Lesson 2: Digital Tools and Ethics

Slides:



Advertisements
Similar presentations
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Assessing Privacy Risks of Flash Cookies Kevin Fuller and Stacy Jordan February.
Advertisements

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Cyberbullying Donna Kozica, LCSW Social Work Department Chairperson.
Ethical Issues concerning Internet Privacy 1.  Personal information on the Internet has become a hot commodity because it can be collected, exchanged,
M. Guymon Pleasant Grove High School Spring 2003 Ethics & Computer Technology Day 18.
Computer Technology Day 18
Understanding Issues in Implementing Technology in the Classroom Legal, Ethical, Social, and Human Issues National Educational Technology Standards for.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
How It Applies In A Virtual World
8 | 2Copyright © Houghton Mifflin Company. All rights reserved. Part Four Using Technology And Information To Build Customer Relationships.
Operational Data Tools Chapter Eight. Copyright © Houghton Mifflin Company. All rights reserved.8–28–2 Chapter Eight Learning Objectives To learn database.
“Recipients ” “Signature” “Subject Line” CONTENT of .
Ch15QQ 1. Hardware theft includes the theft of portable computers as well as desktop computers. 2. A surge suppressor can be used to protect a computer.
Ethics & Computer Essentials. R. Stewart Fayetteville High School Ethics A set of principles of right conduct A theory or a system of.
Ethics & Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
How Can We Deal with Risks from the Internet: Why Privacy Legislation Is Hot Right Now Professor Peter Swire Ohio State University/Center for American.
Staying Safe Online Keep your Information Secure.
Computer Ethics.
1 Spyware Ryan Myers Andrew Sullivan ECE 4112 – Spring 2005.
The Video Game Industry Week 10. THE RISE OF THE VIDEO GAME INDUSTRY As with other industries there are three main themes associated with the video game.
Ethics of Big Data Eduardo Felipe Zecca da Cruz. What is Big Data? Stamford, Conn.-based IT research firm Gartner Inc. defines "big data" as "high-volume,
Becoming a Digital Citizen Acknowledgments Thanks to UNC: The Graduate School for this PowerPoint Layout, Microsoft gallery for photos, and Commonsense.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
Strictly Business North County Meetup Courtesy of Off the Rock Media and WeTubeU June 29, 2011.
Confidential. This presentation is provided for the recipient only and cannot be reproduced or shared without Fair Isaac Corporation's express consent.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Social Media And Ethics It is a choice of Professionalism.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
R. Stewart Fayetteville High School Ethics & Computer Technology Day 18.
Acceptable Use Policy By: Ashley Crehan Jessica Harmon Emily Edwards.
Personal Privacy and the Public Internet John E. Carter Kennesaw State University IT 3700.
Software License Documentation These guidelines will help when looking for your software license documentation.
Does It Matter Who Has Your Data? 1.Intro 2.Teach 1: Travel Safety Rules 3.Teach 2: How to Protect Your Data 4.Wrap-Up 5.Assessment 6.Extension Activity.
Lecture 3 Ethics in the Workplace Privacy and Social Networks.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
In a Digital World.  Statutes and Regulations  Monitoring by Employers  Discovery.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
1 Privacy & Preference Committee Update Ensuring a healthy ecosystem via transparency & trust Date: January 13, 2009 Alan Chapell, President.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
The Lessons of the Lotus MarketPlace: Implications for Consumer Privacy in the 1990's Mary J. Culnan.
Computer Technology Internet, ethics, and . EthicsInternetMisc.Internet
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Taking Charge of Your Health Lesson One: Building Health Skills.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
The Apple Privacy Policy zakiya mitchell
Chapter 3 The Internet macro-environment
Tour IV : e-Environment
Sue Fidler
Shavonne Henry, Nikia Clarke, David Heymann, Brandon Knight
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
PART III Ethical Issues in Business
Information Security Footprint.
Richard Purcell Corporate Privacy Officer Microsoft Corporation
Lesson 1: Why digital ethics?
A Gift of Fire Third edition Sara Baase
Google Privacy Policy Karen Tao.
A look at Marketing Automation Dan Szymczak – Director or Technology.
A Gift of Fire Third edition Sara Baase
HOW DO I KEEP MY COMPUTER SAFE?
Ethics & Privacy CSCI 101.
Being Aware of What You Share
INFS 452 – Computer Ethics & Society
Best Useful Social Media Tips For Online Reputation Presented By:- Abhinav Shashtri.
Personal Privacy and the Public Internet
SEM A - Promotion PE – Develop content for use in marketing communications to create interest in product/business/idea PI – Write marketing.
IT and Society Week 2: Privacy.
Presentation transcript:

Lesson 2: Digital Tools and Ethics Digital Ethics Lesson 2: Digital Tools and Ethics

Tools of Digital Campaigns Lesson 2 | Digital Ethics Tools of Digital Campaigns Tracking software- follows users across digital platforms and monitors online behavior Cookies- invisible, micro bits of information collected from users Big-data- large collections of the micro information collected by cookies and housed by digital warehouses

Sources of Public Anxiety in Digital Campaigns Lesson 2 | Digital Ethics Sources of Public Anxiety in Digital Campaigns Public fears diminished privacy Public fears hidden messages in end-user license agreements Public fears a lack of policies on digital media campaigns by US government

Lesson 2 | Digital Ethics Tracking Software Gives organizations information on user digital behaviors Allows organizations to tailor messaging, campaigns, and product design Data collected by software must be stored properly i.e. 70 million Target customer accounts were hacked in 2013

Tracking software and ethical guidelines Lesson 2 | Digital Ethics Tracking software and ethical guidelines It violates the “Avoid Deception” guideline Most users are unaware of how much tracking they are subject to It violates the “eschew secrecy” guideline Most practitioners don’t tell users what information they are collecting It violates the “clearly identify” guideline Most campaigns don’t tell the public what type of tracking is taking place in order to develop messages or strategies

Ex: Tracking and Pregnancy Lesson 2 | Digital Ethics Ex: Tracking and Pregnancy 2009- Teenager purchased a pregnancy test from a Target using a credit card; Target began sending baby-themed advertisements to her house Target knew she was pregnant before she had a chance to tell her family 2015- Fitbit detected an abnormally fast heartbeat from a user A trip to the doctor showed the woman she was expecting Fitbit knew she was pregnant before she even knew herself Is it ethical for Fitbit to use her pregnancy data?

Ethical use of tracking software Lesson 2 | Digital Ethics Ethical use of tracking software Provide an opt-out capability on tailored content Tell users about the tracking process Tell users if a databreach occurs

End-user License Agreements Lesson 2 | Digital Ethics End-user License Agreements Legal protection for the organization Tells the reader the digital behaviors and practices of the organization Often too long and difficult for users to read 2013 Gamestation (UK) hid an unethical clause, angering many customers Clear, conscience, and honest EULA’s are best

Legal Regulations of Digital Ethics Lesson 2 | Digital Ethics Legal Regulations of Digital Ethics Communication must reveal the sender of a message Organizations must provide users with info on how data is stored, protected, and used An “opt-out” capability should be provided on all digital communication