We live in a world that keeps changing, almost everything is in constant change, including our lives. Our involvement with technology has been a crucial part of it since it has shaped the way information is processed and transferred throughout the entire world. It has been helping us, and therefore making our lives easier (in a certain way) by providing us useful tools and by helping us to make tasks that might have taken a long time to do by ourselves. According to ‘Moore’s Law, technology will continue to improve and grow in an exponential rate1, but not everything about the continuous presence of technology in our lives has been depicted as positive. Along the ease of making our daily tasks a little less enduring, there is another side of it in which many people have been preoccupied with for more than just a few decades. Some writers expressed their preoccupations through their novels, showing us what could happen in the not-so-distant future if we do not pay enough attention to this topic. Some of them (to name a few) were Philip L. Dick, Aldous Huxley, along George Orwell, with his amazing, yet frightening novel named ‘Nineteen Eighty-Four’.2 Although those novels were presented a long time ago and were merely works of fiction we can see that they were based on a legitimate concern, and impressively enough we still do, but in a different context.
There are several ethical aspects involved in the era that we live in, but mainly there are four ethical issues regarding the information era: Accuracy, Property, Access, and Privacy.3 For the purposes of this work I will choose the last one to give different examples that involve an ethical dilemma and try to view it through different philosophical perspectives, although I have ...
... middle of paper ...
..." Justice: What's the Right Thing to Do? New York: Farrar, Straus and Giroux, 2009. 35. Print.
17. Kovacs, Gary. "Gary Kovacs: Tracking Our Online Trackers." TED: Ideas worth Spreading. N.p., May 2012. Web. 18 Nov. 2013.
18. Kovacs, Gary. "Gary Kovacs: Tracking Our Online Trackers." TED: Ideas worth Spreading. N.p., May 2012. Web. 18 Nov. 2013.
19. Britz, J. J. "TECHNOLOGY AS A THREAT TO PRIVACY: Ethical Challenges." TECHNOLOGY AS A THREAT TO PRIVACY: Ethical Challenges. University of Pretoria, n.d. Web. 18 Nov. 2013.
20. Bazerman, Max H., and Ann E. Tenbrunsel. Blind Spots: Why We Fail to Do What's Right and What to Do about It. Princeton, NJ: Princeton UP, 2011. Print.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Information security refers to all of the approaches and policies designed to protect a corporation’s information and facts machine from unauthorized access, use, disclosure, disruption modification, or destruction. it 's a standard term that may be used regardless of the shape the data might also take. As for information protection, people typically divided it into two components, which are the IT safety and facts assurance. Sometimes referred as computer security, information technology security has been information security applied to technology, which most often some form of computer system.... [tags: Computer, Computer security, Information security]
983 words (2.8 pages)
- Introduction In the era of technology, the use of computers in the workplace has gained huge popularity. Accordingly, computer monitoring becomes more and more common to ensure high performance in the workplace. Based on an American Management Association survey in 2005, more than 80 percent of companies supervise employees by monitoring their website connections (Riedy and Wen 2). In 2007, another electronic monitoring and surveillance survey indicates that more than 40 percent of U.S. employers monitor employees’ use of email (Sipior and Ward 2).... [tags: Employment, Law, Privacy, Surveillance]
1467 words (4.2 pages)
- Ethical Dilemma #3: Privacy Donor privacy is an important issue that is addressed on a continual basis within the fundraising profession. With the Internet providing a wealth of information about a donor in today’s age it is important to ask the question what essential and nonessential information is needed in order for fundraising professionals to do their job. “Privacy- Organizations should neither obtain nor retain nonessential and highly personal information about donors in their paper or electronic files.... [tags: Ethics, Business ethics, Confidentiality]
908 words (2.6 pages)
- ... On release, they can request information on the person who testified against them, and harass them. Some companies sell information to companies who offer specific services. An article titled Privacy Tools: Opting Out from Data Brokers written by Julia Angwin spills the beans on companies using personal data to target groups of people. Angwin speaks on how data brokers sell mailing lists to other companies. “[P]rivacy expert Pam Dixon testified in Congress that she had found data brokers selling lists with titles such as “Rape Sufferers” and “Erectile Dysfunction sufferers.”” (Angwin).... [tags: nsa, computer networks, information]
935 words (2.7 pages)
- Privacy: Security, Confidentiality, or Convenience. INTRODUCTION The evolution of the Internet started from the department of defense's project, and rapidly distributed to world wide. With the rise of the Internet age comes with the benefits and the concerns. Because of the easeness to communicate information and displaying data, the first amendment needs to be applied to this communication channel. How are we using and communicating information without offending and harm others. Since the evolution of the Internet, there has been acts from Congress to regulate the use the Internet such as the Communications Decency Act in 1996 and the Child Online Protection Act in 1998.... [tags: Internet Privacy Secure Cyberspace Essays]
3152 words (9 pages)
- In 1986, Richard Mason defined the necessary ethical guidelines for proper and moral handling of information, and the technology that supports that information. He defined these ethical guidelines as PAPA, which refers to Privacy, Accuracy, Property, and Accessibility (Mason, 1986). With the rapid expansion of information technology, these core ethical principles have become more important than ever, in both personal and professional environments. Unfortunately, the rapid expansion of information technology presents a host of new and unprecedented challenges to these ethical strategies.... [tags: Privacy, Ethics, Identity theft, Privacy law]
1234 words (3.5 pages)
- The recent revolutions of the world have changed how individuals live their lives. With the creation of new and advanced technology every era, individuals begin to trust new ways of communicating and storing our personal life. This has caused the Internet and cellular networks to be the newest information banks that all societies trust to keep their personal information safe. With these sources being accessed by people around the world, spy agencies are now looking at these information banks as sources to access the personal information of millions of individuals.... [tags: personal information, government secrets]
1155 words (3.3 pages)
- The Right to Privacy Privacy is one of the severe issue in today’s Modern Technology era, tied to human right around the world. Most countries have started thinking differently regarding between the people’s right and national security, and trying to leverage on new technology to detect potential national threats without hurting people’s privacy. However, there's a blurred line between privacy violation and government surveillance. (Sánchez, Levin & Del, 2012) It would be a learning process for governments to seek an optimum balance between retain integrity of privacy right and eliminate national threats in order to make the country better.... [tags: technology, surveillance, security]
804 words (2.3 pages)
- Privacy on the Internet In this new era of the Internet, most people use the Internet to acquire information of one kind or other. But what these people are not aware of is that the Internet is collecting information about them. Every time we get onto the Internet there might be a compromise of privacy of our personal information. The information flows both ways. With every clock of the mouse on a hyperlink, or an addition to the mailing list, someone out there might be gathering information about us.... [tags: Technology Computers Essays]
2274 words (6.5 pages)
- The Freedom of Information There are different kinds of freedoms: freedom of expression, of opinion, of speech, of information, to copy, to own and to read, and freedom from interference and observation. This research is an ethical analysis of the freedom of information in the new Internet era and how the new technology should be implemented globally as a universal human right. Not so many years ago, I still remember in High School my research with books, magazines, and newspapers as the only resources to get information.... [tags: Technology Computers Essays]
2549 words (7.3 pages)