We live in a world that keeps changing, almost everything is in constant change, including our lives. Our involvement with technology has been a crucial part of it since it has shaped the way information is processed and transferred throughout the entire world. It has been helping us, and therefore making our lives easier (in a certain way) by providing us useful tools and by helping us to make tasks that might have taken a long time to do by ourselves. According to ‘Moore’s Law, technology will continue to improve and grow in an exponential rate1, but not everything about the continuous presence of technology in our lives has been depicted as positive. Along the ease of making our daily tasks a little less enduring, there is another side of it in which many people have been preoccupied with for more than just a few decades. Some writers expressed their preoccupations through their novels, showing us what could happen in the not-so-distant future if we do not pay enough attention to this topic. Some of them (to name a few) were Philip L. Dick, Aldous Huxley, along George Orwell, with his amazing, yet frightening novel named ‘Nineteen Eighty-Four’.2 Although those novels were presented a long time ago and were merely works of fiction we can see that they were based on a legitimate concern, and impressively enough we still do, but in a different context. There are several ethical aspects involved in the era that we live in, but mainly there are four ethical issues regarding the information era: Accuracy, Property, Access, and Privacy.3 For the purposes of this work I will choose the last one to give different examples that involve an ethical dilemma and try to view it through different philosophical perspectives, although I have ... ... middle of paper ... ..." Justice: What's the Right Thing to Do? New York: Farrar, Straus and Giroux, 2009. 35. Print. 17. Kovacs, Gary. "Gary Kovacs: Tracking Our Online Trackers." TED: Ideas worth Spreading. N.p., May 2012. Web. 18 Nov. 2013. . 18. Kovacs, Gary. "Gary Kovacs: Tracking Our Online Trackers." TED: Ideas worth Spreading. N.p., May 2012. Web. 18 Nov. 2013. . 19. Britz, J. J. "TECHNOLOGY AS A THREAT TO PRIVACY: Ethical Challenges." TECHNOLOGY AS A THREAT TO PRIVACY: Ethical Challenges. University of Pretoria, n.d. Web. 18 Nov. 2013. . 20. Bazerman, Max H., and Ann E. Tenbrunsel. Blind Spots: Why We Fail to Do What's Right and What to Do about It. Princeton, NJ: Princeton UP, 2011. Print.
The degree of privacy protection may differ among cultures and countries, and correspondence may encompass anything from a casual conversation among family members to extensive use of advanced telecommunications devices, but the principle remains the same: at a fundamental level, all human beings have a right to lawfully go about their ordinary business without interference or surveillance. Governments wishing to avoid United Nations sanctions may not make laws abridging these basic rights, and furthermore, must make it unlawful for other entities to do so as well. As the product of an international organization, the Declaration of Human Rights makes a strong case for a universal set of basic rights that follow from innate characteristics shared by all humans, in particular our sense of our own individual identities, and our ability to make choices based on intelligent reflection as opposed to instinctive reaction. In short, the Declaration of Human Rights recognizes the concept of "personhood", and supports the right of each person to a private personal life. This paper addresses some of the issues surrounding the growing use of technology in our everyday lives, and it's impact on personal privacy, particularly in the United States.
Gopnik, Adam. "How the Internet Gets Inside Us." NewYorker.com. The New Yorker, February 14, 2011. Web. 6 March 2012.
Different people, cultures, and nations have a wide variety of expectations about how much privacy is entitled to or what constitutes an invasion of privacy. Privacy is the ability of an individual or group to seclude themselves or information. Personal privacy has been declining in the past year which is caused by today’s technological society. With the latest technology such as face scanners, data collecting, and highly advanced software’s, privacy can be compromised, which is exactly what is being done today and it is unconstitutionally intrusive.
People all around agree that technology is changing how we think, but is it changing us for the better? Clive Thompson definitely thinks so and this book is his collection of why that is. As an avid fiction reader I wasn’t sure this book would captivate me, but the 352 pages seemingly flew past me. The book is a whirlwind of interesting ideas, captivating people, and fascinating thoughts on how technology is changing how we work and think.
Wallace, Jonathon. (1997). Labelling, rating and filtering systems on the Internet. [Online]. Available: http://www.spectacle.org/cda/rate.html. [1997, Sep. 02].
Pagliery, Jose. "Online Privacy Is Dead." CNNMoney. Cable News Network, 17 Oct. 2013. Web. 28 Apr. 2014.
In today's world, technology is constantly changing from a new paperclip to an improvement in hospital machinery. Technology lets people improve the way they live so that they can preserve their own personal energy and focus on the really important factors in life. Some people focus their energy on making new innovations to improve transportation and the health of people that may save lives and some people focus on making new designs of packaging CDS. Technology is significant in everyone's life because it rapidly changes what is in the market. But, some new innovations of technology are ridiculous because they serve no purpose in helping mankind.
As many issues discussed on the blog revolve around privacy and ethics I decided to conduct an interview that carried these as its core subjects. The interviewee, Maha Ardati, is 21 years of age; placing her in the biggest age group to use technology. She is also a frequent user of the phone and Internet, making her opinion on data collection and the privacy that revolves around it a relevant source of insight.
The paper will deal with two aspects of the privacy-vs-security issue. The first one is concerned with general civil liberties, where privacy is understood to mean freedom to make personal (private) choices in our own homes, control our daily lives and decide with whom we share information that is of our concern – information about our emotions, attitudes, behavior and future decisions and events. The second aspect deals with the privacy vs. security on the internet. Since we live in a technological era, internet has become an inseparable part of our l...
Underwood, A. (2000, January). Professional Ethics in a Security and Privacy Context–the Perspective of a National Computing Society. In Information Security and Privacy (pp. 477-486). Springer Berlin Heidelberg.
Cooper, Marni. "Privacy and Surveillance: What Are Your Rights?" 16 March 2011. Privacy and Surveillance: What Are Your Rights? 21 November 2013.
Information systems in their simplest forms have always been a part of business. With the increase of technology, business information systems are expanding and becoming a more intriqet part of how business is done. Companies count on information systems to support their business decisions and operations. Along with this increasing role comes the questions of ethical actions. Taking this into consideration this paper will cover what information systems are. What is ethics, and how does it apply to information systems and business? We will look at what has been done to promote ethical behavior as well as discuss what more could be done to better increase this desired behavior in regard to information systems. With newer and different ways of doing business constantly appearing, business is left with the task of integrating long held standards and ethics into these new fields. This is an increasingly important aspect of business given the many scandals and attempted cover-ups that have emerged recently within businesses of all types.
For the purposes of this discussion, privacy can be defined as a combination of the ability to have a certain amount of power or agency in a particular environment, to have an under...
This topic of interest is important and captivating to most, since the Internet has become an integral part in many people’s daily lives. A survey conducted by the Pew Internet and American Life Project shows that as of September 2013, 86% of American adults use the Internet, up from 14% in 1995 (“ Pew Internet and American Life Project”).
When information becomes irrelevant, inadequate, or excessive, the individual has an actual expectation of privacy over such information, because the accuracy of the information is already impaired. While it is acknowledged that under the third-party doctrine, there is no legitimate expectation of privacy as to information voluntarily offered to a third party, the proponent submits that the extent that privacy is relinquished under the doctrine is only as regards the accurate meaning of the information at the time it was published. When this accuracy or meaning has changed by the passage of time or the change of circumstances, the expectation of privacy is restored, because such change is no longer with the consent of the person concerned. Besides, legal scholars have acknowledged that the third-party doctrine is too sweeping a doctrine to determine the existence of an expectation of privacy, the restriction or standard proposed above is a fitting way to limit the doctrine and protect individual privacy