Post on 02-Jun-2018
8/10/2019 Online Privacy and Cyber-Ethics
1/12
Online Privacy &
Cyber-ethicsSIDDHANT PRAKASH PARDESHI
2012A3PS200G
Prepared for Dr. Reena Cheruvalath in fulfillment of partial requirements oHSS F343 Professional Ethics
8/10/2019 Online Privacy and Cyber-Ethics
2/12
Our World, Our Lives, Our Data: Online
News & Knowledge Our information database
Encyclopedias
Journals
Blogs
Collaboration
Learning
Sharing & Hosting
Discussion Forums
Communication
Dedicated Channels
VOIP
Video Calling
Social Media Services
Social Networking
Photo & Video Sharing
Professional Networking
Miscellaneo E-Commerce
Online Shop
Internet Ban
Travel Reser
Database Man
Cloud Computi
Stock Market Tr
Entertainment
8/10/2019 Online Privacy and Cyber-Ethics
3/12
Privacy: Defined Data PrivacyData privacyis that aspectechnology (IT) that deals worganization or individual oin a computer system can third parties.
- Margaret Rou
When it comes to privacy andaccountability, people always demandthe former for themselves and the latterfor everyone else.
- David Brin
8/10/2019 Online Privacy and Cyber-Ethics
4/12
Online Privacy: A Necessity?
Why?
Information Confidentiality
Personal Media
Corporate Data
National Security Right to Privacy: Ahuman right
UDHR, 1948
Liberty, Freedom
Why Not?
Research
Adverse effects of drugs
Smart Grid
Traffic Control Human Behaviour
Protection
Law Enforcement
Counter - Terrorism
8/10/2019 Online Privacy and Cyber-Ethics
5/12
Freedom vs Protection: The Balance
Key Concept: Ethical decision making
Approaches
Rights
Justice
Utilitarian
Common Good
Discussion:
Do all people have an equal need for privacy?
Are some people more vulnerable than others?
8/10/2019 Online Privacy and Cyber-Ethics
6/12
Case Study: Facebooks Beacon Syste
What Provided for Targeted
Advertising by sharingusers activities with their
friends
Exchanged users data
with external websites like
Blockbuster Online
Conflicted with
Facebooks mission
statementto ensure users
have jurisdiction over their
own private information
When Launched on November 6,
2007
Shut down in September,
2009due to a class action
lawsuit involving a 9.5
million USD settlement.
Why Breached Fede
and video-rent
laws
Commercialize
private data
Improper Term
Behavioral Targ
users
8/10/2019 Online Privacy and Cyber-Ethics
7/12
Case Study: Facebooks Ethical Decisio
Utilitarian
Approach
Justice
Approach
Rights
Approach
Virtue
Approac
Options Max Points Score Score Score Score
Keep Beacon 10 5 2 2 2
Modify Beacon 10 7 10 10 7
Cancel Beacon 10 5 8 8 8
Source: Case Study by George Washington School of Busines
8/10/2019 Online Privacy and Cyber-Ethics
8/12
Cyber-ethics: Code of Fair InformationPractices for Organizations
Based on 5 principles outlining the requirements for records keeping systems.
1. There must be no personal data record-keeping systemswhose very existence is sec
2. There must be a way for a person to find out what information about the person is in a
it is used.
3. There must be a way for a person to prevent information about the person that was o
purpose from being used or made available for other purposes without the person's c
4. There must be a way for a person to correct or amend a record of identifiable inform
person.
5. Any organization creating, maintaining, using, or disseminating records of identifiable
must assure the reliability of the data for their intended use and must take precaution
misuses of the data(Harris, 2003).
Implemented in 1973by the U.S. Department of Health, Education and Welfare
8/10/2019 Online Privacy and Cyber-Ethics
9/12
Microsofts Cyber-ethics Dos & Donts
for Users
Do
1. Use the Internet for communication
2. Report cyberbullying
3. Use the Internet for research andinformation
4. Enjoy music, videos and games on theInternet
5. Shop, bank and pay bills online
6. Use the Internet to expand your socialand business networks
Dont
1. Be a cyberbully
2. Encourage cyberbullies
3. Use copyrighted informationown
4. Download or share copyrighinformation
5. Share personal information o
6. Lie
8/10/2019 Online Privacy and Cyber-Ethics
10/12
Conclusions
The Internetis the most prominent network of computers and has becomefundamental part of life in the modern world.
It is necessary to respect users privacy while ensuring a balance betweenand Protection.
Corporates must adhere to Privacy Laws while designing their terms of servnot violate their customers human right to privacy in any way.
Ethical Decision Making is essential to ensure adherence to Ethics and Law
Both Companies as well as users can follow Ethical guidelines in the form oof Ethicsthat must be well formulated.
8/10/2019 Online Privacy and Cyber-Ethics
11/12
References
Batchelor, Nikki and Houston, Daniel: Facebook Case Study. GeorgeWashington School of Business, 2013.
Warren and Brandeis, "The Right To Privacy"
http://www.scu.edu/ethics-center/privacy/balance/
http://www.microsoft.com/security/online-privacy/cyberethics-practice.aspx
http://www.wired.com/2012/09/beacon-settlement-approved/
http://en.wikipedia.org/wiki/Facebook_Beacon
http://epic.org/privacy/consumer/code_fair_info.html
http://www.scu.edu/ethics-center/privacy/balance/http://www.microsoft.com/security/online-privacy/cyberethics-practice.aspxhttp://www.microsoft.com/security/online-privacy/cyberethics-practice.aspxhttp://www.wired.com/2012/09/beacon-settlement-approved/http://en.wikipedia.org/wiki/Facebook_Beaconhttp://epic.org/privacy/consumer/code_fair_info.htmlhttp://epic.org/privacy/consumer/code_fair_info.htmlhttp://epic.org/privacy/consumer/code_fair_info.htmlhttp://en.wikipedia.org/wiki/Facebook_Beaconhttp://en.wikipedia.org/wiki/Facebook_Beaconhttp://www.wired.com/2012/09/beacon-settlement-approved/http://www.wired.com/2012/09/beacon-settlement-approved/http://www.wired.com/2012/09/beacon-settlement-approved/http://www.wired.com/2012/09/beacon-settlement-approved/http://www.wired.com/2012/09/beacon-settlement-approved/http://www.wired.com/2012/09/beacon-settlement-approved/http://www.microsoft.com/security/online-privacy/cyberethics-practice.aspxhttp://www.microsoft.com/security/online-privacy/cyberethics-practice.aspxhttp://www.microsoft.com/security/online-privacy/cyberethics-practice.aspxhttp://www.microsoft.com/security/online-privacy/cyberethics-practice.aspxhttp://www.microsoft.com/security/online-privacy/cyberethics-practice.aspxhttp://www.microsoft.com/security/online-privacy/cyberethics-practice.aspxhttp://www.microsoft.com/security/online-privacy/cyberethics-practice.aspxhttp://www.scu.edu/ethics-center/privacy/balance/http://www.scu.edu/ethics-center/privacy/balance/http://www.scu.edu/ethics-center/privacy/balance/http://www.scu.edu/ethics-center/privacy/balance/http://www.scu.edu/ethics-center/privacy/balance/8/10/2019 Online Privacy and Cyber-Ethics
12/12