1) Ethical Issues:
- Ethical: deal with what is considered to be right and wrong. Deciding what is right or wrong is not always easy or clear cut.
♣ Ethical Frameworks:
● Utilitarian approach: an ethical action is the one that provides the most good or does the least harm.
● Right approach: an ethical action is the one that best protects and respects the moral rights of the affected people.
- Moral Rights:
♢ The right to make your own choices.
♢ The right to be told the truth.
♢ The right of privacy.
● Fairness approach: ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.
● Common good approach: highlights the interlocking relationships that underlie all societies. This approach argues that respect and compassion for all is the basis for ethical actions.
------------------------------------------------------------------------------------
♣ Ethical in the Corporate Environment:
- Code of Ethical: a collection of principle that are intended to guide decision making by members of an organization.
(http://www.acm.org/about/code-ofethics)
■ Fundamental Tenets of Ethics:
• Responsibility: mean that you accept the consequences of your decisions and actions.
• Accountability: a determination of who is responsible for actions that were taken.
• Liability: is a legal concept that gives individuals the right to recover the damages done to them by other individual, organizations, or systems.
-----------------------------------------------------------------------------------
♣ Ethical and Information Technology :
- All employees have a responsibility to encourage ethical uses of information and information technology.
- The diversity and ever - expanding use of IT applications have created a variety of Ethical issues.
-These issues fall into four general categories:
• Privacy issues: involve collecting, storing, and disseminating information about individuals.
• Accuracy issues: involve the authenticity, fidelity, and accuracy of information that is collected and processed.
• Property issues: involve the ownership and value of information.
• Accessibility issues: revolve around who should have access to information and whether a fee should be paid for this access.
------------------------------------------------------------------------------------
2) Privacy:
- Privacy: is the right to be left alone and to be free of unreasonable personal intrusions.
- Information Privacy: is the right to determine when, and what, and to what extent, information about you can be gathered and/or communicated to others.
● The definition of privacy can be interpreted quite broadly. However, court decisions in many countries have followed two rules fairly closely:
1. The right of privacy is not absolute. Privacy must be balanced against the needs of society.
2. The public's right to know supersedes the individual's right of privacy.
- These two rules illustrate why determining and enforcing privacy regulations can be difficult.
----------------------------------------------
- Data aggregators: companies that collect public data (e.g. real estate records, telephone numbers) and non public data (e.g. social security numbers, financial data, police records, motor vehicle records) and integrate them to produce digital dossiers.
- Digital dossiers: an electronic description of you and your habits.
- Profiling: use of computers to combine data from multiple sources and create digital dossiers of detailed information on individuals.
- NORA (non obvious relationship awareness): new data and analysis technique for even more powerful profiling.
----------------------------------------------------------------
♣ Electronic Surveillance: the tracking of people's activities, online, or offline, with the aid of computers.
- cookies.
- URL filtering.
♣ Personal Information in Databases.
- Information about individuals is being kept in many databases:
• Banks, Utility companies, government agencies, Credit reporting companies.
♣ Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites.
♣ Privacy Codes and Policies: an organization's guidelines with respect to protecting the privacy of customers, clients, and employees.
- Opt - out Model: informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
- Opt - in Model: informed consent means that organizations are prohibited from collecting any personal information unless the customer specifically authorizes it.
🔹 Platform for Privacy Preferences (P3P): a protocol that automatically communicates privacy policies between an electronic commerce website and visitors to that site.
- P3P enables visitors to determine the types of personal data that can be extracted by the websites they visit.
- Ethical: deal with what is considered to be right and wrong. Deciding what is right or wrong is not always easy or clear cut.
♣ Ethical Frameworks:
● Utilitarian approach: an ethical action is the one that provides the most good or does the least harm.
● Right approach: an ethical action is the one that best protects and respects the moral rights of the affected people.
- Moral Rights:
♢ The right to make your own choices.
♢ The right to be told the truth.
♢ The right of privacy.
● Fairness approach: ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.
● Common good approach: highlights the interlocking relationships that underlie all societies. This approach argues that respect and compassion for all is the basis for ethical actions.
------------------------------------------------------------------------------------
♣ Ethical in the Corporate Environment:
- Code of Ethical: a collection of principle that are intended to guide decision making by members of an organization.
(http://www.acm.org/about/code-ofethics)
■ Fundamental Tenets of Ethics:
• Responsibility: mean that you accept the consequences of your decisions and actions.
• Accountability: a determination of who is responsible for actions that were taken.
• Liability: is a legal concept that gives individuals the right to recover the damages done to them by other individual, organizations, or systems.
-----------------------------------------------------------------------------------
♣ Ethical and Information Technology :
- All employees have a responsibility to encourage ethical uses of information and information technology.
- The diversity and ever - expanding use of IT applications have created a variety of Ethical issues.
-These issues fall into four general categories:
• Privacy issues: involve collecting, storing, and disseminating information about individuals.
• Accuracy issues: involve the authenticity, fidelity, and accuracy of information that is collected and processed.
• Property issues: involve the ownership and value of information.
• Accessibility issues: revolve around who should have access to information and whether a fee should be paid for this access.
------------------------------------------------------------------------------------
2) Privacy:
- Privacy: is the right to be left alone and to be free of unreasonable personal intrusions.
- Information Privacy: is the right to determine when, and what, and to what extent, information about you can be gathered and/or communicated to others.
● The definition of privacy can be interpreted quite broadly. However, court decisions in many countries have followed two rules fairly closely:
1. The right of privacy is not absolute. Privacy must be balanced against the needs of society.
2. The public's right to know supersedes the individual's right of privacy.
- These two rules illustrate why determining and enforcing privacy regulations can be difficult.
----------------------------------------------
- Data aggregators: companies that collect public data (e.g. real estate records, telephone numbers) and non public data (e.g. social security numbers, financial data, police records, motor vehicle records) and integrate them to produce digital dossiers.
- Digital dossiers: an electronic description of you and your habits.
- NORA (non obvious relationship awareness): new data and analysis technique for even more powerful profiling.
----------------------------------------------------------------
♣ Electronic Surveillance: the tracking of people's activities, online, or offline, with the aid of computers.
- cookies.
- URL filtering.
♣ Personal Information in Databases.
- Information about individuals is being kept in many databases:
• Banks, Utility companies, government agencies, Credit reporting companies.
♣ Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites.
♣ Privacy Codes and Policies: an organization's guidelines with respect to protecting the privacy of customers, clients, and employees.
- Opt - out Model: informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
- Opt - in Model: informed consent means that organizations are prohibited from collecting any personal information unless the customer specifically authorizes it.
🔹 Platform for Privacy Preferences (P3P): a protocol that automatically communicates privacy policies between an electronic commerce website and visitors to that site.
- P3P enables visitors to determine the types of personal data that can be extracted by the websites they visit.
No comments:
Post a Comment