Information Anxiety By Meghan Randinelli. Introduction Greatest problem concerning ethical information technology (IT) is personal privacy Greatest problem.

Slides:



Advertisements
Similar presentations
Chapter 5 Credit Management
Advertisements

Credit Records and Laws
CHAPTER  Accounting can be defined from at least two point of views: A. It can emphasize the uses in which accounting information is put. B. It can emphasize.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Chapter 1 Business Information Systems: An Overview
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
© 2012 Cengage Learning. All Rights Reserved. Principles of Business, 8e C H A P T E R 11 SLIDE Computer Systems Business Applications.
3 Ethics and Privacy.
World Geography 3200/3202 Tertiary Industry Activity (The Service Sector) Tertiary Industry Activity (The Service Sector)
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
Privacy & Personal Information -- Why do we care or do we?
Challenges for Civil Liberties
March 7, 2013 BUSINESS ORGANIZATION.  More formal/complex than a proprietorship (one owner)  Partnership agreement: a written agreement among ALL owners.
Stanford Financial Aid Office
Economics Paycheck.
CHCWG DRAFT March 2, 2006 Hearing from the American People: Preliminary Overview of Sources and Reports March 2006 Caution: Preliminary Data Do not cite.
Understanding Your Paycheck and Tax Forms
Unit 03: Financial Literacy Vocabulary. Available Balance The amount available in an account for a person, business, or organization to spend. How much.
Bordoloi CMIS 108 Dr. Bijoy Bordoloi Privacy. Bordoloi Computers and Privacy These notes focus on the various topics associated with maintaining individual.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
Payroll Computations, Records, and Payment
2.1.3.G1 © Family Economics & Financial Education – February 2006 – Get Ready to Take Charge of Your Finances – What Does Your Future Hold? Funded by a.
Financial Management Financial Planning
Privacy Issues in Healthcare Xintao Wu University of North Carolina at Charlotte Nov 1, 2012.
Chapter © 2010 South-Western, Cengage Learning Credit Records and Laws Establishing Good Credit Evaluating Credit and Laws 17.
Chapter 1 Business Information Systems: An Overview
Financial Aid 101. SENIORS The time is NOW!! January 1 st is the first day to apply for financial aid for college or trade school Where to Find the FAFSA.
Criminal Investigation Part 4 Records as an Investigative Aid.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
HEALTH INFORMATION TECHNOLOGY. What Is Health Information Technology Every time you receive health care, a record of your visit is kept. That record includes.
ACCOUNTANTS AND AUDITORS By: Ashley Cooke. Keep track of Company’s money Write reports on companies Financial records Taxes Job Description ("Accountant“)
1 Business Information Systems: An Overview Daniel F. Duran,BSAD 341 Whittier College.
Accounting Information: Users and Uses Accounting Information: Users and Uses C H A P T E R 1.
Do Now10/30 & 10/31 Chapter 17 SLID E 1 Respond to the following in your notebook: As a teenager, you would like to get started in establishing a good.
Chapter 4.  What is Credit? ◦ Principal + Interest  Installment Debt ◦ Equal Payments ◦ Durable Goods ◦ Longer Term = Lower Payment BUT ◦ More Interest.
Introduction to Saving. © Family Economics & Financial Education – Revised November 2004 – Saving Unit – Introduction to Savings Funded by a grant from.
Create a system for maintaining personal financial records. Learning Objective # 2.
What’s Next? Checking and Savings Accounts. Opening a Checking Account Name some items you should bring with you to open a checking account.   Identification.
By: Amanda Breazeale Mrs.Moravits Period 6 9/23/14.
Kristen Lockhart COMPUTER PRIVACY & PERSONAL INFORMATION What types of information do companies have and share about YOU?
Managing the Information Copyright © Texas Education Agency, All rights reserved.
What is Financial Analysis?. “Copyright and Terms of Service Copyright © Texas Education Agency. The materials found on this website are copyrighted ©
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
Budgeting Techniques Key Terms --Budget --Fixed Expenses --Allowance --Budget Variance.
Introduction to Statistics BUSA 2100, Sect. 1.0, Dr. Moore.
Chapter 4.  What is Credit?  Installment Debt ◦ Durable Goods ◦ Longer Term = BUT  Longest Terms  Up to 30 years.
CHAPTER 12 FINANCIAL MANAGEMENT Financial Planning FINANCIAL PLANNING Ongoing Operations Revenue – all income that a business receives over a period.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Using the Web as an Investigation Tool Maureen Cahill University of Georgia Law Library
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Chapter © 2010 South-Western, Cengage Learning Credit Records and Laws Establishing Good Credit Evaluating Credit and Laws 17.
Federal Reserve Chapter 16 Section 2 Federal Reserve Functions.
FICO Your Credit Score FICO is an acronym for the Fair Isaac Corporation, the creators of the FICO score.
Financial Management Financial Planning
FINANCIAL PLANNING Beginning a business Startup Money source
FINANCIAL PLANNING Beginning a business Startup Money source
Societal Issues in Computing (COMP466)
Bank On It.
Privacy and Information
CONTRACTS PRIVILEGED COMMUNICATION PRIVACY ACT
11 Business and Technology 11-1 Computer Systems
Other Sources of Information
Business and Technology
Build Your CREDIT = Build Your ASSET
Introduction to Health Privacy
Lesson 1: Introduction to HIPAA
CONTRACTS PRIVILEGED COMMUNICATION PRIVACY ACT
Advertisers’ Deception
INFS 452 – Computer Ethics & Society
C3S3: Other Organizations
Presentation transcript:

Information Anxiety By Meghan Randinelli

Introduction Greatest problem concerning ethical information technology (IT) is personal privacy Greatest problem concerning ethical information technology (IT) is personal privacy Name and personal information are passed from computer to computer DAILY by both private and public sectors Name and personal information are passed from computer to computer DAILY by both private and public sectors Most of the information has been collected with your consent but has been redistributed without your consent Most of the information has been collected with your consent but has been redistributed without your consent

Examples of IT Distribution 1. Tax data: IRS keeps records of all earnings, deductions, etc., and this is available to 40+ government agencies 2. Education data: all awards and grades, plus SATs and roommate details. 3. Medical data: lists of visits to clinics and hospitals, you and your family’s diseases, allergies and medical history 4. Driver and crime data: personal description as well as records of arrests and violations of the law (license revocation) 5. Census data: US Census Bureau contains all close personal data that is confidential but namelessly released for statistics

More Examples of IT Distribution 6. Insurance data: formed a cooperative data base for all medical records 7. Lifestyle data: some 2 way TV cables make it so people can view how you live and then poll it in comparison with other lifestyles 8. Credit data: release intimate details concerning financial issues 9. World Wide Web data: when you enter your personal information/ into websites, it is recorded 10. Employment data: even before you get a job, all information from past ones has been collected 11. Financial institutions: banks keep track of money and the transactions and investments you make

Private vs. Public Social security number binds all personal information Social security number binds all personal information IT is the basis for storing and processing all information but it is being abused by people who manage it IT is the basis for storing and processing all information but it is being abused by people who manage it We aren’t usually told what information is being gathered and usually cannot see it either We aren’t usually told what information is being gathered and usually cannot see it either New laws are being formed that you must give consent to sell your data, making it more time consuming and expensive for those who work in gathering data New laws are being formed that you must give consent to sell your data, making it more time consuming and expensive for those who work in gathering data While it is still slightly unsafe to use IT, it is more unsafe to have irreplaceable hard files While it is still slightly unsafe to use IT, it is more unsafe to have irreplaceable hard files Computer monitoring aids in the process of increasing privacy of personal data Computer monitoring aids in the process of increasing privacy of personal data Privacy legislation is kind of difficult to pass especially due to the positive impact society receives from all the shared information Privacy legislation is kind of difficult to pass especially due to the positive impact society receives from all the shared information For example it helps to see the distribution of persons and their preferences in societal views For example it helps to see the distribution of persons and their preferences in societal views

Profiling Profiling: companies examine and evaluate data to create comprehensive personal profiles Profiling: companies examine and evaluate data to create comprehensive personal profiles Record all transactions made, and the computer based expert system uses rules to analyze all your information and create an accurate profile of your lifestyle Record all transactions made, and the computer based expert system uses rules to analyze all your information and create an accurate profile of your lifestyle Beneficial because of the fact that it helps with the polling and profiling of society Beneficial because of the fact that it helps with the polling and profiling of society Harmful because of the little amount of privacy attributed to it Harmful because of the little amount of privacy attributed to it