Premium Essay

Privacy and Computer Technology

In:

Submitted By aec1981
Words 1944
Pages 8
Privacy is a valuable interest and is now threatened more than ever by technological advances. Privacy is defined as the ability to control the collection, use, and dissemination of personal information (Fast Trac Course ). At one time people could once feel confident that what others may find out about them would be treated in a way that it would probably do any harm. Information technology has been beneficial for privacy. By having access to ATMs and online banking we rarely have to present ourselves to a teller. Online shopping offers similar benefits such as being able to shop without standing in long lines and being able to compare prices and research products before purchasing. However, since so much of what we do daily is done using a computer, it can pose a serious threat to privacy. This information can then be recreated to create detailed personal profiles that could not have transpired in pre-digital days. Furthermore, this information can be distributed far, wide, and immediately without our consent or even knowledge. Judicial remedies are unlikely to produce a satisfying or sensible balance between companies’ economic prerogatives and customers’ privacy interest. New technologies that has either unconsiously adopted or resourcefully applied privacy practices will continue to threaten personal privacy. Business will have to find ways to address this uneasiness. If companies remain complacent, underestimating the degree to which privacy matters to customers, harsh regulation may be waiting in the wings. The best way out is for businesses and customers to negotiate directly over where to draw the lines. (What is Privacy?)

There are many databases and Internet records that track or keep record of information about an individual’s financial and credit history, medical record, purchases and telephone calls. Most people do not know what information

Similar Documents

Premium Essay

Pepsi Privacy

...Ethics and Privacy of Communications in the E-Polis Gordana Dodig-Crnkovic and Virginia Horniak Department of Computer Science and Electronics Mälardalen University Västerås, Sweden I N T R O D U C T I O N The electronic networking of physical space promises wide-ranging advances in science, medicine, delivery of services, environmental monitoring and remediation, industrial production, and the monitoring of persons and machines. It can also lead to new forms of social interaction [..]. However, without appropriate architecture and regulatory controls it can also subvert democratic values. Information technology is not in fact neutral in its values; we must be intentional about design for democracy. (Pottie, 2004) Information and communication technology, ICT, has led to the emergence of global web societies. The subject of this article is privacy and its protection in the process of urbanization and socialization of the global digital web society referred to as the e-polis. Privacy is a fundamental human right recognized in all major international agreements regarding human rights such as Article 12 of the Universal Declaration of Human Rights (United Nations, 1948), and it will be discussed in the chapter under the heading Different Views of Privacy. Today’s computer network technologies are sociologically founded on huntergatherer principles. As a result, common users may be possible subjects of surveillance and sophisticated Internet-based attacks. A user may be completely...

Words: 3586 - Pages: 15

Free Essay

Policing Information Technology

...Policing Information Technology Bill Smith BIS/220 July 11, 2012 Alisha Johnson Abstract Policing Information Technology Over the past 30 years technology has advanced at an alarming rate. Since the inception of personal computers and the World Wide Web a need for individual protection occurred. Government reform was needed. In the 1980s two Acts of Congress were passed, the Computer Fraud and Abuse Act of 1986 and the Electronic Communications Privacy Act of 1986. Initially we will examine the advances in technology that caused each Act to be passed. Last we will determine what new ethical issues came about from this new technology. Although some may see these Acts as an invasion of one’s right to privacy, they are essential to protect stored information from being used in a negative way. “A survey by an ABA task force in 1984 estimated that businesses and government agencies lose as much as $730 million a year to computer crime” (Wolf, 1986). Two years after this survey was published the U.S. House of Representatives passed the Computer Fraud and Abuse Act of 1986. During this time computers are becoming widely used across the country. The major change is the type of information being stored. Financial institutions both in the private and government sectors are using computers to store valuable financial information. Computer hackers illegally could gain access to this information and sell it to individuals with the means to use it or vandalize the company’s...

Words: 529 - Pages: 3

Premium Essay

Information Age & Information Privacy

...AGE AND INFORMATION PRIVACY UNIVERISTY OF MARYLAND UNIVERSITY COLLEGE 5 AUGUST 2011 | An estimated 35 million people use e-mail – either via their company’s computers or on paid networks. Unlike telephone calls, which by law are private because the phone lines are considered common carriers, a company owns its computer network and all the data in it. Seemingly, private email has been used against employees in everything from sexual harassment cases to charge of trade secret theft. Even employees who carefully delete their email cannot escape cyber-investigators who can hunt through a computer’s backup system to find just about anything ever stored in a computer. That is to say, the use of email is like having a video camera consistently running. Information Privacy can be defined as the relationship between collection and dissemination of the information. There is no doubt that there is a public expectation of privacy, however, the term itself has legal and political issues surrounding it. Information Privacy affects our personal and professional life. With the invention of the personal computer in 1970 and the internet reaching a critical mass in 1990, and the adoption of this technology three decades later, we society catapulted into what is known as the “Information Age”. The “Information Age” has allowed global network communication and shaped our modern society. With so many advancements in technology and the reliability of computers in our daily lives...

Words: 1364 - Pages: 6

Premium Essay

Computer Ethics

...Computer ethics Computer ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. The term "computer ethics" was first coined by Walter Maner in the mid-1970s, but only since the 1990s has it started being integrated into professional development programs in academic settings. The conceptual foundations of computer ethics are investigated by information ethics, a branch of philosophical ethics established by Luciano Floridi. Computer ethics is a very important topic in computer applications. The importance of computer ethics increased through the 1990s. With the growth of the Internet, privacy issues as well as concerns regarding computing technologies such as spyware and web browser cookies have called into question ethical behavior in technology. Identifying issues Identifying ethical issues as they arise, as well as defining how to deal with them, has traditionally been problematic in computer ethics. Some have argued against the idea of computer ethics as a whole. However, Collins and Miller proposed a method of identifying issues in computer ethics in their Paramedic Ethics model. The model is a data-centered view of judging ethical issues, involving the gathering, analysis, negotiation, and judging of data about the issue. In solving problems relating to ethical issues, Davis proposed a unique problem-solving method. In Davis's model, the ethical problem is stated, facts...

Words: 6774 - Pages: 28

Free Essay

Computer Privacy

...| Computer Privacy | For Managing Information Systems | C Potts10-26-2015 | COMPUTER PRIVACY Privacy can be a key aspect of the user experience with computers, online systems, and new technologies. Knowing what to consider about users and their views of computer systems can only improve privacy mechanisms. Privacy is emerging as a critical design element for interactive systems in areas as diverse as e-commerce, health care, office work, and personal communications. These systems face the same fundamental tension. On the one hand, personal information can be used to streamline interactions, facilitate communication, and improve services. On the other hand, this same information introduces risks, ranging from mere distractions to extreme threats. Government reports, essays, books, and media coverage testify on peoples’ concerns regarding the potential for abuse and general unease over the lack of control over a variety of computer systems. Similarly, application developers worry that privacy concerns can impair the acceptance and adoption of their systems. No end-to-end solutions exist to design privacy-respecting systems that cater to user concerns. This paper will show that researchers in Human–Computer Interaction (HCI) and Computer Supported Cooperative Work (CSCW) can greatly improve the protection of individual’s personal information, because many of the threats and vulnerabilities associated with privacy originate from the interactions between the people using...

Words: 799 - Pages: 4

Premium Essay

Technological Takeover

...said, “All this modern technology just makes people try to do everything at once.” In the short story “True Love” by Isaac Asimov, a computer named Joe “helps” his colleague Milton find his supposed true love through data banks. Meanwhile, the article “Americans complicated feelings about social media in an era of privacy concerns” by Lee Rainie from Pew Research Center discusses sentiments towards social media and the protection of people’s privacy. Whether telling a story of technological deception, or simply stating facts, both texts raise the question: can humans and computers efficiently coexist with each other, and not cause...

Words: 1298 - Pages: 6

Free Essay

Technology Acts Paper

...Technology Acts Paper Mary Phillips BIS/220 April 2, 2012 Jacqueline Sirota Technology Acts Paper My technology acts paper will be on the Children’s Internet Protection Act, 2000 and on the Children’s Online Privacy Protection Act (COPPA), 1998. Congress has done its part to protect our children with strict laws by enacting some changes in the way our children view the internet and how our children With the many changes in technology congress has to come up with new ethical issues that they have to create certain acts to protect our children. The government came up with the Children Internet Protection Act, 2001. Children are around computers most of the time. Computers are becoming part of our lives not only for grownups but for our children and adolescents too. Some children might not have a computer at home but they use one in school. Where there is a computer there is internet. The internet connects computers, cell phones, mainframes and any internet ready enabled device. Anyone, as long as they have an internet enabled device can use the internet. The internet is a massive public spiderweb of computer connections (Gil, 2012). Since anyone regardless of age can use the internet without any form of knowing who or what age they are they can browse any webpage they want. They can see explicit online content and even some online nudity. There is much internet pornography online and is open to anyone whom clicks on their link. It is no wonder the congress came up with...

Words: 1126 - Pages: 5

Premium Essay

Ethics

...and Menzel, D.C. (1998) Teaching Ethics and Values in Public Administration Programs: Innovations, Strategies and Issues, SUNY Press: Albany. Cappel, J.J. and Kappelman, L. (1997) The Year 2000 Problem: An Ethical Perspective, in: Kappelman, L., (Ed.), Year 2000 Problem: Strategies and Solutions from the Fortune 100, International Thomson Computer Press, Boston, 158-163. Floridi, L. (1999) Philosophy and Computing, London: Routledge. Johnson, D.G. and Nissenbaum, H. (1995) Computers, Ethics and Social Values, Prentice Hall. Kallman, E.A. and Grillo, J.P. (1996) Ethical Decision Making and Information Technology: An Introduction with Cases, McGraw Hill. Kaplan, B., Farzanfar, R. and Friedman R.H. (1999) Research and Ethical Issues Arising from Ethnographic Interviews of Patients’ Reactions to an Intelligent Interactive Telephone Health Behavior Advisor System, in: Ngwenyama, O., Introna, L.D., Myers, M.D. and DeGross, J.I. (Eds) New Information Technologies in Organizational Processes: Field Studies and Theoretical Reflections on the Future of Work, Boston: Kluwer Academic Publishers, 67-77. Langford, D. (1995) Practical Computer Ethics, London: McGraw Hill....

Words: 1786 - Pages: 8

Premium Essay

Technology Trends Proposal 2

...Technology Trends Proposal II HCS/483 Medical Robots Healthcare, education and communications are ways that individuals can interact with computers, especially in healthcare areas. Computers and software are practically in every area of healthcare. An important role of computers is the increase of its capabilities, availabilities, and accuracies of information that is used in the support and development of our health care systems. Some remarkable changes have occurred in our health care systems due to computers. One such computer is a medical robot. To allow surgeons to have a better access to areas that are more precise and tedious, a medical robot can be used for these types of operations. Privacy risks With the use of medical robots, there are more chances of privacy risks. A health care robot will be monitoring a patient 24 hours a day, and all the information that is collected and stored can be at risk. The reason for privacy risks is that all information that is collected can or will be reported to other robots, human providers or health information technologies. Healthcare robots will have capabilities of connecting to other devices and this will mean the transference of personal data. Healthcare robots will have the need of being sure they are running and functioning properly...

Words: 684 - Pages: 3

Premium Essay

Social, Legal, and Ethical Issues in the Information Age

...should be able to answer the following questions: 1. What ethical, social, and political issues are raised by information systems? 2. Are there specific principles for conduct that can be used to guide decisions about ethical dilemmas? 3. Why does contemporary information technology pose challenges to the protection for individual privacy and intellectual property? 4. How have information systems affected everyday life? 5. How can organizations develop corporate policies for ethical conduct? Key Terms The following alphabetical list identifies the key terms discussed in this chapter. The page number for each key term is provided. |Accountability, 154 |Intellectual property, 164 | |Carpal tunnel syndrome (CTS), 176 |Liability, 154 | |Computer abuse, 173 |Non-obvious relationship awareness (NORA), 153 | |Computer crime, 173 |Opt-in, 161 | |Computer vision syndrome (CVS), 177 |Opt-out, 161 | |Cookie, 160 |P3P, 162 | |Copyright...

Words: 5310 - Pages: 22

Free Essay

Information Privacy

...The privacy of personal information related to the data stored on the computer systems is termed as Information privacy. The information privacy is related to the privacy of personal data that is collected by various organizations for personal use. The private information can be stored in medical records, political records, criminal records, financial data, data on website or any information related to the business which needs to be protected and kept secured. The type of information that can be found is usually social security number, date and place of birth, and the place of domicile just to name of few. The invention of technology has caused many to lose sight of the definition of privacy . The advancement of technology is causing an increase in vulnerabilities in information privacy which is the reason why most companies had to adapt a code of ethics to protect consumers, employees and the company itself. According to (Ashurst, 2011) “Sensitive data in the right hands is vital, in the wrong hands it can cause offence, destroy reputations and cost businesses”. Thus to protect the personal data, information privacy can be applied in various ways such as encrypting the data, data masking and authentication by which only the people who are legitimate users can have access to the data of the organization with authorized access. When it comes to information Privacy the focus cannot be kept strictly on businesses, another major key player is Social media. Merriam Webster defines...

Words: 864 - Pages: 4

Premium Essay

Business Law

...Ethical and Legal Issues Concerning At-will Employment Jasmine Mills Park University Abstract As years pass by, every sphere of life is taking a new dimension; for instance, advancing technology. This has resulted in some ethical issues in workplaces such as cyberloafing, privacy, information technology usage, employee monitoring. Also, legal issues in workplaces such as lawsuits have emerged. Both employers and employees are worried about the ethical consequences resulting from the ethical issues While bosses use surveillance devices to keep track of their workers' activities and output, these workers feel that excessive monitoring is an attack on their confidentiality and privacy. The strategy of checking workers on a timely basis is contributed by the fact that bosses have rights over everything in the “at-will employment environment.” Additionally, this paper provides a proposal for reducing the ethical and legal issues. The paper also encourages organizations to generate and efficiently communicate ethical standards for workers in their companies. It also includes real examples of workers' perceptions as well as an emotional state from the surveys based on ethical and legal issues raised regarding the topic of study. Keywords: At-will employment, employee monitoring, Ethical and legal issues. Introduction At- will means employment can be terminated at any time, for any reason or no reason without facing legal action. Likewise, an employee can quit a job with or...

Words: 2152 - Pages: 9

Premium Essay

Management and Information Systems

...decisions. 3. Evaluate the impact of contemporary information systems and the Internet on the protection of individual privacy and intellectual property. 4. Assess how information systems have affected everyday life. CHAPTER OUTLINE 4.1 UNDERSTANDING ETHICAL AND SOCIAL ISSUES RELATED TO SYSTEMS A Model for Thinking About Ethical, Social, and Political Issues Five Moral Dimensions of the Information Age Key Technology Trends that Raise Ethical Issues ETHICS IN AN INFORMATION SOCIETY Basic Concepts: Responsibility, Accountability, and Liability Ethical Analysis Candidate Ethical Principles Professional Codes of Conduct Some Real-World Ethical Dilemmas THE MORAL DIMENSIONS OF INFORMATION SYSTEMS Information Rights: Privacy and Freedom in the Internet Age Property Rights: Intellectual Property Accountability, Liability, and Control System Quality: Data Quality and System Errors Quality of Life: Equity, Access, and Boundaries HANDS-ON MIS Developing a Web Site Privacy Policy: Dirt Bikes USA Achieving Operational Excellence: Creating a Simple Web Site Using Web Page Development Tools Improving Decision Making: Using Internet Newsgroups for Online Market Research 4.2 4.3 4.4 Interactive Sessions: Data for Sale The Internet: Friend or Foe to Children? LEARNING TRACK MODULE Developing a Corporate Code of Ethics for Information Systems DOES LOCATION TRACKING THREATEN PRIVACY? F or many years, parents of District of Columbia public school children complained about buses running late or...

Words: 20079 - Pages: 81

Premium Essay

Employee Privacy Act Report

...Week Five – Employee Privacy Act Report Jessica Jackson COM/285 Timothy Smith June 20, 2012 Employee Privacy Report In this report I will be discussing the current privacy policies at Abacus Technology Corporation. I will be going over the policies that Abacus Technology has in place regarding e-mail use and internet use. As well as reviewing the current laws that the State of Maryland has regarding employee e-mail and internet privacy. I will also be discussing why companies implement e-mail and internet use policies. Lastly, I will be covering what assumptions employees might make about their privacy at work and how the policies that are in place can affect an employee’s privacy at work. At Abacus Technology electronic communication such as e-mail and internet use is encouraged, however, electronic communications are considered company property and their purpose is only to be used for company business. The policy on electronic communication relates to all electronic media and services, which are accessed using company computer equipment, while on company premises, or by company-paid access methods, and used in a manner which identifies the individual with the company. Employees are not supposed to use electronic communications for excessive personal use, soliciting non-company business, and conducting activities that are illegal or contrary to the firm’s best interest. Individuals are also asked not to access criminal websites or transmit...

Words: 1107 - Pages: 5

Premium Essay

Big Brother Is Watching

...Information Privacy is a somewhat fresh concept. It is considered the third—and newest— layer controlled through digital technology (Anita Beveridge, 2014). Privacy is important in one’s personal and professional life. My definition of privacy is something that belongs to an individual person such as my personal information, things that I purchased myself, something that I have the right to that no one else does without my permission. According to Merriam Webster dictionary privacy is defined, “as the quality or state of being apart from company or observation” and/or “freedom from unauthorized intrusion.” The concept of information privacy has become more important as more systems controlling more information appear. It was suggested in about 1986 that information systems would increase privacy concerns (Bélanger, 2014), in present time this proves have been an accurate prediction. Information systems can develop the world with amplified access to information which includes communication and better productivity of large systems. We can enhance our lives with the usage of technology. With this same technology privacy can be destroyed and economies can be harmed by unethical acts such as cyber-attacks. The need to observe the go-ahead between information-sharing efforts and privacy and civil liberties is only likely to raise more pressing as the nature of the threats facing the United States shifts (Nelson, 2014). As technology continues to develop new ways to gather...

Words: 1769 - Pages: 8