Presentation is loading. Please wait.

Presentation is loading. Please wait.

3 Ethics and Privacy.

Similar presentations


Presentation on theme: "3 Ethics and Privacy."— Presentation transcript:

1 3 Ethics and Privacy

2 Define ethics, list and describe the three fundamental tenets of ethics, and describe the four categories of ethical issues related to information technology. Identify three places that store personal data, and for each one, discuss at least one potential threat to the privacy of the data stored there.

3 Ethical Issues Privacy

4 [ Opening Case WikiLeaks Marches On ]
The Problem The Solution The Results What We Learned from This Case

5 3.1 Pinterest

6 3.1 Ethical Issues Ethical Frameworks
Ethics in the Corporate Environment Ethics and Information Technology

7 3.1 Ethical Issues Ethics The principles of right and wrong that individuals use to make choices that guide their behavior.

8 Ethical Frameworks Four Widely Used Standards
Utilitarian Approach Rights Approach Fairness Approach Common Good Approach Combine Four Standards to Create a Framework for Ethical Decision Making Utilitarian Approach: states that an ethical action is the one that provides the most good or does the least harm. Rights Approach: maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties. Fairness Approach: posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard. For example, most people might believe it is fair to pay people higher salaries if they work harder or if they contribute a greater amount to the firm. Common Good Approach: highlights the interlocking relationships that underlie all societies. This approach argues that respect and compassion for all others is the basis for ethical actions.

9 Ethical Frameworks Five Steps in Ethical Decision Making Framework
Recognize an ethical issue Get the facts Evaluate alternative actions Make a Decisions and Test It Act and Reflect on the Outcome of Decisions Utilitarian Approach: states that an ethical action is the one that provides the most good or does the least harm. Rights Approach: maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties. Fairness Approach: posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard. For example, most people might believe it is fair to pay people higher salaries if they work harder or if they contribute a greater amount to the firm. Common Good Approach: highlights the interlocking relationships that underlie all societies. This approach argues that respect and compassion for all others is the basis for ethical actions.

10 Ethics in the Corporate Environment
Code of Ethics Fundamental Tenets of Ethics Responsibility Accountability Liability What is Unethical is not necessarily Illegal Responsibility: means that you accept the consequences of your decisions and actions. Accountability: refers to determining who is responsible for actions that were taken. Liability: is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

11 Ethics & Information Technology
Four General Categories of Ethical Issues Related to IT: Privacy Issues Accuracy Issues Property Issues Accessibility Issues 1. Privacy issues involve collecting, storing, and disseminating information about individuals. 2. Accuracy issues involve the authenticity, fidelity, and correctness of information that is collected and processed. 3. Property issues involve the ownership and value of information. 4. Accessibility issues revolve around who should have access to information and whether a fee should be paid for this access.

12 3.2 The Dot Clones

13 3.2 Privacy Electronic Surveillance Personal Information in Databases
Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites Privacy Codes and Policies International Aspects of Privacy

14 3.2 Privacy Privacy Information Privacy
The right to be left alone and to be free of unreasonable personal intrusions. Information Privacy The right to determine when, and to what extent, information about you can be gathered and/or communicated to others.

15 3.2 Privacy Court Decisions in Many Countries have followed two rules:
The right of privacy is not absolute. Privacy must be balanced against the needs of society. The public’s right to know supersedes the individual’s right of privacy.

16 3.2 Privacy Digital Dossier Profiling Data Aggregators LexisNexis
ChoicePoint Acxiom Digital Dossier: data integrated from data gathered about you in a typical day (surveillance cameras located on toll roads, on other roadways, in busy intersections, in public places, and at work; credit card transactions; telephone calls (landline and cellular); banking transactions; queries to search engines; and government records (including police records). Profiling: The process of forming a digital dossier. Data Aggregators: companies that collect public data such as real estate records and published telephone numbers, in addition to nonpublic information such as Social Security numbers; fi nancial data; and police, criminal, and motor vehicle records.

17 Electronic Surveillance
Using technology to monitor individuals as they go about their daily routines. Is conducted by employers, governments, and other institutions. Examples: Surveillance cameras in airports, subways, banks, and other public venues.

18 Electronic Surveillance
Inexpensive digital sensors are found in laptop webcams, video game sensors, smartphone cameras, utility meters, passports, and ID cards. Smartphones create geotags Google and Microsoft street view images Satellite imaging

19 Personal Information in Databases
Personal Data / Record Keepers Credit Reporting Agencies Banks and Financial Institutions Utility Companies Employers Hospitals Schools Government Agencies (IRS, State, City)

20 Personal Information in Databases
Major Concerns about Information You Provide Record Keepers Do you know where the records are? Are the records accurate? Can you change inaccurate data? How long will it take to make a change? Under what circumstances will personal data be released?

21 Personal Information in Databases
Major Concerns about Information You Provide Record Keepers How are the data used? To whom are the data given or sold? How secure are the data against access by unauthorized people?

22 Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites
Free Speech versus Privacy on the Internet Derogatory Information Can Influence Hiring Decisions Little to No Recourse for Victims

23 Privacy Codes & Policies
An organization’s guidelines for protecting the privacy of its customers, clients, and employees. Opt-out Model Opt-in Model Platform for Privacy Preferences (P3P) A protocol that communicates privacy policies between a web site and its visitors

24 Privacy Codes & Policies
US Federal Trade Commission’s Fair Information Practices Standard European Directive on Data Privacy

25 International Aspects of Privacy
The Global Nature of the Internet Complicates Data Privacy Approximately 50 Countries Have Data-Protection Laws Inconsistent standards from country to country Transborder data flow.

26 Google Glass: Big Brother Really is Watching You
3.3 Google Glass: Big Brother Really is Watching You

27 [ Closing Case Target Provides a Surprise ]
The Problem An Interesting IT Solution The Results: Initial Uses of Watson What We Learned from This Case


Download ppt "3 Ethics and Privacy."

Similar presentations


Ads by Google