1 / 16

Ethical Issues concerning Internet Privacy

Ethical Issues concerning Internet Privacy. Personal Info on Internet. Personal information on the Internet has become a hot commodity because it can be collected, exchanged, recombined with ease. Other ways to gather information Serial numbers embedded in computers or software

konala
Download Presentation

Ethical Issues concerning Internet Privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ethical Issues concerning Internet Privacy

  2. Personal Info on Internet • Personal information on the Internet has become a hot commodity because it can be collected, exchanged, recombined with ease. • Other ways to gather information • Serial numbers embedded in computers or software • Spyware, cookies • Ex. DoubleClick

  3. Definitions • Anonymity – protection from undesired attention • Solitude – lack of physical proximity to others • Secrecy involves limiting the dissemination of knowledge about oneself • Information privacy – concerns the collection, use, and dissemination of information about individuals

  4. Definitions • Restricted access – able to shield personal data from some while sharing it with others • Extrinsic loss of freedom - lack of privacy often makes individuals vulnerable to having their behavior controlled by others • Intrinsic loss of freedom – most people behave differently when they are being watched or monitored

  5. Personal information on the Internet • Novice Internet users are amazed by the amount of personal information available online • Should be limits and conditions such as: • Exclude unique identifiers (SSN, birth dates, mothers’ maiden name) • Exclude unlisted phone numbers, reverse lookup

  6. Where does data come from? • Shopping “Saver” cards (Kroger, Giant Eagle) • 2 phases of systematic loss of privacy • Database phase – technology made it possible to collect, store, retrieve large amounts of data • Network phase – consumers routinely communicate with vendors by e-mail, post messages to electronic bulletin boards on Internet while surfing and/ purchasing online products (monitored by prying eyes all over the network and collected without their knowledge)

  7. Definitions • Cookies – small data files written to the customer’s hard drive by the web site when the user visits that site with a browse; it stores customer’s visit info and when they come back it knows what you did before • 3rd party cookies – placed across the network so it tracks user movements • Clickstream data –shows users IP address, browser type, version, URLs visited

  8. Definitions • Data profiling – gathering and collating data about individuals to make decisions about individual’s habits • Spyware - small program usually installed without the users consent, tracks user’s surfing habits and sends to a third party • Why is this done? Target marketing and advertising (more predictable response)

  9. Protecting Information • Laws – not the only solution (Code, norms, market) • Opt-in Approach – companies must inform user about how data is being used and the user can proceed or not • 2004, Utah Spyware Control Act – requires all companies to disclose the changes made to the computer by their spyware and type of information transmitted to the server • Technology – anti-spyware • Some companies, realizing importance of privacy to customers, will enhance confidence and trust but will mean higher prices -> customers may be willing to pay

  10. Moral Considerations • Databases of info is no different than gossip • Profiles used by insurance companies and other businesses before selling services to us • Technology is more powerful and intrusive than local gossip • Companies need to obtain permission before collecting data • Some think cookies are just an annoyance others look at as “Big Brother” watching • Most users have no idea what cookies do

  11. US vs Europe in Privacy Protection • US believes best path is a split between market pressure and industry self-regulation • Europe treats privacy as a human right deserving full protection In the United States • 1984 Cable Protection Act – prohibits cable TV companies to collect data about viewing habits • 1988 Video Privacy Protection Act – same with movie rental stores

  12. 1994 Driver’s Privacy Protection Act protects motor vehicle records and prohibits sale or release unless the drivers are provided the opportunity to opt out • 1998 Children's Online Privacy Act – forbids web sites from collecting information on children less than 13 unless they have parent consent • 2001 HIPPA protects medical privacy • FERPA

  13. Privacy and Internet Architectures • Cookies and spyware • Intel had a plan to put id numbers in computer chips of Pentium III • Reason - track computer equipment • FTC demanded Intel to recall the chip and be disabled unless the user turned it on • PC makers made a patch and turned the serial numbers back on • Serial numbers would enhance security but lose privacy

  14. Platform for Privacy Preferences Project (P3P) • Users warned collection will occur • Empowers users to make an informed choice • Encourages standardization and simplification of privacy policies • Has limitations – it can not ensure enforcement and if violated P3P has little recourse • Europe doesn’t rely on market place but relies on LAWS

  15. Privacy in the Workplace • Technology has facilitated greater control over employees • Heightened intrusiveness into private lives • Monitor incoming and outgoing e-mail and web-surfing habits • Employee Internet Management software – more than half of Fortune 500 companies have adopted some sort of EIM software

  16. For or Against Monitoring • Should e-mail be private? • Web-surfing monitoring? • Hidden cameras • Clickstream data • Will it protect the employee from harm or breach or privacy? • Will moral diminish? • Decline in productivity? Web surfing vs. going outside to smoke • Can we find middle ground?

More Related