110 likes | 313 Views
ISYS205 Strategic Uses of Information Systems Fall, 2001 Ethical Issues in Information Systems Greg Fulton Anuja Desai Tom Schaeffer. Topic #5. Internet privacy (as part of this question, consider the information captured in tracking an individual’s digital “identity”). Definitions. Privacy:
E N D
ISYS205 Strategic Uses of Information SystemsFall, 2001Ethical Issues in Information SystemsGreg FultonAnuja DesaiTom Schaeffer
Topic #5 Internet privacy (as part of this question, consider the information captured in tracking an individual’s digital “identity”).
Definitions • Privacy: • The quality or condition of being secluded from the presence or view of others. • The state of being free from unsanctioned intrusion: a person's right to privacy. • Identity: • The distinct personality of an individual regarded as a persisting entity; individuality. • The collective aspect of the set of characteristics by which a thing is definitively recognizable or known. • The set of behavioral or personal characteristics by which an individual is recognizable as a member of a group. source: “http://www.dictionary.com”
Threats to Privacy 1. Don't share your hard drive over the Internet.2. Be careful what programs you run.3. Beware public machines.4. Can the spam!5. Be careful what you write and where you send it.
Protecting your Privacy 1. SpyCop will search your computer for covert surveillance spy software. 2. Anonymizer makes your browsing experience anonymous. 3. AdSubtract Pro blocks cookies and manages the cookies that are already on your computer.
Protecting your Privacy (cont.) • Cookie Pal Internet Cookie Filter And Manager Protects Your Online Privacy -- Kookaburra Software • Firekeys Firewall + Security -- Software Appliance Company • Internet Privacy Service Provides Filtering, Blocking, And Cookie Controls -- McAfee.com Corp • Invisible Secrets 3 Secure Your Files And Communications -- NeoByte Solutions • McAfee Internet Security 4.0 Anti-Virus, Firewall, And Parental Monitoring -- McAfee Retail Software • McAfee QuickClean 2.0 Removes Unnecessary E-Mail And Internet Files -- McAfee Retail Software • Netkeys ULTRA Comprehensive Security For Internet And PC -- Software Appliance Company • SecureFile Creates Self-Decryption Archive Using Symmetric / Asymmetric Key Mechanism -- SecureSoft Technologies • SpyDetect All You Need To Protect Yourself Online -- SpyDetect, Inc
ACM General Moral Imperatives • 1.7 Respect the privacy of others • 1.8 Honor confidentiality source: “http://www.acm.org/constitution/code.html”
1.7 Respect the privacy of others … It is the responsibility of professionals to maintain the privacy and integrity of data describing individuals. This includes taking precautions to ensure the accuracy of data, as well as protecting it from unauthorized access or accidental disclosure to inappropriate individuals. Furthermore, procedures must be established to allow individuals to review their records and correct inaccuracies.
1.8 Honor confidentiality … The ethical concern is to respect all obligations of confidentiality to employers, clients, and users unless discharged from such obligations by requirements of the law or other principles of this Code.
For more Information • PHIL 311-001: Computer Ethics • Computer Professionals for Social Responsibility • THOMAS – U.S. Congress on the Internet
References • www.anonymizer.com • www.perfectlyprivate.com • http://ipw.internet.com/protection/privacy/