Chapter 3 ethics and privacy

25 May 2015
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
Chapter 3 ethics and privacy
1 sur 19

Contenu connexe

Tendances

Chap 4 (1)Chap 4 (1)
Chap 4 (1)UNIVERSITAS TEKNOKRAT INDONESIA
Data privacy & social mediaData privacy & social media
Data privacy & social mediaProf. Jacques Folon (Ph.D)
Inter-Process Communication in distributed systemsInter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsAya Mahmoud
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINamiable_indian
Chap01 Foundations of Information Systems in BusinessChap01 Foundations of Information Systems in Business
Chap01 Foundations of Information Systems in BusinessAqib Syed

En vedette

Ch04Ch04
Ch04Jennifer Polack
Intellectual Property/Copyright/EthicsIntellectual Property/Copyright/Ethics
Intellectual Property/Copyright/ EthicsNatalia1818
Chapter 2  legal ethicsChapter 2  legal ethics
Chapter 2 legal ethicscharwendel
Intellectual propertyIntellectual property
Intellectual propertynamarias
Intellectual Property, Copyright, and EthicsIntellectual Property, Copyright, and Ethics
Intellectual Property, Copyright, and Ethicsakia38321
Ethic02Ethic02
Ethic02Larcyneil Pascual

Similaire à Chapter 3 ethics and privacy

COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfManishKarki12
Chapter 4Chapter 4
Chapter 4ghghghghgh
For this assignment, you are given an opportunity to explore and.docxFor this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docxshanaeacklam
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxFahimMuntasir21
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
E commerce E commerce
E commerce DrSelvamohanaK

Dernier

WHY for Rotary 2023.09.20.08.56.pptxWHY for Rotary 2023.09.20.08.56.pptx
WHY for Rotary 2023.09.20.08.56.pptxPaul Menig
7 HABITS PRESENTATION ppt. 333.pptx7 HABITS PRESENTATION ppt. 333.pptx
7 HABITS PRESENTATION ppt. 333.pptxWisdom1231
LeadershipLeadership
LeadershipPMIUKChapter
SpatzAI - A workplace toolkit to resolve micro-conflicts in teamsSpatzAI - A workplace toolkit to resolve micro-conflicts in teams
SpatzAI - A workplace toolkit to resolve micro-conflicts in teamsDesmond Sherlock
FINANCIAL LITERACY FOR DIRECTORS - NOKIA SUCCESS, FAILURE & PATH TO REVIVAL b...FINANCIAL LITERACY FOR DIRECTORS - NOKIA SUCCESS, FAILURE & PATH TO REVIVAL b...
FINANCIAL LITERACY FOR DIRECTORS - NOKIA SUCCESS, FAILURE & PATH TO REVIVAL b...Kumari Warsha Goel
What Matters, What’s Important, What’s Possible - Revisited 2023What Matters, What’s Important, What’s Possible - Revisited 2023
What Matters, What’s Important, What’s Possible - Revisited 2023Steve Jennings

Chapter 3 ethics and privacy

Notes de l'éditeur

  1. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action is the one that best protects and respects the moral rights of the affected parties. Fairness approach: ethical actions treat all humans equally, or if unequally, then fairly, based on some defensible standard. Common good approach: highlights the interlocking relationships that underlie all societies.
  2. A Code of Ethics is a collection of principles that are intended to guide decision making by members of an organization. Responsibility means that you accept the consequences of your decisions and actions. Accountability means a determination of who is responsible for actions that were taken. Liability is a legal concept meaning that individuals have the right to recover the damages done to them by other individuals, organizations, or systems.
  3. The link will take you to online Appendix W3.1 for 14 ethics scenarios. Each of these scenarios elicits interesting class discussions, because none are particularly “clear cut” as to what the “right thing to do” is.
  4. Privacy Issues involve collecting, storing and disseminating information about individuals. Accuracy Issues involve the authenticity, fidelity and accuracy of information that is collected and processed. Property Issues involve the ownership and value of information. Accessibility Issues revolve around who should have access to information and whether they should have to pay for this access.
  5. Privacy is the right to be left alone and to be free of unreasonable personal intrusions.
  6. Data aggregators are companies that collect public data (e.g., real estate records, telephone numbers) and nonpublic data (e.g., social security numbers, financial data, police records, motor vehicle records) and integrate them to produce digital dossiers. Digital dossier is an electronic description of you and your habits. Profiling is the process of creating a digital dossier.
  7. Electronic Surveillance. The tracking of people‘s activities, online or offline, with the aid of computers. The image demonstrates that many people are blissfully unaware that they can be under electronic surveillance while they are using their computers.
  8. The BusinessWeek article is an interesting look at the state of surveillance today. The surveillance slideshow accompanies the BusinessWeek article. The additional surveillance slides show modern surveillance equipment. The video is a tongue-in-cheek look at how little privacy all of us have left. The video is a great example of the impacts that data aggregators, digital dossiers, and profiling might have in the very near future.
  9. Personal Information in Databases. Information about individuals is being kept in many databases: banks, utilities co., govt. agencies, …etc.; the most visible locations are credit-reporting agencies. Equifax, TransUnion, and Experian are the three best known credit reporting agencies. Clicking on the logo of each company will take you to its homepage.
  10. Social Networking Sites often include electronic discussions such as chat rooms. These sites appear on the Internet, within corporate intranets, and on blogs. A blog (Weblog) is an informal, personal journal that is frequently updated and intended for general public reading. The logos represent popular social networking sites. Clicking on the logo will take you to the respective home pages.
  11. The second article shows students how information they (or others) post to social networking sites can impact their lives, in particular, their job search. This information may take the form of text, images, etc.
  12. Clicking on the ReputationDefender logo will take you to its homepage.
  13. Privacy Codes and Policies. An organization’s guidelines with respect to protecting the privacy of customers, clients, and employees. Opt-out model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected. Opt-in model of informed consent means that organizations are prohibited from collecting any personal information unless the customer specifically authorizes it. (Preferred by privacy advocates.) International Aspects of Privacy. Privacy issues that international organizations and governments face when information spans countries and jurisdictions.