Abstract: This paper examines the use of Internet technologies (specifically SafeWeb.com) to counteract invasions of personal privacy and censorship. The paper begins by exploring the methods by which governments, corporations, and commercial agents invade personal privacy. It also discusses Internet censorship on the corporate and governmental levels. It then proceeds to discuss SafeWeb.com, a technology that allows Internet users to surf the Web privately and view censored content. The paper finishes by exploring some of the ethical issues raised by Internet privacy and censorship in specific relation to SafeWeb, concluding that the application of SafeWeb in circumventing the authority of governments and corporations is inherently unethical.
Part of the allure of the Internet has always been the anonymity it offers its users. As the Internet has grown however, causing capitalists and governments to enter the picture, the old rules are changing fast. E-commerce firms employ the latest technologies to track minute details on customer behavior. The FBI's Carnivore email-tracking system is being increasingly used to infringe on the privacy of netizens. Corporations now monitor their employees' web and email usage. In addition to these privacy infringements, Internet users are also having their use censored, as governments, corporations, and other institutions block access to certain sites. However, as technology can be used to wage war on personal freedoms, it can also be employed in the fight against censorship and invasion of privacy.
Network technologies have allowed for an unprecedented invasion of persona...
... middle of paper ...
Cooper, Charles. Saudi Arabia's Battle of the Bits. 2001. ZDNet. Feb. 20, 2001.
Tanaka, Jennifer. The Secret (Server) Service. 2001. AdWeek. Feb. 20, 2001. <http://www.adweek.com/daily/January/iq/iq012001-2.asp>.
The 20 Enemies of the Internet. 1999. Radio Free Europe / Radio Liberty. Feb 20, 2001. <http://www.rferl.org/nca/special/enemies.html>.
Sussman, Leonard R. The Internet and Press Freedom 2000. 2000. Freedom House. Feb. 20, 2001. <http://www.freedomhouse.org/pfs2000/sussman.html>.
Graham, Robert. Carnivore FAQ. 2000. Feb. 20, 2001. <http://www.robertgraham.com/pubs/carnivore-faq.html>.
Conrey-Miller, Andrew. The Pros and Cons of Employee Surveillance. 2001. Feb. 20, 2001. <http://www.websense.com/company/news/features/01/020501.cfm>.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- It has become a sad fact that in today’s society the truth is that the right to one’s privacy in the information technological world has simply become a joke. The growth of computers and information technology has raised new personal challenges in today’s world. All our personal information be it our health data, financial information, demographic information or our children’s information, has become digitized and is stored in the servers which are beyond our control. The Fourth Amendment to the U.S.... [tags: Internet ]
1355 words (3.9 pages)
- New technologies raise new ethical challenges besides new technical problems. Cloud computing is the recent technology in IT that moves the data away from portable storage devices to large data centers called cloud. It basically means that every application given as services over the Internet to the user. In the view of User it is accessing his/her files, programs and other services through Internet which are hosted by other service providers. One more aspect of cloud computing is the cost effectiveness of this technology which attracted enterprises to use this technology to consume their IT services in a cost effective way.... [tags: technology, cloud, ethical]
1447 words (4.1 pages)
- ... For example, an animated advertisement on a static web page may increase fixation since the motion will grab the user’s attention throughout the search process. Fixation location involves the part of the visual range that the studied person fixates on. Commonly, the areas that eyes fixate on are the most important due to experience, curiosity, shock, and significance. It has been more than a century that psychologist use eye tracking for psychoanalysis. Complex psychological profiles can be created from people by using eye movement analyzing.... [tags: wearable computer, privacy, secrecy]
1733 words (5 pages)
- Ethical Issues Raised by Data Mining Data mining is the practice of gathering data from various sources and manipulating it to provide richer information than any of contributing sources is able to do alone or to produce previously unknown information. Businesses and governments share information that they have collected with the purpose of cross-referencing it to find out more information about the people tracked in their databases. Data mining has many benefits. Stores are able to stock merchandise that better reflects what customers want.... [tags: Databases Technology Computers Essays]
3397 words (9.7 pages)
- ... For example, most of the information required to steal someones identity can be found on social networking sites that users are a part of. According to the RCMP, some of the information required for identity theft includes full name, date of birth, and address.  With the amount of private information being collected and shared across networks and their services, a need for protection of information begins to rise. About 68% of internet users' in America believe that the current laws that are in place are not good enough in protecting people's online privacy, according to a report on Anonymity, Privacy, and Security Online.... [tags: privacy on the web, growing concern]
960 words (2.7 pages)
- Data Mining and Privacy-an ethical look I. Introduction In 2001, the MIT Technology Review listed data mining as one of the top 10 technologies that will change the world.[i] So, what is data mining. For many people, the simple answer is that data mining is the collecting of people’s information when logged onto the Internet. But Webopedia emphasizes that data mining is not the collection of data itself, but the statistical interpretation of it – allowing people to obtain new information or find hidden patterns within that collected data.[ii] It is the combination of these, collection and analysis, which are cause for concern.... [tags: Data Mining Technology Technological Essays]
3249 words (9.3 pages)
- Threat to Internet Privacy Abstract At what level is Internet surveillance by the United States government acceptable to society, considering a balance between security and privacy, what are the short and long term implications, and how does it affect the rest of the world. Introduction Privacy from governments has been under assault increasing amounts in the last 100 years. Technology has revolutionized the concept, as before we had microphones, telephones, wiretaps, video cameras, someone would actually need to trespass to violate your privacy.... [tags: Technology Technological Privacy Essays]
2650 words (7.6 pages)
- Privacy: Security, Confidentiality, or Convenience. INTRODUCTION The evolution of the Internet started from the department of defense's project, and rapidly distributed to world wide. With the rise of the Internet age comes with the benefits and the concerns. Because of the easeness to communicate information and displaying data, the first amendment needs to be applied to this communication channel. How are we using and communicating information without offending and harm others. Since the evolution of the Internet, there has been acts from Congress to regulate the use the Internet such as the Communications Decency Act in 1996 and the Child Online Protection Act in 1998.... [tags: Internet Privacy Secure Cyberspace Essays]
3152 words (9 pages)
- Ethical Management of E-mail Privacy As I am sitting at my work station in a crowded office building, I hear the wonderful sound of "You've got mail." In turn I open my E-mail mailbox and find a letter from a nearby employee. This letter contains the usual funny joke of the day and a short joke ridiculing the boss, as usual. Who was to know that my supervisor would eventually find this letter, which would lead to both the termination of my job and my fellow employee. Do you feel this is right.... [tags: Privacy Electronic Email ]
2392 words (6.8 pages)
- Privacy Globalization is the tendency of businesses to spread throughout the world to offer their products and services. To reflect their global market presence, multi-national companies have adopted management models such as region-specific management, and product-specific management to maximize the potential to offer efficient products and services to their customers. One such management model that has been successful in the past few years is the business process outsourcing model. Businesses outsource processes such as back office operations and customer support services offshore.... [tags: Business Information Essays]
2203 words (6.3 pages)