Annotated Bibliography Over the last several years, the issue of IT ethics has been increasingly brought to the forefront. This is because of transformations occurring through rapid advancements and the way various applications are utilized. To fully understand what is taking place requires conducting an annotated bibliography on the subject and the impact it is having on these standards. These findings will highlight the overall scope of the challenges and the long term effects they are having on stakeholders. Spinello, R. A. (2011). Regulating Internet Privacy. Cyber Ethics - Morality and Law in Cyberspace. Sudbury, MA: Jones and Bartlett Learning. In chapter 5, Spinello (2011) found that privacy is becoming a major challenge for all different segments of society. This is occurring in a number of different areas including: consumer spending / buying patterns, inside the home / workplace and the way this technology is applied. Moreover, there is a discussion about the various vulnerabilities of the Internet and how issues such cybercrime / spying have resulted directly from these increases. To address these difficulties, both the US and the EU have adopted various laws governing how data is collected and utilized. (Spinello, 2011) This has resulted in challenges impacting everyone, as balance must be maintained in protecting the interests of free speech. While at the same time, it is ensuring that firms are not abusing the information that is collected on consumers.
In “Privacy under Attack,” the authors discuss some potential ways of how our privacy could be in danger or stolen by companies or accessible by administration and corporations. According to the authors, some ways that our privacy could be in danger are first through video records and picture taken by traffic cameras and surveillance cameras for us. Second through illegal “wiretaps” by the government that could hear our conversations. Third, our privacy and personal data could be “monitored by corporations through the role of club cards, raffles, or refunds that outside companies’ collection of data about us can then be sold without noticing, given consumers the optional to search for the box on any frame to indicate they don’t want their personal
The article called, The End of Privacy by Adam L. Penenberg, demonstrates the easy access an intruder can have to someone’s private information in today’s digital world with just a few taps on the keyboard, and a phone. Making your private information unprotected and defenseless. Penenberg also describes transition from mainframe computers to desktop PCs making private information vulnerable. He also reveals that marketers and busybodies have more customer data than ever. He also illustrates the advances of search methods that cyber criminals have up their sleeve, how the misrepresent themselves in order to puncture through the credit bureaus, and the Federal reserve database, spilling out all of your financial information, social security,
Privacy, a term that is reluctant in today’s modernized society who’s meaning is far from realistic. As the world congruently fosters a new way of living, through technology our lives as we know as our own is far from it. This paper will discuss the use of technology to research ones private information, the advantages and disadvantages of the public access of such information and the laws that promulgate such data.
Surveillance and the right to privacy have far reaching consequences and implications. In fact, both involve even more topics such as encryption, hacking, and leaks of sensitive information. Sure it is easy to conclude from the sources included in this piece that surveillance does diminish personal privacy to a certain extent, but it’s better to deduce that more people should understand and be aware of how serious of an issue this really is. There are people who seek to promote and diminish surveillance and consumer’s control of their own information and that contributes to the complexity of this growing problem. The research done so far only touches the surface of why it is important for people to learn about protecting themselves from unwanted spying, yet it still needs to expand into explaining more in depth the goals of the government agencies that encourage surveillance programs. As of now, after reviewing all these sources, I think it is important to stress that this issue is not simple. Moreover, is it worth it for an individual to sacrifice personal liberties such as privacy for "safety" through increased surveillance? Consumer privacy should not be sacrificed to ensure public safety since this would undermine the personal liberties of millions of
Lately, in the United States, the controversial topic of privacy has been rekindled by several occurrences, including the recent NSA surveillance scandal. When government actions are questioned, the
Government surveillance in the past was not a big threat due to the limitations on technology; however, in the current day, it has become an immense power for the government. Taylor, author of a book on Electronic Surveillance supports, "A generation ago, when records were tucked away on paper in manila folders, there was some assurance that such information wouldn 't be spread everywhere. Now, however, our life stories are available at the push of a button" (Taylor 111). With more and more Americans logging into social media cites and using text-messaging devices, the more providers of metadata the government has. In her journal “The Virtuous Spy: Privacy as an Ethical Limit”, Anita L. Allen, an expert on privacy law, writes, “Contemporary technologies of data collection make secret, privacy invading surveillance easy and nearly irresistible. For every technology of confidential personal communication…there are one or more counter-technologies of eavesdropping” (Allen 1). Being in the middle of the Digital Age, we have to be much more careful of the kinds of information we put in our digital devices.
Daniel Solove, a professor who specializes in internet privacy law, wrote this book to give his personal take on how the internet was transforming the way people connect through social mediums and how that could change in the future. An important thing to note about this book is that it was published in 2007, so some of the social and technological aspects of the book are slightly dated. Regardless of this though, this book provides an inquisitive perspective on the dynamic nature of the internet as a vessel of our society’s changing norms on privacy in the social sphere. Many of our learning points in class relate to topics discussed in this book and help to strengthen the context and significance of the underlying message.
In the modern society, the technology is growing at a dramatic speed. New ways of communication make the conception of privacy more obscure. At the same time, it is harder for people to actually keep the “privacy”. For example, in old days, someone could steal others’ privacy only by sneaking around; in the phone era, this can be achieved by placing the detectaphone; currently, in the internet era, with video calls, e-mails and the latest “cloud storage”, the stealer can get the information by acquiring the data from the server. Other than focusing on few people, those data allow the stealer to have a broad surveillance, and even without exposing him/herself. This “access” could be “hacking”, or something worse, a special program used by the
Privacy vs. security has been a hot topic of debate for every country around the world. The argument is whether or not the government should get to see all of its citizens information to keep its people more protected. However, in the article "Who Has the Right to Track You?", the author explains that corporations are seeking the right to purchase certain individuals private information. The author greatly shows the idea that companies are becoming too powerful and too demanding. In comparison, in the article "Private License Plate Scanners Amassing Vast Databases Open to Highest Bidders", the author describes how certain governments will sell technology to capture private
Technological surveillance is used in a wide field of areas from wiretapping, hacking, bugging, electronic tracking, video surveillance and so on, but, “when used by the government, technological surveillance creates a particularly dramatic threat to the privacy of individual citizens” (p. 354), although this is uncertain to the government if it is indeed goes against citizen’s privacy. Technology advances so quickly, that the law cannot keep up with the swift changes.
Internet privacy, a subset to computer privacy, involves the mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information relating to oneself via Internet. The controversy of privacy concern has being articulated form the beginnings of large scale computer sharing. According to Maureen Dorney in her article, “Privacy and the Internet” she states that in 1993 there were already 83% of Americans that were concerned with threats to personal privacy. In fact, this was not the only year in which data was collected. She adds that in 1970 there were an increasing number of populations being threat of privacy violations. Since then, the controversy prompted several members of congress to call for increased privacy protection for data
The concern about privacy on the Internet is increasingly becoming an issue of international dispute. ?Citizens are becoming concerned that the most intimate details of their daily lives are being monitored, searched and recorded.? (www.britannica.com) 81% of Net users are concerned about threats to their privacy while online. The greatest threat to privacy comes from the construction of e-commerce alone, and not from state agents. E-commerce is structured on the copy and trade of intimate personal information and therefore, a threat to privacy on the Internet.
Today, individuals are sacrificing privacy in order to feel safe. These sacrifices have made a significant impact on the current meaning of privacy, but may have greater consequences in the future. According to Debbie Kasper in her journal, “The Evolution (Or Devolution) of Privacy,” privacy is a struggling dilemma in America. Kasper asks, “If it is gone, when did it disappear, and why?”(Kasper 69). Our past generation has experienced the baby boom, and the world today is witnessing a technological boom. Technology is growing at an exponential rate, thus making information easier to access and share than ever before. The rapid diminishing of privacy is leaving Americans desperate for change.
Privacy either encourages or is a necessary factor of human securities and fundamental value such as human embarrassment, independence, distinctiveness, freedom, and public affection. Being completely subject to mutual scrutiny will begin to lose self-respect, independence, distinctiveness, and freedom as a result of the sometimes strong burden to conform to public outlooks.
For future IT professionals, it is important to understand the range of organisation’s ethical and legal responsibilities. Thus, ethical issues in IT differ from general ethical issues in various ways. For minimising the issues, it is important to given major attention to its implementation tool and laws related to it.