3 Ethics and Privacy 1 Define ethics list
- Slides: 27
3 Ethics and Privacy
1. Define ethics, list and describe three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. 2. Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.
1. Ethical Issues 2. Privacy
[ Opening Case Wiki. Leaks Marches On ] • • The Problem The Solution The Results What We Learned from This Case
About [small] business 3. 1 Pinterest
3. 1 Ethical Issues • Ethical Frameworks • Ethics in the Corporate Environment • Ethics and Information Technology
3. 1 Ethical Issues • Ethics – The principles of right and wrong that individuals use to make choices that guide their behavior.
Ethical Frameworks • Four Widely Used Standards – Utilitarian Approach – Rights Approach – Fairness Approach – Common Good Approach • Combine Four Standards to Create a Framework for Ethical Decision Making
Ethical Frameworks • Five Steps in Ethical Decision Making Framework 1. 2. 3. 4. 5. Recognize an ethical issue Get the facts Evaluate alternative actions Make a Decisions and Test It Act and Reflect on the Outcome of Decisions
Ethics in the Corporate Environment • Code of Ethics • Fundamental Tenets of Ethics – Responsibility – Accountability – Liability • What is Unethical is not necessarily Illegal
Ethics & Information Technology • Four General Categories of Ethical Issues Related to IT: 1. 2. 3. 4. Privacy Issues Accuracy Issues Property Issues Accessibility Issues
[about business] 3. 2 The Dot Clones
3. 2 Privacy • Electronic Surveillance • Personal Information in Databases • Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites • Privacy Codes and Policies • International Aspects of Privacy
3. 2 Privacy • Privacy – The right to be left alone and to be free of unreasonable personal intrusions. • Information Privacy – The right to determine when, and to what extent, information about you can be gathered and/or communicated to others.
3. 2 Privacy • Court Decisions in Many Countries have followed two rules: 1. The right of privacy is not absolute. Privacy must be balanced against the needs of society. 2. The public’s right to know supersedes the individual’s right of privacy.
3. 2 Privacy • Digital Dossier • Profiling • Data Aggregators – Lexis. Nexis – Choice. Point – Acxiom
Electronic Surveillance • Using technology to monitor individuals as they go about their daily routines. • Is conducted by employers, governments, and other institutions. • Examples: – Surveillance cameras in airports, subways, banks, and other public venues.
Electronic Surveillance • Inexpensive digital sensors are found in laptop webcams, video game sensors, smartphone cameras, utility meters, passports, and ID cards. • Smartphones create geotags • Google and Microsoft street view images • Satellite imaging
Personal Information in Databases • Personal Data / Record Keepers – Credit Reporting Agencies – Banks and Financial Institutions – Utility Companies – Employers – Hospitals – Schools – Government Agencies (IRS, State, City)
Personal Information in Databases • Major Concerns about Information You Provide Record Keepers – Do you know where the records are? – Are the records accurate? – Can you change inaccurate data? – How long will it take to make a change? – Under what circumstances will personal data be released?
Personal Information in Databases • Major Concerns about Information You Provide Record Keepers – How are the data used? – To whom are the data given or sold? – How secure are the data against access by unauthorized people?
• Free Speech versus Privacy on the Internet • Derogatory Information Can Influence Hiring Decisions • Little to No Recourse for Victims
Privacy Codes & Policies • An organization’s guidelines for protecting the privacy of its customers, clients, and employees. – Opt-out Model – Opt-in Model • Platform for Privacy Preferences (P 3 P) – A protocol that communicates privacy policies between a web site and its visitors
Privacy Codes & Policies • US Federal Trade Commission’s Fair Information Practices Standard • European Directive on Data Privacy
International Aspects of Privacy • The Global Nature of the Internet Complicates Data Privacy • Approximately 50 Countries Have Data. Protection Laws – Inconsistent standards from country to country – Transborder data flow.
[about business] 3. 3 Google Glass: Big Brother Really is Watching You
[ Closing Case Target Provides a Surprise ] • • The Problem An Interesting IT Solution The Results: Initial Uses of Watson What We Learned from This Case
- Cvs privacy awareness and hipaa training answers
- Chapter 9 privacy security and ethics
- Chapter 9 privacy security and ethics
- Chapter 9 privacy security and ethics
- Is a destructive event a program is intended to deliver.
- Micro vs macro ethics
- Privacy
- Microsoft from back doors gov active
- Family educational rights and privacy act
- Family educational rights and privacy act of 1974
- Confidentiality and privacy controls
- Three primary privacy issues are accuracy property and
- Hipaa privacy and security awareness training
- Chapter 8 skin disorders and diseases
- Non moral examples
- Axiomatic system definition
- Singly linked list vs doubly linked list
- Introduction to linked list
- List g shows list of
- Single linked list adalah yang paling dari semua varian
- Select list item list index too large
- Descriptive ethics
- Normative ethics
- Valuing time in professional ethics
- Methaethics
- Descriptive ethics vs normative ethics
- Compensatory justice examples
- Theological voluntarism