Ch5 1 ETHC303 Chapter 5- Privacy Instructor: Dr. Hassan Ismail Abdalla Room: E236.

Slides:



Advertisements
Similar presentations
RECAP – TASK 1 What is utilitarianism? Who is Jeremy Bentham?
Advertisements

ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Social Responsibility and Ethics in Strategic Management
MODULE TWO Ethical and Legal Issues. Objectives: Particpants will: Understand privacy, confidentiality and ethics as they relate to being a volunteer.
ICT Ethics 2 ICT 139.
NOTES TO ANDERSON, CHAPTERS 3 PROFESSIONAL WRITING.
Title your paper “McCulloch v. Maryland”. We are paper boxing. The power to tax is the power to destroy McCulloch v. Maryland Maryland passes a tax Necessary.
School Development Planning Initiative
Ethics and Responsibility
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 9: Professional Ethics and Responsibilities.
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
3 Ethics and Privacy.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Computer and Ethics. Ethical Problems Proliferation of computers and their networks have created new ethical problems The ACM has issued a Code of Ethics.
Spring 2010 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering Privacy Concerns (Chapters [B]) Spring.
Types of Essays... and why we write them.. Why do we write essays? Hint: The answer is NOT ‘because sir/miss told me to’
Marketing Management Chapter 1.
Philosophy A philosophy is a system of beliefs about reality.
Economic Systems.
Contemporary Issues in Canadian Health Care Nola M. Ries, MPA, LLM Adjunct Assistant Professor, University of Victoria Research Associate, Health Law Institute,
The Philosophy of Exotischism Ignorance Is No Excuse 1 Most of us have heard the old expression "ignorance is no excuse for breaking the law". If courts.
. 4.1 Understanding ethical and social issues related to systems. 4.2 Ethics in an information society. 4.3 The moral dimensions of information systems.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Practical Information Management
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Confidentiality in the School Setting Presented by: Emma Morales, LCSW Myrna Reynoso-Torres, LCSW Yolanda Vargas, LCSW.
Basic Principles: Ethics and Business
1 Ch. 2: Economic Activities: Producing and Trading James R. Russell, Ph.D., Professor of Economics & Management, Oral Roberts University ©2005 Thomson.
Copyright  2010 Pearson Education Canada / J A McLachlan Chapter Nine Making Ethical Decisions.
Purchasing Ethics and Vendor Relations
Professional Ethics: Should Software Engineers Adhere to a Professional Code of Conduct? Jonathan Schiff CS 301.
CHAPTER 6 MORALITY AND ACTION.
Code of Ethics for Professional Accountants of HKICPA
Business Ethics Lecture Rights and Duties 1.
Philosophy 223 Technology in the Workplace: The Concern for Privacy.
Marketing in Today’s Economy
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
IT Professionalism Ethics Modified by Andrew Poon.
Environmental Management System Definitions
MODULE TWO: Ethical and Legal Issues. Objectives: Students will: Understand privacy, confidentiality and ethics as they relate to being a volunteer. Define.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
SARS and Information Policy: Emerging Roles for Information Practitioners Information Flow ·IPs could help in developing information policy because they.
1 Introduction to Law Introduction to Law – Part 1 (Categories and Sources of Law)
Managing in the Global Environment
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
Business Ethics & Social Responsibility
P RIVACY 1 Dr. Hassan Abdalla College of Computer and Information Sciences King Saud University, Semester 1, 2010/2011.
Acting as a Watchdog. What is a watchdog? A watchdog is an individual or group (generally non-profit) that keeps an eye on a particular entity or a particular.
Professional Ethics & Codes of Conduct Lecture 3.
Introduction to Political Philosophy What is politics, what is philosophy, what is political philosophy and intro to the state of nature.
Easy Read Summary Mental Capacity Act Mental Capacity Act A Summary The Mental Capacity Act 2005 will help people to make their own decisions.
PO :Physical Therapy Administration. Learning Objectives The physical therapy technician will participate as a member of the physical therapy administration.
Ethical Decision Making , Ethical Theories
Information Systems Unit 3.
Business Ethics “doing well by doing good”
CHAPTER 5: Marketing Information & Research Mrs. Piotrowski Principles of Marketing 1.
1 Ethics of Computing MONT 113G, Spring 2012 Session 29 Privacy.
“He that cannot obey, cannot command.” - Benjamin Franklin -
Lecture 7 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS 1.
1 C H A P T E R © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in.
Basic Principles: Ethics and Business
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
PHIL 2 Philosophy: Ethics in Contemporary Society Week 2 Topic Outlines.
Basic Principles: Ethics and Business
Privacy Dr. Hassan Abdalla
Good Spirit School Division
Basic Principles: Ethics and Business
Presentation transcript:

Ch5 1 ETHC303 Chapter 5- Privacy Instructor: Dr. Hassan Ismail Abdalla Room: E236

Ch5 2 The Questions What information should one be required to disclose about one's self to others? Under what conditions? What information should one be able to keep strictly to one's self? These are among the questions that a concern for privacy raises today more than ever before. Cautious citizens must be asking these questions.

Ch5 3 Two Forces Threaten Our Privacy 1. The growth of information technology, with its enhanced capacity for observation, communication, computation, storage, and retrieval. 2. The increased value of information in decision making. Information is increasingly valuable to policy makers; they want it even if acquiring it invades another's privacy.

Ch5 4 Information Gathering Computers make it possible to gather detailed information about individuals to an extent never possible before Government agencies now maintain extensive records of individual behavior When individuals believe they are being watched, they are compelled to behave differently than they might if they weren't being observed. Record-keeping is far from a new phenomenon

Ch5 5 Information Gathering – cont. Computer technology has changed record- keeping activities in a number of undeniable and powerful ways: – First, the scale of information gathering has changed. – Second, the kind of information that can be gathered has changed. – Third, the scale of exchange of information has changed enormously

Ch5 6 Transaction Generated Information Technology no longer limits what can be done Now only time and money and, perhaps, human capabilities impose limits on the quantity of information that can be gathered and processed. The kind of information that it is now possible to collect and use is also novel to researchers One particularly important new form of information is referred to as transaction generated information (TGI)

Ch5 7 TGI Information Gathering – cont. TGI gathering seems to be fragmented and, therefore, seems not to pose the threat of Big Brother As far as the technology goes, the distribution of information can take place with or without the knowledge of the person whom the information is about It can take place intentionally as well as unintentionally When computers are connected via telecommunications lines, the possibilities of data being tampered with or stolen are increased

Ch5 8 Accuracy Misinformation has a way of messing up people's lives, especially when the party with the inaccurate information has an advantage in power and authority. Consider the difficulty of John A. Smith's

Ch5 9 Record-Keeping In summary, while record-keeping is, by no means, a new-activity, it appears that computer and information technology has changed record-keeping activities in the following ways: (1) it has made a new scale of information gathering possible (2) it has made new kinds of information possible, especially transaction generated information; (3) it has made a new scale of information distribution and exchange possible

Ch5 10 Record-Keeping – cont. (4) the effect of erroneous information can be magnified (5) information about events in one's life may endure much longer than ever before These five changes make the case for the claim that the world we live in is more like a panopticon than ever before.

Ch5 11 Is it Really Computers to Blame One may be tempted to say that computers are not really the problem or the cause of the problem. It is individuals and organizations that are creating, gathering, exchanging, and using information. Computers, according to this argument are simply tools. If there is a problem, it is the people who use computers, not the computers themselves.

Ch5 12 Personal Privacy in a Balance Personal privacy is generally put on the other side of the balancing scales. The issue is framed so that we have to balance all the good things that are achieved through information gathering and exchange against the desire or need for personal privacy. Some even claim that we have a right to personal privacy for if that were true, the scales would weigh heavily on the side of personal privacy. From a legal and constitutional point of view, however, we have, at most, a limited and complex right to privacy.

Ch5 13 Possible Counterarguments The case for privacy seems powerful and suggests that there are serious dangers with the amount and kind of data gathering that now goes on. However, some people may still not be convinced that there is much of a problem based on the following arguments: 1. Someone might argue - that the situation is not so bad, that individuals who have done nothing wrong, have nothing to fear. This argument might even go as far to say that privacy only protects people who have something to hide. Unfortunately, this argument does not work because erroneous information can dramatically affect your life (stolen car).

Ch5 14 Possible Counterarguments– cont. 2. Individuals in our society do have some power to control their relationships with private and public organizations. Many have simply opted to give up their privacy. They could refuse to give out information about themselves. This argument contains a little of truth, but hides a much more complicated situation. Yes, I can choose not to do any thing that might disclose my privacy (not to buy using credit card) so that there is no information gathered about my buying activities However, I will have to give up a great deal; I have to pay a high price for my privacy.

Ch5 15 Possible Counterarguments– cont. 3. Finally, someone might still insist that we have nothing to worry about because we are protected by a wide array of legislation against abuses of information Moreover, you could argue that we have voluntarily given up our privacy by supporting legislators who believe we prefer less privacy to better law enforcement and more efficient organizations. This argument raises the question of whether the legislation system we have today is good enough.

Ch5 16 Role of Computer Professionals Computer professionals can play an important role, individually and collectively. First and foremost, individual professionals must not wash their hands of privacy issues. A computer professional can point out privacy matters to clients or employers when building databases containing sensitive information.

Ch5 17 Role of Computer Professionals – cont. The original ACM Code of Professional Conduct (passed by the ACM Council in 1973) specified that: An ACM member, whenever dealing with data concerning individuals shall always consider the principle of the individuals' privacy and seek the following: – To minimize the data collected. – To limit authorized access to the data­ – To provide proper security for the data. – To determine the required retention period of the data. – To ensure proper disposal of the data.

Ch5 18 Role of Computer Professionals – cont. The Guidelines ACM Code of Ethics explain that: "It is the responsibility of the professionals to maintain the privacy and integrity of data describing individuals". This includes taking precautions to ensure the accuracy of data, as well as protecting it from unauthorized access or accidental disclosure to inappropriate individuals.