Chapter 3

Jennifer Polack
Jennifer PolackProfessor of Computer Science at University of Mary Washington à University of Mary Washington
Ethics and Privacy
3
[ Opening Case WikiLeaks Marches On ]
• The Problem: How to Prevent Future
Disclosures?
• The Solution: Security? Cyber Security hasn’t
worked. Fingerprints haven’t worked?
• The Results: Some say reform, shouldn’t have
anything to hide, what do you say
• What We Learned from This Case: How much
access should employees have to sensitive data?
IT’s About [small] business
Pinterest3.1
Who is at fault for the third-party copyright infringements enabled by
Pinterest? Pinterest, its users, or both? (Copyright infringement is discussed
in detail in Chapter 4.)
Compare the ethics of “pinning” on Pinterest with downloading music files
on Napster. Do you think that Pinterest will face the same fate as Napster?
Why or why not?
Ethical Issues3.1
• Ethical Frameworks
• Ethics in the Corporate Environment
• Ethics and Information Technology
Ethical Issues3.1
• Ethics
– The principles of right and wrong that
individuals use to make choices that
guide their behavior.
Ethical Frameworks
• Four Widely Used Standards
– Utilitarian Approach
– Rights Approach
– Fairness Approach
– Common Good Approach
• Combine Four Standards to Create a
Framework for Ethical Decision Making
Ethical Frameworks
• Utilitarian Approach: states that an ethical action is the one that
provides the most good or does the least harm.
• Rights Approach: maintains that an ethical action is the one that
best protects and respects the moral rights of the affected parties.
• Fairness Approach: posits that ethical actions treat all human
beings equally, or, if unequally, then fairly, based on some
defensible standard. For example, most people might believe it is
fair to pay people higher salaries if they work harder or if they
contribute a greater amount to the firm.
• Common Good Approach: highlights the interlocking
relationships that underlie all societies. This approach argues that
respect and compassion for all others is the basis for ethical actions.
Ethical Frameworks
• Five Steps in Ethical Decision Making
Framework
1. Recognize an ethical issue
2. Get the facts
3. Evaluate alternative actions
4. Make a Decisions and Test It
5. Act and Reflect on the Outcome of Decisions
Ethics in the Corporate
Environment
• Code of Ethics
• Fundamental Tenets of Ethics
– Responsibility
– Accountability
– Liability
• What is Unethical is not necessarily Illegal
Fundamental Tenets of Ethics
• Responsibility: means that you accept the
consequences of your decisions and actions.
• Accountability: refers to determining who is
responsible for actions that were taken.
• Liability: is a legal concept that gives individuals
the right to recover the damages done to them by
other individuals, organizations, or systems.
Ethics & Information
Technology
• Four General Categories of Ethical Issues
Related to IT:
1. Privacy Issues
2. Accuracy Issues
3. Property Issues
4. Accessibility Issues
Four General Categories of
Ethical Issues Related to IT:
1. Privacy issues involve collecting, storing, and disseminating
information about individuals.
2. Accuracy issues involve the authenticity, fidelity, and
correctness of information that is collected and processed.
3. Property issues involve the ownership and value of
information.
4. Accessibility issues revolve around who should have access to
information and whether a fee should be paid for this access.
IT’s [about business]
The Dot Clones3.2
As for legality, it partially depends on the legal and licensing
limitations of the country where the site(s) are created. This is
slowly changing as countries permit cross-licensing.
What are some alternative strategies that companies might use
to combat dot clones?
Discuss the ethical implications of the statement from Groupon’s
CEO that the Samwers are superb operators, not simply copycats.
Privacy3.2
• Electronic Surveillance
• Personal Information in Databases
• Information on Internet Bulletin Boards,
Newsgroups, and Social Networking
Sites
• Privacy Codes and Policies
• International Aspects of Privacy
Privacy3.2
• Privacy
– The right to be left alone and to be free
of unreasonable personal intrusions.
• Information Privacy
– The right to determine when, and to what
extent, information about you can be
gathered and/or communicated to others.
Privacy3.2
• Court Decisions in Many Countries
have followed two rules:
1. The right of privacy is not absolute.
Privacy must be balanced against the
needs of society.
2. The public’s right to know supersedes
the individual’s right of privacy.
Privacy3.2
• Digital Dossier
• Profiling
• Data Aggregators
– LexisNexis
– ChoicePoint
– Acxiom
Privacy3.2
• Digital Dossier: data integrated from data gathered about you in a
typical day (surveillance cameras located on toll roads, on other
roadways, in busy intersections, in public places, and at work;
credit card transactions; telephone calls (landline and cellular);
banking transactions; queries to search engines; and government
records (including police records).
• Profiling: The process of forming a digital dossier.
• Data Aggregators: companies that collect public data such as real
estate records and published telephone numbers, in addition to
nonpublic information such as Social Security numbers; fi nancial
data; and police, criminal, and motor vehicle records.
Electronic Surveillance
• Using technology to monitor individuals as
they go about their daily routines.
• Is conducted by employers, governments, and
other institutions.
• Examples:
– Surveillance cameras in airports, subways, banks,
and other public venues.
Electronic Surveillance
• Inexpensive digital sensors are found in laptop
webcams, video game sensors, smartphone
cameras, utility meters, passports, and ID
cards.
• Smartphones create geotags
• Google and Microsoft street view images
• Satellite imaging
Personal Information in Databases
• Personal Data / Record Keepers
– Credit Reporting Agencies
– Banks and Financial Institutions
– Utility Companies
– Employers
– Hospitals
– Schools
– Government Agencies (IRS, State, City)
Personal Information in Databases
• Major Concerns about Information You
Provide Record Keepers
– Do you know where the records are?
– Are the records accurate?
– Can you change inaccurate data?
– How long will it take to make a change?
– Under what circumstances will personal data be
released?
Personal Information in Databases
• Major Concerns about Information You
Provide Record Keepers
– How are the data used?
– To whom are the data given or sold?
– How secure are the data against access by
unauthorized people?
Information on Internet Bulletin Boards,
Newsgroups, and Social Networking Sites
• Free Speech versus Privacy on the Internet
• Derogatory Information Can Influence Hiring
Decisions
• Little to No Recourse for Victims
Privacy Codes & Policies
• An organization’s guidelines for protecting the
privacy of its customers, clients, and
employees.
– Opt-out Model
– Opt-in Model
• Platform for Privacy Preferences (P3P)
– A protocol that communicates privacy policies
between a web site and its visitors
Privacy Codes & Policies
• US Federal Trade Commission’s Fair
Information Practices Standard
• European Directive on Data Privacy
International Aspects of Privacy
• The Global Nature of the Internet Complicates
Data Privacy
• Approximately 50 Countries Have Data-
Protection Laws
– Inconsistent standards from country to country
– Transborder data flow.
[ Closing Case Target Provides
a Surprise ]
• The Problem
• An Interesting IT Solution
• The Results: Initial Uses of Watson
• What We Learned from This Case
1 sur 28

Contenu connexe

Tendances

Ethics in IT SecurityEthics in IT Security
Ethics in IT Securitymtvvvv
3.5K vues31 diapositives
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
78.8K vues16 diapositives

Tendances(20)

Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
Atul Kumar Pandey52.3K vues
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
mtvvvv3.5K vues
A framework for ethical decision makingA framework for ethical decision making
A framework for ethical decision making
jyotijagtap_774.3K vues
Chapter   1- Overview of EthicsChapter   1- Overview of Ethics
Chapter 1- Overview of Ethics
Suji Priya J1.5K vues
GDPR infographicGDPR infographic
GDPR infographic
Marketing Team at Crown Worldwide Group638 vues
Privacy in cyberspacePrivacy in cyberspace
Privacy in cyberspace
navrecruiter23.4K vues
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
stanbridge50.3K vues
Information SecurityInformation Security
Information Security
Dhilsath Fathima15.7K vues
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
mrzapper1.7K vues
Cyber lawCyber law
Cyber law
Keshab Nath8.6K vues
Ethical Implications of ITEthical Implications of IT
Ethical Implications of IT
university of education,Lahore2K vues
Privacy in simplePrivacy in simple
Privacy in simple
Aurora Computer Studies4.8K vues
Business ethics lecture slides pptBusiness ethics lecture slides ppt
Business ethics lecture slides ppt
Osama Yousaf294 vues
Information PrivacyInformation Privacy
Information Privacy
imehreenx831 vues

En vedette(16)

Codesof practiceCodesof practice
Codesof practice
Rebecca Jones345 vues
Ethics in itEthics in it
Ethics in it
Akash Mathapati8.2K vues
Ethical Use Of InformationEthical Use Of Information
Ethical Use Of Information
L.V. Rogers Secondary School32K vues
Ethics In Information TechnologyEthics In Information Technology
Ethics In Information Technology
jvonschilling4.8K vues
Information ethicsInformation ethics
Information ethics
STCC Library14K vues
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
katespeach15.8K vues
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
Prof. Erwin Globio40.7K vues
Computer EthicsComputer Ethics
Computer Ethics
poonam.rwalia49.8K vues
Computer ethicsComputer ethics
Computer ethics
Jagan Nath81.4K vues
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c457.9K vues

Similaire à Chapter 3

Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
16.5K vues72 diapositives
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7Kashif Sohail
594 vues10 diapositives
Ch 4.pdfCh 4.pdf
Ch 4.pdfMohamed Ali
30 vues29 diapositives

Similaire à Chapter 3(20)

3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
Raymond Gao1.4K vues
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
Jason Hong16.5K vues
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
Kashif Sohail594 vues
Ch 4.pdfCh 4.pdf
Ch 4.pdf
Mohamed Ali30 vues
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
Security Innovation128 vues
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
Tom Walker52 vues
Data set   Legislation Data set   Legislation
Data set Legislation
Data-Set27 vues
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
Ravindra Babu224 vues
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
stirlingvwriters7 vues
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
robkitchin1.6K vues
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
Perry Slack20.9K vues
chapter05 (1).pptchapter05 (1).ppt
chapter05 (1).ppt
HudaElMaghraby13 vues
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
Arianto Muditomo124 vues

Plus de Jennifer Polack

Erd examplesErd examples
Erd examplesJennifer Polack
6.9K vues48 diapositives
Trainer use casesTrainer use cases
Trainer use casesJennifer Polack
236 vues6 diapositives
Umw training programUmw training program
Umw training programJennifer Polack
253 vues6 diapositives

Plus de Jennifer Polack(20)

Erd examplesErd examples
Erd examples
Jennifer Polack6.9K vues
Trainer use casesTrainer use cases
Trainer use cases
Jennifer Polack236 vues
Umw training programUmw training program
Umw training program
Jennifer Polack253 vues
Classroom scheduler updateClassroom scheduler update
Classroom scheduler update
Jennifer Polack256 vues
Temperature data analyzer requirementsTemperature data analyzer requirements
Temperature data analyzer requirements
Jennifer Polack281 vues
Cataloged and student workers databaseCataloged and student workers database
Cataloged and student workers database
Jennifer Polack483 vues
Temperature Analyzer ProjectTemperature Analyzer Project
Temperature Analyzer Project
Jennifer Polack285 vues
Database designDatabase design
Database design
Jennifer Polack3.1K vues
System ModellingSystem Modelling
System Modelling
Jennifer Polack4.1K vues
Software processSoftware process
Software process
Jennifer Polack9K vues
Agile software processAgile software process
Agile software process
Jennifer Polack955 vues
What is software engineeringWhat is software engineering
What is software engineering
Jennifer Polack10.1K vues
Requirements engineeringRequirements engineering
Requirements engineering
Jennifer Polack1K vues
Chapter 11Chapter 11
Chapter 11
Jennifer Polack845 vues
Chapter 10Chapter 10
Chapter 10
Jennifer Polack713 vues
Chapter 9Chapter 9
Chapter 9
Jennifer Polack592 vues
Ccsc 2015 panelCcsc 2015 panel
Ccsc 2015 panel
Jennifer Polack598 vues

Dernier(20)

Narration lesson plan.docxNarration lesson plan.docx
Narration lesson plan.docx
TARIQ KHAN92 vues
Scope of Biochemistry.pptxScope of Biochemistry.pptx
Scope of Biochemistry.pptx
shoba shoba119 vues
ICANNICANN
ICANN
RajaulKarim2061 vues
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxGopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Debapriya Chakraborty479 vues
ACTIVITY BOOK key water sports.pptxACTIVITY BOOK key water sports.pptx
ACTIVITY BOOK key water sports.pptx
Mar Caston Palacio275 vues
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
DR .PALLAVI PATHANIA190 vues
231112 (WR) v1  ChatGPT OEB 2023.pdf231112 (WR) v1  ChatGPT OEB 2023.pdf
231112 (WR) v1 ChatGPT OEB 2023.pdf
WilfredRubens.com118 vues
Chemistry of sex hormones.pptxChemistry of sex hormones.pptx
Chemistry of sex hormones.pptx
RAJ K. MAURYA107 vues
Narration  ppt.pptxNarration  ppt.pptx
Narration ppt.pptx
TARIQ KHAN76 vues
Material del tarjetero LEES Travesías.docxMaterial del tarjetero LEES Travesías.docx
Material del tarjetero LEES Travesías.docx
Norberto Millán Muñoz60 vues
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra1460 vues
Streaming Quiz 2023.pdfStreaming Quiz 2023.pdf
Streaming Quiz 2023.pdf
Quiz Club NITW97 vues
2022 CAPE Merit List 2023 2022 CAPE Merit List 2023
2022 CAPE Merit List 2023
Caribbean Examinations Council3.5K vues
discussion post.pdfdiscussion post.pdf
discussion post.pdf
jessemercerail85 vues
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan256 vues
Psychology KS4Psychology KS4
Psychology KS4
WestHatch54 vues
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch54 vues

Chapter 3

  • 2. [ Opening Case WikiLeaks Marches On ] • The Problem: How to Prevent Future Disclosures? • The Solution: Security? Cyber Security hasn’t worked. Fingerprints haven’t worked? • The Results: Some say reform, shouldn’t have anything to hide, what do you say • What We Learned from This Case: How much access should employees have to sensitive data?
  • 3. IT’s About [small] business Pinterest3.1 Who is at fault for the third-party copyright infringements enabled by Pinterest? Pinterest, its users, or both? (Copyright infringement is discussed in detail in Chapter 4.) Compare the ethics of “pinning” on Pinterest with downloading music files on Napster. Do you think that Pinterest will face the same fate as Napster? Why or why not?
  • 4. Ethical Issues3.1 • Ethical Frameworks • Ethics in the Corporate Environment • Ethics and Information Technology
  • 5. Ethical Issues3.1 • Ethics – The principles of right and wrong that individuals use to make choices that guide their behavior.
  • 6. Ethical Frameworks • Four Widely Used Standards – Utilitarian Approach – Rights Approach – Fairness Approach – Common Good Approach • Combine Four Standards to Create a Framework for Ethical Decision Making
  • 7. Ethical Frameworks • Utilitarian Approach: states that an ethical action is the one that provides the most good or does the least harm. • Rights Approach: maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties. • Fairness Approach: posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard. For example, most people might believe it is fair to pay people higher salaries if they work harder or if they contribute a greater amount to the firm. • Common Good Approach: highlights the interlocking relationships that underlie all societies. This approach argues that respect and compassion for all others is the basis for ethical actions.
  • 8. Ethical Frameworks • Five Steps in Ethical Decision Making Framework 1. Recognize an ethical issue 2. Get the facts 3. Evaluate alternative actions 4. Make a Decisions and Test It 5. Act and Reflect on the Outcome of Decisions
  • 9. Ethics in the Corporate Environment • Code of Ethics • Fundamental Tenets of Ethics – Responsibility – Accountability – Liability • What is Unethical is not necessarily Illegal
  • 10. Fundamental Tenets of Ethics • Responsibility: means that you accept the consequences of your decisions and actions. • Accountability: refers to determining who is responsible for actions that were taken. • Liability: is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
  • 11. Ethics & Information Technology • Four General Categories of Ethical Issues Related to IT: 1. Privacy Issues 2. Accuracy Issues 3. Property Issues 4. Accessibility Issues
  • 12. Four General Categories of Ethical Issues Related to IT: 1. Privacy issues involve collecting, storing, and disseminating information about individuals. 2. Accuracy issues involve the authenticity, fidelity, and correctness of information that is collected and processed. 3. Property issues involve the ownership and value of information. 4. Accessibility issues revolve around who should have access to information and whether a fee should be paid for this access.
  • 13. IT’s [about business] The Dot Clones3.2 As for legality, it partially depends on the legal and licensing limitations of the country where the site(s) are created. This is slowly changing as countries permit cross-licensing. What are some alternative strategies that companies might use to combat dot clones? Discuss the ethical implications of the statement from Groupon’s CEO that the Samwers are superb operators, not simply copycats.
  • 14. Privacy3.2 • Electronic Surveillance • Personal Information in Databases • Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites • Privacy Codes and Policies • International Aspects of Privacy
  • 15. Privacy3.2 • Privacy – The right to be left alone and to be free of unreasonable personal intrusions. • Information Privacy – The right to determine when, and to what extent, information about you can be gathered and/or communicated to others.
  • 16. Privacy3.2 • Court Decisions in Many Countries have followed two rules: 1. The right of privacy is not absolute. Privacy must be balanced against the needs of society. 2. The public’s right to know supersedes the individual’s right of privacy.
  • 17. Privacy3.2 • Digital Dossier • Profiling • Data Aggregators – LexisNexis – ChoicePoint – Acxiom
  • 18. Privacy3.2 • Digital Dossier: data integrated from data gathered about you in a typical day (surveillance cameras located on toll roads, on other roadways, in busy intersections, in public places, and at work; credit card transactions; telephone calls (landline and cellular); banking transactions; queries to search engines; and government records (including police records). • Profiling: The process of forming a digital dossier. • Data Aggregators: companies that collect public data such as real estate records and published telephone numbers, in addition to nonpublic information such as Social Security numbers; fi nancial data; and police, criminal, and motor vehicle records.
  • 19. Electronic Surveillance • Using technology to monitor individuals as they go about their daily routines. • Is conducted by employers, governments, and other institutions. • Examples: – Surveillance cameras in airports, subways, banks, and other public venues.
  • 20. Electronic Surveillance • Inexpensive digital sensors are found in laptop webcams, video game sensors, smartphone cameras, utility meters, passports, and ID cards. • Smartphones create geotags • Google and Microsoft street view images • Satellite imaging
  • 21. Personal Information in Databases • Personal Data / Record Keepers – Credit Reporting Agencies – Banks and Financial Institutions – Utility Companies – Employers – Hospitals – Schools – Government Agencies (IRS, State, City)
  • 22. Personal Information in Databases • Major Concerns about Information You Provide Record Keepers – Do you know where the records are? – Are the records accurate? – Can you change inaccurate data? – How long will it take to make a change? – Under what circumstances will personal data be released?
  • 23. Personal Information in Databases • Major Concerns about Information You Provide Record Keepers – How are the data used? – To whom are the data given or sold? – How secure are the data against access by unauthorized people?
  • 24. Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites • Free Speech versus Privacy on the Internet • Derogatory Information Can Influence Hiring Decisions • Little to No Recourse for Victims
  • 25. Privacy Codes & Policies • An organization’s guidelines for protecting the privacy of its customers, clients, and employees. – Opt-out Model – Opt-in Model • Platform for Privacy Preferences (P3P) – A protocol that communicates privacy policies between a web site and its visitors
  • 26. Privacy Codes & Policies • US Federal Trade Commission’s Fair Information Practices Standard • European Directive on Data Privacy
  • 27. International Aspects of Privacy • The Global Nature of the Internet Complicates Data Privacy • Approximately 50 Countries Have Data- Protection Laws – Inconsistent standards from country to country – Transborder data flow.
  • 28. [ Closing Case Target Provides a Surprise ] • The Problem • An Interesting IT Solution • The Results: Initial Uses of Watson • What We Learned from This Case

Notes de l'éditeur

  1. Utilitarian Approach: states that an ethical action is the one that provides the most good or does the least harm. Rights Approach: maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties. Fairness Approach: posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard. For example, most people might believe it is fair to pay people higher salaries if they work harder or if they contribute a greater amount to the firm. Common Good Approach: highlights the interlocking relationships that underlie all societies. This approach argues that respect and compassion for all others is the basis for ethical actions.
  2. Utilitarian Approach: states that an ethical action is the one that provides the most good or does the least harm. Rights Approach: maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties. Fairness Approach: posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard. For example, most people might believe it is fair to pay people higher salaries if they work harder or if they contribute a greater amount to the firm. Common Good Approach: highlights the interlocking relationships that underlie all societies. This approach argues that respect and compassion for all others is the basis for ethical actions.
  3. Utilitarian Approach: states that an ethical action is the one that provides the most good or does the least harm. Rights Approach: maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties. Fairness Approach: posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard. For example, most people might believe it is fair to pay people higher salaries if they work harder or if they contribute a greater amount to the firm. Common Good Approach: highlights the interlocking relationships that underlie all societies. This approach argues that respect and compassion for all others is the basis for ethical actions.
  4. Responsibility: means that you accept the consequences of your decisions and actions. Accountability: refers to determining who is responsible for actions that were taken. Liability: is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
  5. Responsibility: means that you accept the consequences of your decisions and actions. Accountability: refers to determining who is responsible for actions that were taken. Liability: is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
  6. 1. Privacy issues involve collecting, storing, and disseminating information about individuals. 2. Accuracy issues involve the authenticity, fidelity, and correctness of information that is collected and processed. 3. Property issues involve the ownership and value of information. 4. Accessibility issues revolve around who should have access to information and whether a fee should be paid for this access.
  7. 1. Privacy issues involve collecting, storing, and disseminating information about individuals. 2. Accuracy issues involve the authenticity, fidelity, and correctness of information that is collected and processed. 3. Property issues involve the ownership and value of information. 4. Accessibility issues revolve around who should have access to information and whether a fee should be paid for this access.
  8. Digital Dossier: data integrated from data gathered about you in a typical day (surveillance cameras located on toll roads, on other roadways, in busy intersections, in public places, and at work; credit card transactions; telephone calls (landline and cellular); banking transactions; queries to search engines; and government records (including police records). Profiling: The process of forming a digital dossier. Data Aggregators: companies that collect public data such as real estate records and published telephone numbers, in addition to nonpublic information such as Social Security numbers; fi nancial data; and police, criminal, and motor vehicle records.
  9. Digital Dossier: data integrated from data gathered about you in a typical day (surveillance cameras located on toll roads, on other roadways, in busy intersections, in public places, and at work; credit card transactions; telephone calls (landline and cellular); banking transactions; queries to search engines; and government records (including police records). Profiling: The process of forming a digital dossier. Data Aggregators: companies that collect public data such as real estate records and published telephone numbers, in addition to nonpublic information such as Social Security numbers; fi nancial data; and police, criminal, and motor vehicle records.