Free Essay

Privacy Technology

In:

Submitted By jes2ica
Words 2198
Pages 9
! !

Privacy Technology

! !
Team 7 Summer 2014

! !
COPYRIGHT TEAM7 !1

Privacy Technology Executive Summary Introduction System Architectural
Case1: Create a privacy policy. Case2: Save an unfinished privacy policy form Case3: Upload Json file and continue finishing questionnaire Why Struts?

1 3 4 5
5 6 6 6

Functionality
Start. Modification. Submission.

9
9 9 9

Design Rationale
Web-based. Easy to use. Model form regulation satisfied. Hyperlinks to relevant opt-out mechanisms. Logical consistency. Computer-readable version. Preview generated policy. HTML and CSS outputs.

11
11 11 11 11 12 13 13 13

COPYRIGHT TEAM7

!2

Executive Summary
!
The objective of this project is to develop a web-based tool, Interactive Form Builder (IFB), required by United States Federal Trade Commission (FTC). The tool is designed and developed for financial institutions to generate web-based, interactive privacy notices that comply with the model form regulation published by eight federal regulators on December 1, 2009, under the Gramm-Leach-Bliley Act. The report discusses the system architecture for this project. It also covers how we address each requirement specifically for the Interactive Form Builder.


COPYRIGHT TEAM7

!3

Introduction
The current in use Online Form Builder enables the financial institutions to produce a PDF version of notice. However, the created PDF notice is reported containing errors and lack of consistency. Furthermore, while converting the PDF to HTML, the static one doesn’t facilitate hyperlinks to allow users to opt out directly. In order to address those problems, the Interactive Form Builder we have designed and developed enables the financial institutions to output HTML format page which is suitable for them to post on the website. Along with the HTML file, there will be a CSS file created. Users can change the style of the page using the CSS file. The Interactive Form Builder also provides the functionality to produce computer-readable output. By using the computer-readable output, display and comparison financial privacy notices becomes more easily. 


COPYRIGHT TEAM7

!4

!

System Architectural

Overall we use Struts 2 framework based on MVC pattern. More specifically we choose HTML/JavaScript/JQuery as front-end technology, and use Struts as backend. In the view part, users finish questionnaire on the website. The website detects users input and decide incoming questions to be answered. The whole error checks are extremely user friendly.

!

MVC framework diagram

!

Case1: Create a privacy policy.
When users finish questionnaires, they can submit the form and to see the preview of draft of privacy policy the website generated. So far, there is a completed form submitted to the controller, Struts2, and a corresponding form bean generated. Since we will use this form bean many times, we put them into session. Then users may want to see drafts. So there will be a request to controller to get these results.
COPYRIGHT TEAM7 !5

First, controller will forwards the request to a class and get form bean in the session. Second, forwards the form bean to a JSP. Last, in the JSP form bean will be parsed via EL and a draft of privacy policy is created.

!
Case2: Save an unfinished privacy policy form
To parse and export computer readable files, we use json format. Json is a “fat-free alternative of XML”, which means we can fulfill requirements as well as save space and accelerate export speed. Users can save unfinished form anytime during the process of creation. At this time, DownloadAction class is called to receive form bean as a java object. Another reason using json is that there are plenty handy tools to export or parse json file to java object. We use GSON lib to convert java objects to a String object with json format. With GSON we can handle collections and generic types. Also it is highly customizable, we can specify those null fields with null object and they are not present in the output.

!
The DownloadAction extends ActionSupport class in Struts2. So after String with json formatted created, we assign it to fileInputStream. This is mechanism provided by Struts, which handle download request. About filename and format can be changed in struts.xml.

!
Case3: Upload Json file and continue finishing questionnaire
UploadAction class will receive a json file from JSP’s form. Then parse it to form bean as a java object using GSON lib. Finally it puts the form bean into session and forwards to form JSP to let users continue to finish the questionnaire.

!
Why Struts?
Struts provides a handy framework to dispatch request and response from front-end to backend and vice versa. Here is a framework diagram to show how Struts2 being helpful in this case.

!

COPYRIGHT TEAM7

!6

!
Struts2 Architecture http://struts.apache.org/release/2.0.x/docs/architecture.html

First of all, HttpServletRequest will go through Filter chain to reach Dispatcher. Then the dispatcher will decide whether it needs any action and which action via ActionMapper. If ActionMapper needs to call an Action, Dispatcher will forwards request to ActionProxy. An ActionProxy reads struts.xml and find the specific Action class. Behind the scene, AcitonInvocation is the one who really invoke the Action and return result. In this case, the a result is a JSP or HTML, with HttpServletResponse to them.

!
Other error checks are handled by backend as well as front-end. For example, some parts are missing from questionnaire, then the website will give users notice about those parts.

COPYRIGHT TEAM7

!7

!
Within the dispatch mechanism, available form bean tool makes getting and setting java bean from front-end to backend easy.


COPYRIGHT TEAM7

!8

Functionality
The whole process of creating privacy form is indicated as the picture above. Generally, it can be separated into three parts: Start, Modify and Submit.

!
Start.
At the beginning, users have two choices: Import computer-readable file or Start new form. By importing existing computer-readable file, which is in Json format, users are able to continue editing after last input. In this way, they don’t need to start over again. If users choose to start new form, they are able to create a completely new form from the beginning.

!
Modification.
There is a questionnaire consisting of totally 18 questions to guide users to create privacy form. Each question may have some logical relations with others. Different answers to certain questions will result in hiding or displaying other questions. An input validation mechanism is also implemented. It will check whether those required filling areas are missing. It will also check whether the inputs are valid as required. If something goes wrong, relevant alert message will appear right beside the error area. In this way, users can make some adjustment immediately after the input instead of being informed invalid input after clicking on submit button. Moreover, since all the questions are listed in one page, a floating progress bar on the left will indicate in which section the user is editing and how much the user has finished.

!
Submission.
If users can’t finish the form at this time, they can choose to export the incomplete file as Json format. The “Save” button will float on the page as the scrolling bar goes up or down, which enables users to export the file more conveniently. After

COPYRIGHT TEAM7

!9

submitting the form successfully, it will jump to another page. In the success page, there are three buttons.

!
“Preview” enables users to preview the generated HTML page directly on the site. “Download HTML + CSS” enables users to download generated HTML file along with the CSS file. “Download Computer-Readable File” enables users to download computer-readable file in Json format.

!

COPYRIGHT TEAM7

!10

Design Rationale
Web-based.
Our Interactive Form Builder is designed and developed based on web. When generating the privacy notice, financial institutions don’t need to download or install additional applications. We implement the project in struts 2 framework based on J2EE MVC architecture. For the front end, we adopt jQuery to support the dynamic functions.

!
Easy to use.
In order to guide financial institutions to create their specific notices in an easy way, we have designed a questionnaire asking for relevant information. The questionnaire consists of 18 questions. Users only need to click on radio buttons, checkboxes or type into text areas to create their customized privacy forms. All the questions are displayed in one page so that users are able to review and edit their privacy form choices and contents more conveniently instead of jumping between different pages. Furthermore, for some questions which users may feel confused, there will be definitions and links to relevant information next to the questions to illustrate in detail.

!
Model form regulation satisfied.
The notices which financial institutions use our Interactive Form Builder to produce are all complied with the disclosure requirements of the model form regulation published by eight federal regulators on December 1, 2009 under the Gramm-Leach-Bliley Act.

!
Hyperlinks to relevant opt-out mechanisms.
When many financial institutions convert the PDF produced by the current tool Online Form Builder to HTML format, there are no hyperlinks to allow consumers to opt-out directly. In the Interactive Form Builder version we developed, if the
COPYRIGHT TEAM7 !11

financial institutions offer opt-out choice for customers, the produced notice will include the hyperlinks to guide customers to related opt-out mechanisms. The optout mechanisms include three ways: phone call contact, online website setting and mail-in form choice. Customers can make the choice according to different situations. Specifically, for the choice of mailing the form, there is also a hyperlink directing customers to the mail-in form section.

!
Logical consistency.
The design of the questionnaire and form fields is consistent in logic avoiding contradictory or non-compliant fields. The questions in questionnaire are listed in a sequence where a question may influence other questions. For example, the subsequent input requirement will be different according to the different answers to the question “Q2: Do you have Affiliated Institutions?” If users choose “Yes," there will be an input area appearing right below the “Yes” to require users to input the affiliates. Users can also remove or add the affiliates list. If users choose “No," nothing will appear right below the choice to ask for affiliates information. For the question “Q6: Please fill in the Information Disclosure table:”, the content of the Information Disclosure Table is dynamically created by the choice users have made in previous questions 1 to 5. For different financial institutions, the content of table they need to fill in will be different. For example, if the user select “No” to “Q2: Do you have Affiliated Institutions?” there will be no affiliates related questions asked in the Information Disclosure Table when the user select “Yes” such as “For your affiliates’ everyday business purposes -- Information about customers’ transaction and experiences”. Moreover, in the Information Disclosure Table, there are totally three columns. The first column is “Reasons you can share customers information”. The second and third are “Do you share?” and “Can customers limit sharing?” that users need to answer correspondingly. If users select “No” to “Do you share?”, “You do not share.” will directly appear in the “Can customers limit sharing?” so that users don’t need to provide useless and repetitive answers in that column. While users select “Yes” to “Do you share?”, then they can continue to choose “Yes” or “No” to the column “Can customers limit sharing?” If there is any “Yes” in the column “Can customers limit sharing?”

COPYRIGHT TEAM7

!12

users need to indicate the ways of limit sharing in the subsequent question “Q7: Please provide methods of limiting sharing”.

!
Computer-readable version.
The Interactive Form Builder is able to produce a computer-readable version of the content of the notice. We implement it in Json format. Compared to XML format, Json cannot only meet the requirements but also save space therefore facilitating the export process. By using the Json format file, users can modify and re-generate the privacy notices more conveniently instead of starting over again. Users are able to stop in the middle when creating the notice and save the incomplete form in a Json format file. By exporting the existing Json file, they can continue to create or edit the notices.The Json format file also helps to facilitate the comparison and display different financial privacy notices. To parse and export Json format file, there are many alternatives. The tool we adopt is GSON. It provides simple methods to convert between Java objects and Json. It also extensively supports collections and generics. Furthermore, GSON allows user to customize the representations of objects.

!
Preview generated policy.
After finish the questionnaire and submit, users can preview the generated policy directly on the Interactive Form Builder site by clicking on the “Preview” button. In this way, they don’t bother to download or install anything before they can view the generated policy.

!
HTML and CSS outputs.
After finish creating the notice, financial institutions are able to export relevant HTML file along with a corresponding Cascading Style Sheets(CSS) file. The HTML file is suitable to be posted on the financial institution's website. To be more customized, users can adjust the HTML by making some relevant changes in CSS file.

COPYRIGHT TEAM7

!13

Similar Documents

Free Essay

Privacy and Technology

...Privacy and Technology In 1965, co-founder of Intel Gordon Moore made a prediction about the rate at which computer chip technologies would continue to expand into the future years. His prediction proved to be accurate, and today the processing power of microchips is continuing to double every 18 months. In a society constantly striving to become bigger and more profitable, a new era of advanced technologies has been adopted to perpetuate itself ahead of the global race for expansion. However, the mass development of new innovations in technology has not gone without a noticeable impact across all domains of society. As the transition into the future rapidly ensues, social and economical impacts have become more and more prevalent. One question to be considered in the race to improve and expand the nation is whether or not there is an equal amount of attention and emphasis being put on preserving our social values versus the importance put on pursuing economical gain. Many argue that the introduction of technology into modern society has brought about a world of positive change through which has offered immense advancements in global connectivity, efficiency, and quality of life. While the majority of new technologies are individually worthy of being considered great accomplishments throughout the technological world, they have collaboratively worked together to create an abundance of distractions throughout school and the work place as well as contribute to diminishing traditional...

Words: 1543 - Pages: 7

Premium Essay

Privacy and Computer Technology

...Privacy is a valuable interest and is now threatened more than ever by technological advances. Privacy is defined as the ability to control the collection, use, and dissemination of personal information (Fast Trac Course ). At one time people could once feel confident that what others may find out about them would be treated in a way that it would probably do any harm. Information technology has been beneficial for privacy. By having access to ATMs and online banking we rarely have to present ourselves to a teller. Online shopping offers similar benefits such as being able to shop without standing in long lines and being able to compare prices and research products before purchasing. However, since so much of what we do daily is done using a computer, it can pose a serious threat to privacy. This information can then be recreated to create detailed personal profiles that could not have transpired in pre-digital days. Furthermore, this information can be distributed far, wide, and immediately without our consent or even knowledge. Judicial remedies are unlikely to produce a satisfying or sensible balance between companies’ economic prerogatives and customers’ privacy interest. New technologies that has either unconsiously adopted or resourcefully applied privacy practices will continue to threaten personal privacy. Business will have to find ways to address this uneasiness. If companies remain complacent, underestimating the degree to which privacy matters to customers, harsh...

Words: 1944 - Pages: 8

Premium Essay

1984 Privacy Technology

...As technology continues to advance, people will continue to lose their sense of privacy until privacy ceases to exist. Technology seems very useful, which it is, as it helps us with things in everyday life, such as communicating, sharing and much more, which persuades people to purchase these cellular devices. With each technological advancement, especially in the field of cell phones and computers, the amount of privacy an individual has grows smaller and smaller. In the novel 1984, written by George Orwell, illustrates his prediction of a future dystopian society where every citizen is continuously watched by “Big Brother”; at work, in their homes, everywhere. Technology is taking us closer and closer to the world of Big Brother since American’s...

Words: 1158 - Pages: 5

Premium Essay

Mobile Technology and Privacy

...Privacy and Culture: Comparative study of privacy issues with respect to mobile technology in India and America Sreeranjani K Pattabiraman Abstract The past decade has witnessed a huge shift in the development of mobile technology which has led to privacy issues, murmurings of which started surfacing only in recent years. A lot of research has been carried out by academicians on mobile technology and its impact on society. There have also been comparative studies on how privacy has changed for people over the years with the boom of social networking sites and smart phones. But, there has not been a substantial study or analysis conducted on how people's privacy has been directly affected by the ever-increasing population boom of mobile-phone users. This comparative study analyzes the concept of privacy with respect to mobile surveillance and draws upon prior work in the field of mobile surveillance, ranging from popular press on government surveillance in India and USA and case studies in these two countries related to people’s view on privacy, to the works of ACLU (American Civil Liberty Union) in USA and Stop CMS (Central Monitoring System) in India. The study is built around the analysis and comparison of the issue of mobile surveillance in both the countries, how people dealt with this, and the role of culture in determining people’s view on privacy. It also proposes suggestions for how future research can be carried out in the field of mobile surveillance. Keywords ...

Words: 7224 - Pages: 29

Free Essay

Technology and Privacy

...Technology and Privacy Jurgen Debooserie Accounting Information Systems 04/24/2015 Technology and Privacy Over the last few years, technology and privacy have been transformed in an encouraging and dangerous realm. Technology provides us with easy access to information anywhere, improves communication between entities, enhances efficiency and productivity, and introduces social networking. This whole new world opens a lot of opportunities for every industry, but it has also has its downfalls. Since entities are using technology to communicate with each other, we need to be aware of how private our conversations are. According to Oxford Dictionaries, privacy is the state or condition of being free from being observed or disturbed by other people or the state of being free from public attention. In today’s society, we have several social networking websites including Facebook, Twitter, and LinkedIn. The things we do and say online leave a trail behind of our personal information. Everyone can track us when users post pictures, click a hyperlink, send emails, turn on locations, and it gives companies the opportunity to public access and the ability to store it. Companies and the government collect information in ways that might could threaten our freedoms, because when corporations acquire our information they sell it back to the highest bidder, while the government introduces laws that allows them to monitor us like never before. It affects our freedom of speech, undermines...

Words: 3015 - Pages: 13

Free Essay

Technology and Privacy

...Running head: TECHNOLOGY AND PRIVACY 1 Technology and Privacy Shawna Greiner SOC 120 Jenna Soard April 22, 2012 Technology 2 There was not such a thing known of as technology back in the beginning of time, but now technology has become the biggest thing used; it is so powerful throughout the world, that it is the number one thing used for just about everything in our everyday life. People have to have technology at a majority of their jobs in order to complete their tasks, Hospitals have to have it in order to take care of people and most of all keep track of files and records of people, government offices are the biggest one to have the technology that keeps all or a majority of information about every single human being that has lived. Another big technology that is done, but has been taken out of proportion is the internet and privacy. People that want to steal, take advantage of another person’s personal information, whether their social security number, physical address, work and income information along with credit, and bank accounts, then it is used to the person stealing it for their own advantage which later destroys the victim a lot of times. Technology has advanced to our own freedom...

Words: 1852 - Pages: 8

Premium Essay

The Value of Digital Privacy in an Information Technology Age

...The Value of Digital Privacy in an Information Technology Age Diana Flynn Strayer University Professor James Merola April 30, 2012 1. List and describe at least three (3) technologies that allow an individual to research citizen’s private data. Intelius.com is a technology that helps people find family members, friends, classmates, military buddies and almost anyone living in the United States. It sells background information to anyone or anybody regardless of who you are. DateCheck is a site hosted by Intelius which stores reports including names, addresses, birth dates, court records, and cell phone numbers. People can access personal records by name, social security number or phone number through Intelius. The second technology is Google.com. If you are looking for information on someone, searching the web using Google is one of the best places to start. A person can find background information, phone numbers, addresses, maps and more. On the flip side, anyone can find the same information about you. Information is given by citizens opening up an account. It is the basic information such as name, address, phone, email or credit card number. Information is shared with companies, organizations, and in individuals outside of Google with consent. Data searched on the web is stored to improve and maintain the security of their systems. Government agencies request information from...

Words: 1451 - Pages: 6

Free Essay

Privacy with Technology

...0 Ms. K English J 101 July 7, 2014 Portfolio B Informative Synthesis In “Say Everything”, Emily Nussbaum concentrates on a new definition of privacy that Daniel J. Solove has noticed as well; but differs in the new definition. The lack of privacy as noted by both authors with examples of published shame such as the “star wars kid” and “Susie”(6 Nussbaum)(15 Solove). However, Nussbaum focuses on positive responds she has received toward exposure from her interviews. Xiyin Tang, a blogger, accepts the negative comments from her audience but admit she does not care, and her actions will not change for their comments. Additionally, another girl, Oppermann described privacy online as “You are getting what you’re being” (5 Nussbaum) with an evident high tolerance toward judgment. Nussbaum focusing on publishment an example for the lack of privacy concludes that the younger generation is capable of handling exposure. However, Solove describe the new privacy with accessibility of the publisher information supporting the idea with an example of Facebook’s News Feed feature (21 Solove). Facebook launched a new feature they called News Feet that release information of users online activity to other commercial websites in 2007(21 Solove). Surprisingly, the users of Facebook responded with outrage. From this response, Solove interprets the new problem is based on accessibility of information instead of the ability to publish information, insisting that although information is...

Words: 299 - Pages: 2

Premium Essay

“Privacy and Health Information Technology”

...A Literature Review “Privacy and Health Information Technology” Deborah Jones Dr. Udoh Udom Health Information Systems HAS 520 12/06/10 Introduction The increased use of health information technology (Health IT) is a common element of privacy of medical information. Proponents hope that the increased use of health IT will improve health outcomes for individual patients by facilitating the delivery of evidence-based care and reducing medical errors. Additionally, proponents hope that increasing information sharing among providers will better coordinate care within and across health care settings. Health IT facilitates the creation of a comprehensive health record that can move with an individual over his or her lifetime, in contrast to the fragmented records that exist today. Further, health IT is promoted as a critical tool for improving population health by allowing for the more efficient gathering of data regarding the effectiveness of certain treatments. Finally, health IT is also expected to help decrease health costs by reducing the duplication of services and the delivery of unnecessary or inappropriate care. This paper examines some of the “gaps” in privacy protections that arise out of the current federal health privacy standard, the Health Insurance Portability and Accountability (HIPAA) Privacy Rule, the main federal law which governs the use and disclosure of health information. Additionally, it puts forth a range of possible solutions, accompanied by...

Words: 3190 - Pages: 13

Premium Essay

Data Security

...Data Security and Privacy Act Data security & privacy has varies of roles and responsibilities to prevent financial crimes. Financial crimes can include telemarketing scams, investment or pension fraud, credit card fraud, and insurance fraud. However, it is the company decision on how much personal protection is needed to secure its customers financial investments. Moreover as who is suppose to make this decision for financial protection falls under corporate security. These decisions are very important because businesses, as well as individuals, can be victims of financial crimes and face serious financial loss. In this recent ongoing decade because of the fear of big government and the fear of privacy intrusions through the internet and internet commerce, across all enforcement agencies, data security and privacy are high priorities. The Obama Administration has made enforcement of data security and privacy a top priority. In this modern day age, updating the Healthcare Insurance portability & Accountability Act is recently now highly recommended. The healthcare industry is already familiar with data security and privacy restrictions. We the people in the United States of America is living in an information technology era, with increasing automation of electronic medical records, clinical systems, and medical imaging, as well as growing regulatory pressures, it is a challenge for healthcare providers to protect the privacy of patient data and secure their IT...

Words: 601 - Pages: 3

Premium Essay

The Value of Digital Privacy in an Information Technology Age Brenda Steen Strayer University Leg/500 December 19, 2012 Professor: Dr. Pino the Following Assignment Contains Information Regarding Individual

...The following assignment contains information regarding individual privacy in this age of information technology. On today’s vast information superhighway, private information can be found on most individuals within a couple of clicks of a computer mouse. This assignment will describe a minimum of three technologies that allow people to research the private information of citizens. This report provides and analysis of the advantages and disadvantages of having this information made public. Additionally, this report includes options individuals have to protect their private information. Last, this report discusses the existence and effectiveness of electronic privacy laws enacted to protect private information. Google is probably the most used search engine on the internet. It is usually the first step used to research private information. Google collects all available private information and conveniently places it at a researcher’s fingertips. Such information as address, telephone numbers, pictures and work history is available on Google. Facebook is another popular website people use to obtain private information. Researchers can gain information such as posted pictures, family/friend information, and place of employment. Researchers can also find out recreational information such as local establishments a person frequents or when he or she is on vacation. Many states use have county property tax websites. A researcher can simply type in a person’s name and find...

Words: 951 - Pages: 4

Premium Essay

The Internet of Things

...See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/263893131 TruSMS: A trustworthy SMS spam control system based on trust management Article in Future Generation Computer Systems · July 2014 Impact Factor: 2.79 · DOI: 10.1016/j.future.2014.06.010 CITATIONS READS 4 2,022 4 authors, including: Zheng Yan Raimo Kantola Xidian University Aalto University 88 PUBLICATIONS 588 CITATIONS 91 PUBLICATIONS 298 CITATIONS SEE PROFILE All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. SEE PROFILE Available from: Zheng Yan Retrieved on: 12 April 2016 This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and sharing with colleagues. Other uses, including reproduction and distribution, or selling or licensing copies, or posting to personal, institutional or third party websites are prohibited. In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier’s archiving and manuscript policies are encouraged to visit: http://www.elsevier.com/authorsrights Author's personal copy ...

Words: 18072 - Pages: 73

Premium Essay

Privacy

...Running Head: THE EXISTENCE OF PRIVACY WITH TECHNOLOGY THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Obediah Howard Bellevue University   THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Abstract This research paper will discuss the relationship between privacy and technology. It will attempt to ascertain if technology and privacy can share the same plane of existence. Benefits and deficiencies of a particular technology are not hereditary to that technology, but are depend on their application. The public insists on accountability of technological innovation and assurance that privacy will remain intact. Striking a balance between enabling technology to enrich lives and restricting it from invading privacy has to be addressed. Implementing controls to protect private data is imperative. Technological advances over the years have challenged the public’s perception and expectation of privacy. Technology and one of its preeminent by-products, convenience, will continue to grow exponentially for the foreseeable future; there is no evidence to suggest otherwise. Privacy finds itself in a precarious position in the face of evolving technology. The collective concept of privacy has to be revisited. With the advent of technological innovations and the accessibilities they bring, privacy in its purest form does not exist. From an anthropological perspective, privacy is a relatively modern development. Ancient cultures practiced communal...

Words: 1783 - Pages: 8

Free Essay

Af 302 Essay on Web 2.0 Technologies

... Web 2.0 unlike from other types of websites as it does not require any web design or publishing skills to participate, making it easy for people to create and publish or communicate their work to the world. The nature of this technology makes it easy and popular way to communicate information to a much wider audience. There are number of different types of web 2.0 applications including wikis, blogs, social networking, folksonomies, podcasting & content hosting service, YouTube, Facebook, MySpace, and Flickr (Thomson, 2008). However, despite it greater advantageous to our world today, there are some threats involved on the other hand. In this essay, I will discuss some number of privacy and ethical issues associated with the use of this type of technologies. As well some threats such technologies pose for small Pacific Island communities. Lastly, I will discuss the reasons why a privacy bill should or should not be adopted in the Pacific. Ethical and privacy issues related with the use of web 2.0 technologies? Copyright is one of a major issue related with the use of web 2.0 technologies. This ethical issue is referring to copy of others information illegally, by means without the permission of the copyright holder. Using of web 2.0 technologies like Facebook, you tube and other applications nowadays are rapidly growth all over the world. So, this great revolution supports us in every aspects of life. For example, businesses use it to enhance business activities such as...

Words: 774 - Pages: 4

Premium Essay

Business Law

...Ethical and Legal Issues Concerning At-will Employment Jasmine Mills Park University Abstract As years pass by, every sphere of life is taking a new dimension; for instance, advancing technology. This has resulted in some ethical issues in workplaces such as cyberloafing, privacy, information technology usage, employee monitoring. Also, legal issues in workplaces such as lawsuits have emerged. Both employers and employees are worried about the ethical consequences resulting from the ethical issues While bosses use surveillance devices to keep track of their workers' activities and output, these workers feel that excessive monitoring is an attack on their confidentiality and privacy. The strategy of checking workers on a timely basis is contributed by the fact that bosses have rights over everything in the “at-will employment environment.” Additionally, this paper provides a proposal for reducing the ethical and legal issues. The paper also encourages organizations to generate and efficiently communicate ethical standards for workers in their companies. It also includes real examples of workers' perceptions as well as an emotional state from the surveys based on ethical and legal issues raised regarding the topic of study. Keywords: At-will employment, employee monitoring, Ethical and legal issues. Introduction At- will means employment can be terminated at any time, for any reason or no reason without facing legal action. Likewise, an employee can quit a job with or...

Words: 2152 - Pages: 9