages of content with incorporation of a minimum of 3 external resources from credible sources, and a References page. You are required to use APA format and utilize the References feature in Word for the required footnotes and for the creation of citations and the References list. Note that although MS Word used Bibliography or Works Cited as the title for the References list, you will need to change the words to “References.” Good resources include the UMUC Library website, the chapters on Microsoft Word in your hands-on textbook, the Williams/Sawyer textbook, and the resources that can be found under Course Content in your WebTycho classroom: Writing Resources, the Online Guide to Writing and Research, and the APA Tutorial. A list of topics from which students can choose is provided below. Topics for Research Paper 1. Personally Identifiable Information (PII) 2. Social Engineering 3. Employee Monitoring 4. Content Filtering 5. Information Privacy 6. Electronic Medical Records 7. Biometrics (in terms of ethical and privacy issues) 8. Identity Theft 9. Use of Cookies 10. Privacy Laws related to Information Technology...
Words: 712 - Pages: 3
...Study Guide for Henry’s Daughters (Without Graphics) Produced and distributed by the National Institute for Engineering Ethics Murdough Center for Engineering Professionalism Edward Whitacre College of Engineering Texas Tech University, Lubbock, Texas [pic] Copyright © 2010 Henry’s Daughters is designed to raise awareness of the ethical aspects of engineering work, advance knowledge and understanding of professional standards and public obligations and expectations, improve skills in moral reasoning, and strengthen personal dedication to exemplary conduct. Henry’s Daughters is dedicated to the memory of E. D. “Dave” Dorchester, P.E. Past President, National Institute for Engineering Ethics; Past President, Texas Society of Professional Engineers Past Chair, Texas Board of Professional Engineers; Distinguished Life Member, NIEE Executive Board Dave was highly influential in promoting NIEE and Murdough Center ethics programs. In 1989, he established the Professional Development Program of the Texas Board of Professional Engineers. As NIEE President, Dave worked with Dean Bill Marcy to bring NIEE to Texas Tech University. and E. Walter LeFevre, Ph.D., P.E. Past President, National Society of Professional Engineers; Fellow, National Society of Professional Engineers Past Director, Vice President and Fellow, ASCE; Past President, Arkansas Professional Engineers Board; Distinguished Life Member, NIEE Executive Board Walt was the longest standing...
Words: 4453 - Pages: 18
...Having recently acquired the rights to the Broadway Café, we, Gem Global Consulting Group, have developed a new, successful business plan designed to revitalize the Broadway Café. Our strategy will take into account the several factors that make up the current business situation. These factors include the opportunity to implement Information Technology systems and supply chain improvements, the broad range of products offered by the Broadway Café, the competitive environment, and the fact that the café has been a hotspot for several years before the decline in sales over the past 5 years. Our plan will also focus on positioning the Broadway Café to regain market share from competitors, and improving Electronic business procedures, employee ethics, and customer security. In conducting our thorough analysis, we at Gem Global have concluded that the Broadway Café is poised to spring ahead and has the opportunity to become a once more valuable enterprise. We envision the Broadway Café as becoming the market leader via technology implementation, business collaboration, and strategic planning. With regards to the competitive environment, the city of East Lansing has many competitors in the coffee market, including traditional coffee shops, such as Starbucks, Bigbys, Espresso Royal, as well as the residence hall cafeterias and Spartys. Other competitors include sandwich shops, such as Cosi and Panera, which, although not coffee shops, are in competion with the Broadway Café’s deli...
Words: 3349 - Pages: 14
...Session T4B Special Session - Henry’s Daughters: A New Engineering Ethics Movie Michael C. Loui (Facilitator), Jimmy H. Smith, Joseph R. Herkert, and Steven P. Nichols loui@illinois.edu, jimmy.smith@ttu.edu, joseph.herkert@asu.edu, s.nichols@mail.utexas.edu Abstract – The National Institute for Engineering Ethics has produced a new movie, Henry’s Daughters, to aid in teaching professional ethics in engineering. The movie highlights ethical issues at both individual and societal levels. In this special session, participants will learn how to use two cooperative learning strategies together with the new movie. Participants will also learn a classroom assessment technique. Index Terms - engineering ethics, emerging technologies, cooperative learning, classroom assessment INTRODUCTION To advance instruction in professional ethics for engineering students, the National Institute for Engineering Ethics (NIEE) collaborated with Great Projects Film Company of New York City to produce a new educational movie, Henry’s Daughters (2010). This 32-minute movie dramatizes a fictional but realistic story that highlights engineering responsibility regarding both micro-ethical issues of individual conduct and macro-ethical issues of public policy [1] in the development of an intelligent transportation system. In addition to raising standard issues of professional ethics such as conflicts of interest and the confidentiality of proprietary information, Henry’s Daughters includes ethical implications...
Words: 2079 - Pages: 9
...Having recently acquired the rights to the Broadway Café, we, Gem Global Consulting Group, have developed a new, successful business plan designed to revitalize the Broadway Café. Our strategy will take into account the several factors that make up the current business situation. These factors include the opportunity to implement Information Technology systems and supply chain improvements, the broad range of products offered by the Broadway Café, the competitive environment, and the fact that the café has been a hotspot for several years before the decline in sales over the past 5 years. Our plan will also focus on positioning the Broadway Café to regain market share from competitors, and improving Electronic business procedures, employee ethics, and customer security. In conducting our thorough analysis, we at Gem Global have concluded that the Broadway Café is poised to spring ahead and has the opportunity to become a once more valuable enterprise. We envision the Broadway Café as becoming the market leader via technology implementation, business collaboration, and strategic planning. With regards to the competitive environment, the city of East Lansing has many competitors in the coffee market, including traditional coffee shops, such as Starbucks, Bigbys, Espresso Royal, as well as the residence hall cafeterias and Spartys. Other competitors include sandwich shops, such as Cosi and Panera, which, although not coffee shops, are in competion with the Broadway Café’s deli...
Words: 3393 - Pages: 14
...Contemporary Privacy Issues Report Introduction Privacy is one of the fundamental human rights, every individual should have full control over their personal information. However due to the continuous evolution of society and technology, the importance of a person's right to privacy has been eroded. This report discusses the contemporary privacy issues on different levels and areas, with specific focus on credit reporting, protection of customer’s private information by businesses, health records, internet data and government intelligence access to information. Sections of the current Privacy Act 1988, the new Australian Privacy Principles 2014, and legislations related to the topic areas mentioned above will also be discussed in detail, and the effectiveness of these laws will be analysed. A person's credit history contains a vast amount of personally sensitive information which have a high commercial value, therefore it is extremely important to ensure businesses adhere to the privacy act to prevent the unauthorised use of these information. Any misuse of information can cause great personal and financial harm to the victim. Privacy of health information is fundamental principle in health care. Lack of privacy information might result in people not seeking the health care they need which might be very risky to their own health and the health of others. The rate of technological development is accelerating too quickly and current laws are becoming irrelevant...
Words: 11809 - Pages: 48
...Employer Wellness Programs Employers have been dealing with rising health care costs for a while now, and they are beginning to penalize employees to try to motivate them to get in shape which means that employees will have to begin to pay more attention to their health than they use too. “The number of employers using penalties as part of wellness programs more than doubled from 8% in 2009 to 19% in 2010, according to a survey by human resources consulting firm Towers Watson. The survey respondents included human resources managers and benefits managers from 248 U.S. companies with at least 1,000 employees.” 38% of organizations reported that they planned on penalizing employees for their health conditions when they were asked about the health penalizations by the Towers Watson consulting firm for 2012. This information shows that the outlook will be that most, if not all employers will be adopting the health penalization idea. There are several local companies that already have various wellness programs in place that affect employees financially. Some of these are incentive based and others are penalty based. Tennessee Valley Authority has a program that is named Health Check, and it is a point system that offers a $50 incentive for the first health screening an employee completes, and up to $200 discount on the yearly cost of medical insurance fees which is paid out on an employee’s paycheck in approximately $5 installments depending on the amount of points an employee...
Words: 1335 - Pages: 6
...IFSM 304 – Ethics in the Information Age Learning Portfolio Assignment Descriptions Here are the detailed Assignment Requirements and Summary (Reflection Paper) that comprise activities for a Learning Portfolio for IFSM 304. These activities, along with class discussion and any other assignments your professor may require will enable you to achieve the course objectives and demonstrate knowledge of key concepts and apply this understanding to real-world digital ethics topics and situations. Understand that your work will comprise a Learning Portfolio for the course and these assignments are linked! You will be faced with work that advances with a progression from a general basic framework for decision making to more specific analysis and critical thinking about more complex ethical issues. Current Events 5% Conference Posting of articles on IT-related Ethical Global issues (multi-national corporation) The purpose of this assignment is to analyze a current event article on global ethical issues from a multi-national corporation perspective. This assignment is designed to increase your knowledge from a corporate viewpoint and enable you to analyze ethical issues from a current GLOBAL situation or event. This will also enhance your research and writing skills and your critical-thinking abilities. Select a current topic (2010 source or later) and find an appropriate article on the topic. Provide the persistent URL (one that anyone can click on to read the...
Words: 3771 - Pages: 16
...rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 70 CHAPTER 3 1. Describe the major ethical issues related to information technology and identify situations in which they occur. 2. Identify the many threats to information security. 3. Understand the various defense mechanisms used to protect information systems. 4. Explain IT auditing and planning for disaster recovery. Ethics, Privacy, and Information Security LEARNING OBJECTIVES rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 71 WEB RESOURCES Student Web site www.wiley.com/college/rainer • Web quizzes • Lecture slides in PowerPoint • Author podcasts • Interactive Case: Ruby’s Club assignments WileyPLUS • All of the above and... • E-book • Manager Videos • Vocabulary flash cards • Pre- and post-lecture quizzes • Microsoft Office 2007 lab manual and projects • How-to animations for Microsoft Office • Additional cases CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources What’s in IT for me? ACC FIN MKT OM HRM MIS rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 72 72 Chapter 3 Ethics, Privacy, and Information Security Opening Case NASA Loses Secret Information for Years The Business Problem Over the past decade, U.S. government agencies have been the victims of an unprecedented number of cyber-attacks. One government official noted, “It is espionage on a massive scale.” Government agencies reported almost 13,000 security...
Words: 25389 - Pages: 102
...response is the fastest. All questions will always be answered in 6 hours. This is the quality of service we are providing and we hope to be your helper. Delivery is in the next moment. Solution Manual is accurate. Buy now below and the DOWNLOAD LINK WILL APPEAR IMMEDIATELY once payment is done! Prepare to receive your Business Research Methods Solution Manual in the next moment. -------------------------------------Business Research Methods Solution Manual Business Research Methods 12th Solution Manual This is a sample chapter Business Research Methods Cooper 12th Edition Solutions Manual Business Research Methods Cooper 12th Edition Solutions Manual Chapter 2 Ethics in Business Research CHAPTER LEARNING OBJECTIVES After reading this chapter, students should understand… What issues are covered in research ethics. The goal of “no harm” for all research activities and...
Words: 8218 - Pages: 33
...Electronic surveillance in the workplace Electronic Surveillance in the Workplace: Concerns for Employees and Challenges for Privacy Advocates Anna Johnston and Myra Cheng Paper delivered 28 November 2002 International Conference on Personal Data Protection Hosted by Personal Information Dispute Mediation Committee, Korea Information Security Agency Seoul, Korea Ms Anna Johnston is the NSW Deputy Privacy Commissioner. Ms Myra Cheng is a Research & Policy Officer with Privacy NSW, the Office of the NSW Privacy Commissioner. The authors gratefully acknowledge the assistance of Dr Ben Searle, Macquarie University, in providing an overview of the relevant literature from the field of organisational psychology. Introduction This paper takes up the challenge of talking about privacy in the workplace - a site of potential conflict in which there may be co-existing radically different views on whether workers can or should have any expectations of privacy. As long as there has been employment, employees have been monitored. Nebeker D M & B C Tatum, "The effects of computer monitoring, standards and rewards on work performance, job satisfaction and stress" (1993) 23(7) Journal of Applied Social Psychology 508 at 508. However, in recent years, with an environment of affordable technology, the availability of less easily observable or detectable monitoring devices, and a lack of adequate regulation, there has been an explosion in the use of electronic monitoring...
Words: 6767 - Pages: 28
...advertising effectiveness of neuromarketing and some challenges facing this new field. History In 1991, Dr. David Lewis-Hodgson, Minilab chairman and director of research, began Neuromarketing research in the United States, after stumbling upon it when he was researching treatments for phobic anxiety and stress (Lewis, 2010). Shortly after, marketers from large companies such as Coca-Cola, Levi-Strauss, Ford and Delta Airlines became interested in these findings and created research labs specialized in neuroscience. These companies were very interested in how the brain was affected by media stimuli. In 2001, Bright House Neurostrategies Group was among the first to market commercial studies fundamentally on neuromarketing. However, the actual term, “neuromarketing”, was not...
Words: 3275 - Pages: 14
...6. Managing the security of information 6.1 Control over data integrity, privacy and security 6.1.1 Information Classification: is the conscious decision to assign a level of sensitivity to data as it is being created, amended, enhanced, stored, or transmitted. The classification of the data should then determine the extent to which the data needs to be controlled / secured and is also indicative of its value in terms of Business Assets. The classification of data and documents is essential if you are to differentiate between that which is a little (if any) value, and that which is highly sensitive and confidential. When data is stored, whether received, created or amended, it should always be classified into an appropriate sensitivity level. For many organizations, a simple 5 scale grade will be sufficient as follows: Document / Data Classification | Description | Top Secret | Highly sensitive internal documents e.g. pending mergers or acquisitions; investment strategies; plans or designs; that could seriously damage the organization if such information were lost or made public. Information classified as Top Secret has very restricted distribution and must be protected at all times. Security at this level is the highest possible. | Highly Confidential | Information that, if made public or even shared around the organization, could seriously impede the organization’s operations and is considered critical to its ongoing operations. Information would include...
Words: 6802 - Pages: 28
...Business Uses and Ethical Ramifications of Social Media Use by Physicians Traci L Buxton Salem International University Abstract Social media is a rapidly growing and evolving driver of patient engagement and social change on a local, national and global scale. The impact of patient education and engagement through social media interaction is felt throughout the health care system and health care institutions and providers are adapting rapidly to accommodate the needs of an informed, involved patient population. The shifting patient-physician dynamic involved in electronic communications poses ethical and moral questions about the ongoing transformation role of physicians in the online community. The purpose of discussion highlights the various types of communications used in healthcare social media exchange, their roles in the corporate healthcare setting and recommended guidelines for ethical physician electronic social media use and health care institution social media policy. Social media refers to a wide variety of Internet-based electronic communication platforms uniting users globally. These tools vary from encyclopedia-like wikis and written blogs to visual media platforms such as You Tube and Pinterest to familiar social-sharing programs such as Facebook, Twitter, and MySpace. Using these platforms “Allows anyone to create and share information, ideas and experiences through the web in the form of a conversation.” (Loh, Bourque, Lee, Morrison, & Walker, 2012...
Words: 3060 - Pages: 13