1 Ethics of Computing MONT 113G, Spring 2012 Session 27 Ethics in IT Societies III Privacy.

Slides:



Advertisements
Similar presentations
Freedom of Speech (Part 3)
Advertisements

By Brian Langone. Internet censorship is essentially a method used by corporations, governments and others in order to filter what a user can view on.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Week 6 Lecture Part 2 Databases in Electronic Commerce Samuel Conn, Asst. Professor.
ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS
PowerPoint Presentation Possible Topics Related to General Education Area VI Computer Science Appendix B.
Digital Firm (II) Soetam Rizky. Before we start……… Digital firm ? B2B, B2C, C2C ? E-Commerce advantages ? Prospectus of digital firm ?
4 Lecture Electronic Business and Electronic Commerce.
Department of Computer Science City College of New York City College of New York Spring 2006 Copyright © 2006 by Abbe Mowshowitz CSc 375 SOCIAL ISSUES.
Business Plug-In B7 Ethics.
4.1 © 2007 by Prentice Hall 4 Chapter Ethical and Social Issues in Information Systems.
4.1 © 2006 by Prentice Hall 4 Chapter The Digital Firm: Electronic Business and Electronic Commerce.
“Ethics Online” Shaping social behavior online takes more than new laws and modified edicts. Deborah G. Johnson Communications of the ACM Vol. 40, No.
3 Ethics and Privacy.
J. Chansavang. Use this Powerpoint to gain understanding about the main areas that are affected by computers and technology. Possible research topics.
. 4.1 Understanding ethical and social issues related to systems. 4.2 Ethics in an information society. 4.3 The moral dimensions of information systems.
Operational Data Tools Chapter Eight. Copyright © Houghton Mifflin Company. All rights reserved.8–28–2 Chapter Eight Learning Objectives To learn database.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
The Social Effect of Information System
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
Stop cyber bullying  Forms of digital communication and collaboration tools: Blog Online forum Social networking site.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
Keeping Kids Safe on the Internet John Minelli Educational Technology Specialist Hartford School District
Chapter 7 Integration of Information I. Integration of information in business systems 1. What Is Meant by the Concept of Integrating information in business?
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy Privacy as a personal preference Is there such a thing as too much privacy? What will be discussed  Why privacy is an issue  Dangers of lack.
6 Ethics and Privacy.
Ch5 1 ETHC303 Chapter 5- Privacy Instructor: Dr. Hassan Ismail Abdalla Room: E236.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Key Term Outline 4–14–1 Chapter 4: E-Marketing and Customer Relationship Management Pride/Ferrell Foundations of Marketing Third Edition.
Philosophy 223 Technology in the Workplace: The Concern for Privacy.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 9 Ethics in IT Societies III Plagiarism; Democracy.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
Final Exam Review. History of Computing Know trends No dates.
Copyright © 2004 Pearson Education, Inc. Slide 9-1 Chapter 9 Ethical, Social, and Political Issues in E-commerce.
6 Ethics and Privacy.
What is Privacy?. 3 Types of Privacy 1.Accessibility Privacy 2.Decisional Privacy 3.Informational Privacy.
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 11 Democracy and the Internet Privacy.
1 Ethics of Computing MONT 113G, Spring 2012 Session 29 Privacy.
Digital Democracy: Political Systems Kathy E. Gill 23 June 2012.
Lecture 7 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS 1.
CHAPTER 5 ETHICS & PRIVACY.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 13 Privacy as a Value.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
1 Ethics of Computing MONT 113G, Spring 2012 Session 17 Sociotechnical Perspective Ethical reasoning.
Overview Issues in Mobile Databases – Data management – Transaction management Mobile Databases and Information Retrieval.
Citizen Journalism and Ethics
How to prevent Identity Theft
CHAPTER FOUR OVERVIEW SECTION ETHICS
PRIVACY.
Requirements Basis Requirements of an Image Visualization System (IVS), to support the verification of the correct functioning of some components under.
Chapter # 1 Overview of Ethics
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Monitoring Network Bias
Appendix B Possible Research Topics for CS Taken from A Gift of Fire by Sara Basse PowerPoint Presentation Possible Topics Related to General Education.
Ethical and Social Issues in Information Systems
Ethical and Social Issues in Information Systems
Interdisciplinary Program in Cognitive Science Lee, Jung-Woo
CHAPTER FOUR OVERVIEW SECTION ETHICS
The Main Ethical Considerations of Big Data
INFS 452 – Computer Ethics & Society
Module 4 System and Application Security
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
IT and Society Week 2: Privacy.
Technological Changes
Presentation transcript:

1 Ethics of Computing MONT 113G, Spring 2012 Session 27 Ethics in IT Societies III Privacy

2 Democracy and the Internet What is democracy? Political power is in the hands of the citizens. Government is accountable to the citizens. Moral justification for democracy: "Individuals are sovereign over themselves." (Johnson) Therefore, they must have some say in their government. Deontological justification: Utilitarian justification:

3 Is the Internet Democratic? Is the internet inherently democratic? Does the adoption of internet technology lead to the adoption of democratic practices? Arguments for: Individuals produce and distribute information Internet provides many forums for discussion Internet provides access to more sources of information Internet facilitates associations independent of geography.

4 Is the internet democratic? Arguments against: Too much information is available--filtering is required. "Net neutrality" is not a given Surveillance capabilities Global Scope ACLU: Filtering software can greatly limit which sites are accessed. What are their arguments?

5 Privacy in IT societies What's new? What's different about information flow in IT societies from previous societies? Previous modes of information flow: Characteristics of IT information flow:

6 What Else is New? Tools for Data Mining and Managing Databases. Did not emerge in a vacuum (technological determinism) Emerged in response to government and corporate interests. New Kinds of information. Transaction generated information (TGI) Examples: Credit card Clickstream

7 Merging and Mining Data When different types of information is merged and then mined for patterns, this can produce new types of information. Examples: Clickstream profile Amazon.com recommendations Facebook friends--gaydar

8 Other Issues Distribution of information is broader and more extensive than before. Example: Credit rating. Once on a server, information can be bought, sold, given away or stolen. Information endures. Example: Images on Facebook. Errors are very hard to correct.

9 IT Societies are Surveillance Societies IT allows people to be easily tracked and monitored. Examples? Data can be used to create profiles of individuals. The data can be "mined" for patterns of behavior. Questions raised: What is the value of privacy? How does surveillance affect us and our society?