Ethical Issues concerning Internet Privacy 1.  Personal information on the Internet has become a hot commodity because it can be collected, exchanged,

Slides:



Advertisements
Similar presentations
Privacy on the WEB Privacy on the WEB Group 0227 Efrain Castro, Dinesh Parmer, Michael Raiford Robert Reich, Kim Walker, Claudia Worme.
Advertisements

SPYWARE Presented by The State Security Office November 17, 2004.
Back to Table of Contents
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
Chapter 11 Privacy Policies and Behavioral Marketing.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
DoubleClick and Internet Privacy Craig Lizotte. Mission Statement DoubleClick is your partner in achieving success with digital marketing—whether you.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Technological Implications for Privacy David Kotz Department of Computer Science Dartmouth College
Internet Ethics Presented by: Daniel Wu Kalven Wu.
Privacy as an International Information Issue MD823 October 18, 2004.
Privacy as an International Information Issue MD823 September 22, 2003.
© 2006 Pearson Education Canada Inc Canadian Advertising in Action Chapter 12 Internet Communications.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Jared Cinque Section 6.  Internet tracking is the process of following internet activity backwards from recipient to user through a special type of software.
Class Discussion Notes MKT March 27, 2001.
Consumer Behavior, Market Research
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
Data Privacy and Security Prof Sunil Wattal. Consumer Analytics  Analytics with consumer data to derive meaningful insights on actions and behaviors.
“Breach of Privacy” nPresented by Sumit Yadav. Computer Science and Engineering Computer security Aspects nPrivacy (confidentiality ) n integrity n availability.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Ethics & Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Copyright © 2009 Pearson Education, Inc. Slide 6-1 Chapter 6 E-commerce Marketing Concepts.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Canadian Advertising in Action, 6th ed. Keith J. Tuckwell ©2003 Pearson Education Canada Inc Elements of the Internet World Wide Web World.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
The DoubleClick controversy and other related issues pertaining to privacy on the Internet.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
Security, Social and Legal Issues Regarding Software and Internet.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
Managing the Information Copyright © Texas Education Agency, All rights reserved.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
CS 6v Privacy The end of Privacy ?? Dr.Murat Kantarcioglu.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Personal Privacy and the Public Internet John E. Carter Kennesaw State University IT 3700.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Lecture4 Information Privacy 1-1. Overview Introduction Perspectives on privacy Information disclosures Data mining 1-2.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Chapter 4 Consumer Behavior, Online Market Research, and
Legal and Ethical Issues in E-Commerce
Societal Issues in Computing (COMP466)
Chapter 10: Privacy, Security, and Ethics
Privacy Issues part 4 Information/data privacy
A Gift of Fire Third edition Sara Baase
INFS 452 – Computer Ethics & Society
18734: Foundations of Privacy
Personal Privacy and the Public Internet
IT and Society Week 2: Privacy.
Presentation transcript:

Ethical Issues concerning Internet Privacy 1

 Personal information on the Internet has become a hot commodity because it can be collected, exchanged, recombined with ease.  Other ways to gather information ◦ Serial numbers embedded in computers or software ◦ Spyware, cookies ◦ Ex. DoubleClick 2

 Anonymity – protection from undesired attention  Solitude – lack of physical proximity to others  Secrecy involves limiting the dissemination of knowledge about oneself  Information privacy – concerns the collection, use, and dissemination of information about individuals 3

 Restricted access – able to shield personal data from some while sharing it with others  Extrinsic loss of freedom- lack of privacy often makes individuals vulnerable to having their behavior controlled by others  Intrinsic loss of freedom – most people behave differently when they are being watched or monitored 4

Novice Internet users are amazed by the amount of personal information available online Should be limits and conditions such as: – Exclude unique identifiers (SSN, birth dates, mothers’ maiden name) – Exclude unlisted phone numbers, reverse lookup 5

 Shopping “Saver” cards (Kroger, Giant Eagle)  2 phases of systematic loss of privacy ◦ Database phase – technology made it possible to collect, store, retrieve large amounts of data ◦ Network phase – consumers routinely communicate with vendors by , post messages to electronic bulletin boards on Internet while surfing and/ purchasing online products (monitored by prying eyes all over the network and collected without their knowledge) 6

Cookies – small data files written to the customer’s hard drive by the web site when the user visits that site with a browse; it stores customer’s visit info and when they come back it knows what you did before 3 rd party cookies – placed across the network so it tracks user movements Clickstream data –shows users IP address, browser type, version, URLs visited 7

 Data profiling – gathering and collating data about individuals to make decisions about individual’s habits  Spyware - small program usually installed without the users consent, tracks user’s surfing habits and sends to a third party  Why is this done? Target marketing and advertising (more predictable response) 8

Laws – not the only solution (Code, norms, market) Opt-in Approach – companies must inform user about how data is being used and the user can proceed or not 2004, Utah Spyware Control Act – requires all companies to disclose the changes made to the computer by their spyware and type of information transmitted to the server Technology – anti-spyware Some companies, realizing importance of privacy to customers, will enhance confidence and trust but will mean higher prices -> customers may be willing to pay 9

Databases of info is no different than gossip Profiles used by insurance companies and other businesses before selling services to us Technology is more powerful and intrusive than local gossip Companies need to obtain permission before collecting data Some think cookies are just an annoyance others look at as “Big Brother” watching Most users have no idea what cookies do 10

US believes best path is a split between market pressure and industry self-regulation Europe treats privacy as a human right deserving full protection In the United States 1984 Cable Protection Act – prohibits cable TV companies to collect data about viewing habits 1988 Video Privacy Protection Act – same with movie rental stores 11

1994 Driver’s Privacy Protection Act protects motor vehicle records and prohibits sale or release unless the drivers are provided the opportunity to opt out 1998 Children's Online Privacy Act – forbids web sites from collecting information on children less than 13 unless they have parent consent 2001 HIPPA protects medical privacy FERPA 12

Cookies and spyware Intel had a plan to put id numbers in computer chips of Pentium III – Reason - track computer equipment – FTC demanded Intel to recall the chip and be disabled unless the user turned it on – PC makers made a patch and turned the serial numbers back on – Serial numbers would enhance security but lose privacy 13

Users warned collection will occur Empowers users to make an informed choice Encourages standardization and simplification of privacy policies Has limitations – it can not ensure enforcement and if violated P3P has little recourse Europe doesn’t rely on market place but relies on LAWS 14

 Technology has facilitated greater control over employees  Heightened intrusiveness into private lives  Monitor incoming and outgoing and web-surfing habits  Employee Internet Management software – more than half of Fortune 500 companies have adopted some sort of EIM software 15

 Should be private?  Web-surfing monitoring? ◦ Hidden cameras ◦ Clickstream data ◦ Will it protect the employee from harm or breach or privacy?  Will moral diminish?  Decline in productivity? Web surfing vs. going outside to smoke  Can we find middle ground? 16