In these post I will highlight the most important point in every section of chapter three
3.1 Ethical Issues
*Ethical Frameworks:
Utilitarian approach: an ethical action is the one that
provides the most good or does the least harm.
Rights approach: ethical action is the one that best
protects and respects the moral rights of the affected parties.
Fairness approach: ethical actions treat all humans equally,
or if unequally, then fairly, based on some defensible standard.
Common good approach: highlights the interlocking
relationships that underlie all societies.
*General Framework for Ethics:
- Recognize an ethical issue
- Get the facts
- Evaluate alternative actions
- Make a decision and test it
- Act and reflect on the outcome of your decision
*Ethics in the Corporate Environment
Code of ethics: A Code of Ethics is a collection of
principles that are intended to guide decision making by members of an
organization.
*Fundamental tenets of ethics:
Responsibility: Responsibility means that you accept the
consequences of your decisions and actions.
Accountability: Accountability means a determination of who
is responsible for actions that were taken.
Liability: Liability is a legal concept meaning that
individuals have the right to recover the damages done to them by other
individuals, organizations, or systems.
*Ethics and Information Technology
Four categories of ethical issues involving IT applications:
Privacy Issues: involve collecting, storing and
disseminating information about individuals.
Accuracy Issues: involve the authenticity, fidelity and
accuracy of information that is collected and processed.
Property Issues: involve the ownership and value of
information.
Accessibility Issues: revolve around who should have access
to information and whether they should have to pay for this access.
3.2 Privacy
Privacy: is the right to be left alone and to be free of
unreasonable personal intrusions.
*Threats to Privacy:
- Data aggregators, digital dossiers, and profiling
- Electronic Surveillance
- Personal Information in Databases
- Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites
Data Aggregators, Digital Dossiers, and Profiling:-
Data aggregators are companies that collect public data
(e.g., real estate records, telephone numbers) and nonpublic data (e.g., social
security numbers, financial data, police records, motor vehicle records) and
integrate them to produce digital dossiers.
Digital dossier is an electronic description of you and your
habits.
Profiling is the process of creating a digital dossier.
Electronic
Surveillance:-
Electronic Surveillance: The tracking of people‘s
activities, online or offline, with the aid of computers.
The image demonstrates that many people are blissfully
unaware that they can be under electronic surveillance while they are using
their computers.
Personal Information in Databases:-
Personal Information in Databases: Information about
individuals is being kept in many databases: banks, utilities co., govt.
agencies, …etc.; the most visible locations are credit-reporting agencies.
Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites:-
Social Networking Sites often include electronic discussions
such as chat rooms. These sites appear on the Internet, within corporate
intranets, and on blogs.
A blog (Weblog) is an informal, personal journal that is
frequently updated and intended for general public reading.
*Protecting Privacy:
Privacy Codes and Policies: An organization’s guidelines
with respect to protecting the privacy of customers, clients, and employees.
Opt-out model of informed consent permits the company to
collect personal information until the customer specifically requests that the
data not be collected.
Opt-in model of informed consent means that organizations
are prohibited from collecting any personal information unless the customer
specifically authorizes it.
No comments:
Post a Comment