Abstract: This paper examines the use of Internet technologies (specifically SafeWeb.com) to counteract invasions of personal privacy and censorship. The paper begins by exploring the methods by which governments, corporations, and commercial agents invade personal privacy. It also discusses Internet censorship on the corporate and governmental levels. It then proceeds to discuss SafeWeb.com, a technology that allows Internet users to surf the Web privately and view censored content. The paper finishes by exploring some of the ethical issues raised by Internet privacy and censorship in specific relation to SafeWeb, concluding that the application of SafeWeb in circumventing the authority of governments and corporations is inherently unethical.
Part of the allure of the Internet has always been the anonymity it offers its users. As the Internet has grown however, causing capitalists and governments to enter the picture, the old rules are changing fast. E-commerce firms employ the latest technologies to track minute details on customer behavior. The FBI's Carnivore email-tracking system is being increasingly used to infringe on the privacy of netizens. Corporations now monitor their employees' web and email usage. In addition to these privacy infringements, Internet users are also having their use censored, as governments, corporations, and other institutions block access to certain sites. However, as technology can be used to wage war on personal freedoms, it can also be employed in the fight against censorship and invasion of privacy.
Network technologies have allowed for an unprecedented invasion of persona...
... middle of paper ...
Cooper, Charles. Saudi Arabia's Battle of the Bits. 2001. ZDNet. Feb. 20, 2001.
Tanaka, Jennifer. The Secret (Server) Service. 2001. AdWeek. Feb. 20, 2001. <http://www.adweek.com/daily/January/iq/iq012001-2.asp>.
The 20 Enemies of the Internet. 1999. Radio Free Europe / Radio Liberty. Feb 20, 2001. <http://www.rferl.org/nca/special/enemies.html>.
Sussman, Leonard R. The Internet and Press Freedom 2000. 2000. Freedom House. Feb. 20, 2001. <http://www.freedomhouse.org/pfs2000/sussman.html>.
Graham, Robert. Carnivore FAQ. 2000. Feb. 20, 2001. <http://www.robertgraham.com/pubs/carnivore-faq.html>.
Conrey-Miller, Andrew. The Pros and Cons of Employee Surveillance. 2001. Feb. 20, 2001. <http://www.websense.com/company/news/features/01/020501.cfm>.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- It has become a sad fact that in today’s society the truth is that the right to one’s privacy in the information technological world has simply become a joke. The growth of computers and information technology has raised new personal challenges in today’s world. All our personal information be it our health data, financial information, demographic information or our children’s information, has become digitized and is stored in the servers which are beyond our control. The Fourth Amendment to the U.S.... [tags: Internet ]
1355 words (3.9 pages)
- New technologies raise new ethical challenges besides new technical problems. Cloud computing is the recent technology in IT that moves the data away from portable storage devices to large data centers called cloud. It basically means that every application given as services over the Internet to the user. In the view of User it is accessing his/her files, programs and other services through Internet which are hosted by other service providers. One more aspect of cloud computing is the cost effectiveness of this technology which attracted enterprises to use this technology to consume their IT services in a cost effective way.... [tags: technology, cloud, ethical]
1447 words (4.1 pages)
- Living Proof, Miss Evers Boys, You Don’t Know Jack and the Ethical Issues Each Case Faced Wendy E. West Brown Mackie College July 27, 2015 Abstract This paper explores the ethical issues that were faced in three different movies. The first movie, Living Proof, is based on the true story of breast cancer research and the drug Herceptin. This movie deals with the issues of funding the project and the criteria needed to be accepted into the trial. The movie follows the story of seven women with breast cancer that campaigned to receive the drug Herceptin.... [tags: Ethics, Morality, Voluntary euthanasia, Cancer]
1713 words (4.9 pages)
- ... For example, an animated advertisement on a static web page may increase fixation since the motion will grab the user’s attention throughout the search process. Fixation location involves the part of the visual range that the studied person fixates on. Commonly, the areas that eyes fixate on are the most important due to experience, curiosity, shock, and significance. It has been more than a century that psychologist use eye tracking for psychoanalysis. Complex psychological profiles can be created from people by using eye movement analyzing.... [tags: wearable computer, privacy, secrecy]
1733 words (5 pages)
- ... Many client companies or organizations have what could be considered ethical codes, which are typically called a Code of Conduct for their employees. It is important that data and database administrators as well as developers recognize and understand the issues surrounding Intellectual Property to ensure that confidential data or their ideas can be protected and to ensure that any unauthorized user can’t access the data. b) Illegal and Unethical: Three categories of illegal and unethical behavior are: • Ignorance • Accident • Intent You should use careful planning and control to prevent accidental modifications to system and data.... [tags: Ethics, Morality, Information security, Privacy]
752 words (2.1 pages)
- Ethical Issues Raised by Data Mining Data mining is the practice of gathering data from various sources and manipulating it to provide richer information than any of contributing sources is able to do alone or to produce previously unknown information. Businesses and governments share information that they have collected with the purpose of cross-referencing it to find out more information about the people tracked in their databases. Data mining has many benefits. Stores are able to stock merchandise that better reflects what customers want.... [tags: Databases Technology Computers Essays]
3397 words (9.7 pages)
- Data Mining and Privacy-an ethical look I. Introduction In 2001, the MIT Technology Review listed data mining as one of the top 10 technologies that will change the world.[i] So, what is data mining. For many people, the simple answer is that data mining is the collecting of people’s information when logged onto the Internet. But Webopedia emphasizes that data mining is not the collection of data itself, but the statistical interpretation of it – allowing people to obtain new information or find hidden patterns within that collected data.[ii] It is the combination of these, collection and analysis, which are cause for concern.... [tags: Data Mining Technology Technological Essays]
3249 words (9.3 pages)
- Threat to Internet Privacy Abstract At what level is Internet surveillance by the United States government acceptable to society, considering a balance between security and privacy, what are the short and long term implications, and how does it affect the rest of the world. Introduction Privacy from governments has been under assault increasing amounts in the last 100 years. Technology has revolutionized the concept, as before we had microphones, telephones, wiretaps, video cameras, someone would actually need to trespass to violate your privacy.... [tags: Technology Technological Privacy Essays]
2650 words (7.6 pages)
- Ethical Management of E-mail Privacy As I am sitting at my work station in a crowded office building, I hear the wonderful sound of "You've got mail." In turn I open my E-mail mailbox and find a letter from a nearby employee. This letter contains the usual funny joke of the day and a short joke ridiculing the boss, as usual. Who was to know that my supervisor would eventually find this letter, which would lead to both the termination of my job and my fellow employee. Do you feel this is right.... [tags: Privacy Electronic Email ]
2392 words (6.8 pages)
- Privacy Globalization is the tendency of businesses to spread throughout the world to offer their products and services. To reflect their global market presence, multi-national companies have adopted management models such as region-specific management, and product-specific management to maximize the potential to offer efficient products and services to their customers. One such management model that has been successful in the past few years is the business process outsourcing model. Businesses outsource processes such as back office operations and customer support services offshore.... [tags: Business Information Essays]
2203 words (6.3 pages)