Premium Essay

The Value of Digital Privacy in an Information Technology Age

In:

Submitted By dvflynn10235
Words 1451
Pages 6
The Value of Digital Privacy in an Information Technology Age

Diana Flynn

Strayer University

Professor James Merola

April 30, 2012

1. List and describe at least three (3) technologies that allow an individual to research citizen’s private data. Intelius.com is a technology that helps people find family members, friends, classmates, military buddies and almost anyone living in the United States. It sells background information to anyone or anybody regardless of who you are. DateCheck is a site hosted by Intelius which stores reports including names, addresses, birth dates, court records, and cell phone numbers. People can access personal records by name, social security number or phone number through Intelius. The second technology is Google.com. If you are looking for information on someone, searching the web using Google is one of the best places to start. A person can find background information, phone numbers, addresses, maps and more. On the flip side, anyone can find the same information about you. Information is given by citizens opening up an account. It is the basic information such as name, address, phone, email or credit card number. Information is shared with companies, organizations, and in individuals outside of Google with consent. Data searched on the web is stored to improve and maintain the security of their systems. Government agencies request information from Google about users and products. The third technology is Facebook, an online social network built with “apps” that live online your face book account. A person can buy an “app” for a small amount of money. Apps are games, quizzes and sharing services. These “apps” are gathering volumes of personal information. Information shared is emails, current locations, sexual preferences

Similar Documents

Premium Essay

Assignment 2: the Value of Digital Privacy in an Information Technology Age

...Assignment 2: The Value of Digital Privacy in an Information Technology Age Professor Weekley Law, Ethics and Corporate Governance May 5, 2013 There are many reasons you may want to get someone’s personal information, maybe you just need their address to send a card, but there are many people who have access to citizen’s private data with the click of a button. Your information can be searched for by anybody for any reason, and there are companies out there willing to help for a fee. The fourth amendment states, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated” (Halburt/Ingulli 2012). This law keeps people safe from searches for absolutely no reason, but the same protection does not expand to the internet, where these searches happen every day. There are a few ways of obtaining information about someone, and all you need to do is pay a small fee then you can have access to their address, phone number, criminal record and much more. You should only be able to get a background check on a person if you are a potential employer and after the person has signed a waiver. One such site offering these services is Spokeo.com. For $39.95 I can get the following information about anyone: Full Name, Photos & Profiles, Address, Property Records, Phone Number, Public Records, Relatives, Court Records, Month/Year of Birth, Sex Offender Check, Address History, and Criminal Check....

Words: 1128 - Pages: 5

Premium Essay

The Value of Digital Privacy in an Information Technology Age Brenda Steen Strayer University Leg/500 December 19, 2012 Professor: Dr. Pino the Following Assignment Contains Information Regarding Individual

...contains information regarding individual privacy in this age of information technology. On today’s vast information superhighway, private information can be found on most individuals within a couple of clicks of a computer mouse. This assignment will describe a minimum of three technologies that allow people to research the private information of citizens. This report provides and analysis of the advantages and disadvantages of having this information made public. Additionally, this report includes options individuals have to protect their private information. Last, this report discusses the existence and effectiveness of electronic privacy laws enacted to protect private information. Google is probably the most used search engine on the internet. It is usually the first step used to research private information. Google collects all available private information and conveniently places it at a researcher’s fingertips. Such information as address, telephone numbers, pictures and work history is available on Google. Facebook is another popular website people use to obtain private information. Researchers can gain information such as posted pictures, family/friend information, and place of employment. Researchers can also find out recreational information such as local establishments a person frequents or when he or she is on vacation. Many states use have county property tax websites. A researcher can simply type in a person’s name and find out information regarding...

Words: 951 - Pages: 4

Premium Essay

Value of Digital Privacy

...The Value of Digital Privacy in an Information Technology Age A weekend getaway in Vegas…$400, dinner at a fine restaurant…$200, digital privacy in the information technology age…PRICELESS. No value can be put on the importance of digital privacy in today’s world of the Internet. There are numerous technologies that allow individuals to research citizens’ private data. Websites such as Facebook, Intelius, and Spokeo allow for easy access to individuals’ personal information. Technologies That Allow Research of Private Data For today’s generation, Facebook has become as conventional as the telephone. You will not find many people functioning in today’s technological environment without a Facebook page. With so many people using the website, it has become a prime source in gathering personal data about individuals. So many users post personal information about where they work, what schools they attend, what vacations they’ve taken, the names/ages of theirs kids, and much more. And, of course, there are usually pictures to go along with all of the unsolicited information that’s posted. Social networking sites usually allow their users to join and host their information for free. These companies sometimes make their money by helping marketers to target advertising campaigns--a service for which advertisers pay tremendously. This creates profit for social networking companies as they provide a free service to users (Petryni, 2013). Intelius is one example of a people search...

Words: 979 - Pages: 4

Premium Essay

Digital Privacy

...The Value of Digital Privacy in the IT Age The Value of Digital Privacy in the IT Age Digital Privacy in the IT age is almost extinct. The World Wide Web houses information about anything and everyone. People use the digital technology everyday with the impression that what they are doing is protected from others, unless they chose. While few consumers are fully aware of how their data is being used and even fewer are capable of actively managing it, most individuals expect their digital identity to be treated responsibly and openly: 79%, for example, said companies should be more transparent about use of personal data. There are systems and technologies that people use to gain access to a person’s information. The information obtained can be an advantage or disadvantage. The government has implemented laws for years to try to establish some controls There are many technologies that will allow an individual to research citizens, but the three that will be discussed are Facebook, Intellus, and Google. Facebook is a web based social app use to contact friends. A person can either download for free or buy “apps” for a small amount of money. Apps are games, quizzes and sharing services. These “apps” are consists a host of personal information which includes emails, current locations, sexual preferences of “app” users and their friends. Intelius allows people to access personal records by name, social security number or phone number. People use this system to find family or do...

Words: 963 - Pages: 4

Premium Essay

Mis 513 Chapter1

...CHAPTER 1 Managing in the Digital World CHAPTER OBJECTIVES After reading this chapter, you will be able to do the following: 1. 2. 3. 4. 5. Describe the characteristics of the digital world and the advent of the information age. Define globalization, describe how it evolved over time, and describe the key drivers of globalization. Explain what an information system is, contrasting its data, technology, people, and organizational components. Describe the dual nature of information systems in the success and failure of modern organizations. Describe how computer ethics impact the use of information systems and discuss the ethical concerns associated with information privacy and intellectual property. CHAPTER OVERVIEW This chapter helps the student understand the role of information systems as organizations move into the digital world, and how they have helped fuel globalization. The student will learn what information systems are, how they have evolved to become a vital part of modern organizations, and why this understanding is necessary to become an effective manager in the digital world. The student will also learn how globalization evolved, and what opportunities globalization presents for organizations. The importance of ethics as it relates to IS is discussed especially as it relates to information privacy, accuracy, property, and accessibility. A number of cases and illustrations are used, for example, Apple products and how they have evolved over time (such as...

Words: 3147 - Pages: 13

Free Essay

Management Info Systems Ethics Hw

...help define the solution. Second, you must define the conflict and identify the higher-order values involved. This is because the parties usually claim during a dispute they are all pursuing higher values. Third, stakeholders should be identified so you can figure out what they want, which might also be used later when figuring out a solution. Fourth, you must identify the options that you can reasonably take, even though this may not satisfy all the stakeholders. Finally, you must identify the potential consequences of your actions. This would include looking at the consequences from various points of views. There are also six ethical principles that can be used to help. One principle is called the Golden Rule, which is to do unto others as you would have them do unto you. Another principle is Descartes’ Rule of Change. This principle states that if an action cannot be taken repeatedly, it is not right to take at all. Another principle would be the Risk Aversion Principle. This one says you should take the action that produces the least harm or least potential cost. There is also Immanuel Kant’s Categorical Imperative, which first has you evaluate the action. If the action is not right for everyone to take, then it is not the right one to take at all. Another principle would be the Utilitarian Principle, which says that one should do the action that achieves the higher or greater value. Finally, there is the Ethical “no free lunch” Rule. This principle says that you should assume...

Words: 1596 - Pages: 7

Premium Essay

Marketing Plan

...Marketing Strategy 7 Value Proposition 7 Segmentation 7 Targeting 7 Positioning 8 Actions 9 Website 9 Outbound Media Messaging 9 Social Media Promotion 9 Specific Initiatives 9 Budgets, Assumptions, & Risks 10 Controls 11 Appendices 12 References 14 Introduction The Marketing Plan to launch the new Gerrarrom service to new users, is summarised below for January to June 2014. UK based early adopter academics at three specific universities, fit the high knowledge, heavy digital usage profile most likely to value a cutting edge internet experience given their collaborative digital enterprise, and likelihood to rapidly grow usage. Viral marketing is used to secure digital word-of-mouth recommendations from the targeted influencers by competing for attention, referals, and useage activity. The service is positioned for digitally productive academics needing a superior layer of compartmentalised internet, a less intrusive interface and an evolved content feed that provides the one stop shop for all public and private Social Media (SM) productivity. The plan covers the logical flow of considerations, goals and actions defined by Armstrong and Kotler (2012), for creation, definition and communication of value to the target segment. Marketing Situation Gerraroom will drive adoption via unforeseen modes of web interaction but launches to existing SM users, so current and evolved trends are relevant. Mckinsey's Digital Economy report (2012)...

Words: 3010 - Pages: 13

Premium Essay

Big Brother Is Watching

...Information Privacy is a somewhat fresh concept. It is considered the third—and newest— layer controlled through digital technology (Anita Beveridge, 2014). Privacy is important in one’s personal and professional life. My definition of privacy is something that belongs to an individual person such as my personal information, things that I purchased myself, something that I have the right to that no one else does without my permission. According to Merriam Webster dictionary privacy is defined, “as the quality or state of being apart from company or observation” and/or “freedom from unauthorized intrusion.” The concept of information privacy has become more important as more systems controlling more information appear. It was suggested in about 1986 that information systems would increase privacy concerns (Bélanger, 2014), in present time this proves have been an accurate prediction. Information systems can develop the world with amplified access to information which includes communication and better productivity of large systems. We can enhance our lives with the usage of technology. With this same technology privacy can be destroyed and economies can be harmed by unethical acts such as cyber-attacks. The need to observe the go-ahead between information-sharing efforts and privacy and civil liberties is only likely to raise more pressing as the nature of the threats facing the United States shifts (Nelson, 2014). As technology continues to develop new ways to gather...

Words: 1769 - Pages: 8

Premium Essay

Laudon Ch5

...Management Information Systems MANAGING THE DIGITAL FIRM Kenneth C. Laudon New York University f Jane P. Laudon Azimuth Information Systems PEARSON feerttifie tall Pearson Education International Brief Contents Part One Chapter 1 Chapter 2 Chapter 3 Chapter 4 Part One Project Organizations, Management, and the Networked Enterprise 1 Information Systems in Global Business Today 2 Global E-Business: How Businesses Use Information Systems 38 Information Systems, Organizations, and Strategy 80 Ethical and Social Issues in Information Systems 124 Analyzing Business Processes for an Enterprise System 165 Part Two Chapter 5 Chapter 6 Chapter 7 Chapter 8 Part Two Project Information Technology Infrastructure 167 IT Infrastructure and Emerging Technologies 168 Foundations of Business Intelligence: Databases and Information Management 222 Telecommunications, the Internet, and Wireless Technology 260 Securing Information Systems 312 Creating a New Internet Business 351 Part Three Chapter 9 Chapter 10 Chapter 11 Chapter 12 Part Three Project Key System Applications for the Digital Age 353 Achieving Operational Excellence and Customer Intimacy: Enterprise Applications 354 E-Commerce: Digital Markets, Digital Goods 388 Managing Knowledge 428 Enhancing Decision Making 470 Designing an Enterprise Information Portal 508 Part Four Chapter 13 Chapter 14 Chapter 15 Part Four Project Building and Managing Systems 509 Building Systems 510 Project Management:...

Words: 3508 - Pages: 15

Free Essay

Cyber Law

... TITLE OF THE PAPER: CYBER SPACE MASS SURVEILLANCE PROGRAMS,INFRINGEMENT OF PRIVACY OF INDIVIDUALS, BY STATE IN THE NAME OF NATIONAL SECURITY. ABSTRACT: In this present era of cyber revolution and globalization, citizens have turned into “Netizens”. The advancements in the field of technology is also accompanied with the development of various methods of surveillance and intervention by the State into individuals’ private information. Governments are keeping an eagle eye by monitoring individual's movements, businesses transactions and also the means of communication, which includes cyberspace. It is alleged that the United States of America’s National Security Agency runs a program known as PRISM, which enables the US government to gain access to e- mails , conversations, pictures, voice calls and even sign in details of people using websites and applications associated with 1|Page Facebook, Yahoo, Microsoft, to name a few. Failure of cyber law mechanisms and national authorities to advance legislation and frameworks along with the technological developments and the increasing trends on States’ surveillance practices has created an environment in which citizen’s right to privacy is easily violated, leading to human rights violations also and lack of accountability, which raises questions on the legitimacy of such act of state. This research paper will mainly be focusing on this issue of privacy...

Words: 6245 - Pages: 25

Premium Essay

1. Why Is the Autonation Having Problem with Its Inventory? Why Is This Also a Problem for Auto Manufacturers Such as Gm, Ford, and Chrysler

...False _____ 1. From the point of view of economics, information systems technology cannot be viewed as a factor of production that can be substituted for traditional capital and labor. _____ 2. The idea driving synergies is that when the output of some units can be used as inputs to other units, the relationship will raise cost and decrease profits _____ 3. Customers are one of the competitive forces that affect an organization's ability to compete. _____ 4. The law of diminishing returns does not apply to digital, like it does with traditional companies. _____ 5. The use of Internet technologies allows companies to more easily sustain competitive advantage ____ 6. Advances in data storage have made routine violation of individual privacy easier ____ 7. Spyware is a small file containing information about you and your Web activities that is deposited on your hard disk by a Web site. ____ 8. A cookie is software that comes hidden in downloaded applications and can track your online movements. ____ 9. Due to the passage of several laws defining and addressing computer crime, accessing a computer system without authorization is a federal crime. ____ 10. Radiation from computer display screens has not been proven to be a factor in CVS. Multiple Choice: Mark each answer with the letter corresponding to the correct answer. There is only one correct answer. _____ 11. Which of the following would NOT be considered a disruptive technology? A) Internet telephony B) e-mail C) instant messaging...

Words: 769 - Pages: 4

Premium Essay

Security And Privacy Controversy Online

...This paper outlines why security and privacy cannot be mutually exclusive. As we continue to advance with information and communication technologies, our society will require cyberlaws and the government needs to equip law enforcement with modernized tools to protect society’s most vulnerable in cyberspace. To achieve a happy medium between security and privacy, I propose the concepts of transparency, accountability, integrity, and professionalism in the security-privacy debate.  Today, there are over three billion online users, which make up about 40% of the world population (ITU 2014). The users are online, conducting daily communications, transactions, and sharing of information. The Internet has created an increasing amount of personal...

Words: 1892 - Pages: 8

Free Essay

Technology and Privacy

...Running head: TECHNOLOGY AND PRIVACY 1 Technology and Privacy Shawna Greiner SOC 120 Jenna Soard April 22, 2012 Technology 2 There was not such a thing known of as technology back in the beginning of time, but now technology has become the biggest thing used; it is so powerful throughout the world, that it is the number one thing used for just about everything in our everyday life. People have to have technology at a majority of their jobs in order to complete their tasks, Hospitals have to have it in order to take care of people and most of all keep track of files and records of people, government offices are the biggest one to have the technology that keeps all or a majority of information about every single human being that has lived. Another big technology that is done, but has been taken out of proportion is the internet and privacy. People that want to steal, take advantage of another person’s personal information, whether their social security number, physical address, work and income information along with credit, and bank accounts, then it is used to the person stealing it for their own advantage which later destroys the victim a lot of times. Technology has advanced to our own freedom...

Words: 1852 - Pages: 8

Premium Essay

Cookies

...Is the use of technologies, such as "cookies", strategic to marketing goods and services online? What is the impact, if any, on consumer privacy? A few years ago, the combination of technology and marketing was not a common term. Even a very successful marketing model that was followed by software giant Microsoft, was neglected in many top ranking business schools. According to them what Microsoft was doing was a fad. But time has proved that they were wrong. Marketing guru Kotler has agreed that traditional marketing is not working any more. The economic power has shifted from marketers to customers. This shift happens in the market place due to the technology. Today customers have the access to information that lets them make much more informed decisions. Customers are increasingly telling companies what type of product or services they want and when, where and how they want to buy them. Before purchase a product or service, they compare each of the competitors' product and their pricing, availability and value for money. So customers are now in control. Customer's action and their demands are profoundly impacting every industry in the market. The use of technologies such as cookies is paramount to the implementation of such marketing practices, which ultimately benefit both the retailer and the consumer. Without these, retailers would not be able to fine-tune their marketing strategies and focus, and consumers would not be able to provide, through their actions...

Words: 6638 - Pages: 27

Premium Essay

Technology and Privavy

...Technology and Privacy Name: Course: Institution: Lecture Date: The world today has modern technology that makes life easier and dependable on it. Technology claims a huge influence on many aspects of life: economic, social and political among others. There are both aesthetic and scientific dimensions towards technology in that those scientists and artists have worked single-handedly or together in the future and present-day like in making dimensional inventions. Although the technology has its positive on the human life, it also has its negative effects on humans. Over years now so many evils against humanity have cropped up socially, politically and even economically (Agre & Rotenberg 1998). Politically, people have pointed accusing fingers to the government for failing to safeguard their privacy but only to make false assurances. The government has been repeatedly allowed its agencies to monitor phone calls and emails from foreigners visiting the USA with the intention of protecting its national security. They monitor these communications in hope that they detect any terrorist plans against the country. Although monitoring may have succeeded extensively in a repeated occasions, the privacy of innocent individuals has been violated by accessing private conversations. It is the fear of many too that while only government agencies can access private information, the data gathered could be used not only for the right reasons. Personal information of people is being...

Words: 652 - Pages: 3