Online Privacy and Cyber-Ethics

download Online Privacy and Cyber-Ethics

of 12

Transcript of Online Privacy and Cyber-Ethics

  • 8/10/2019 Online Privacy and Cyber-Ethics

    1/12

    Online Privacy &

    Cyber-ethicsSIDDHANT PRAKASH PARDESHI

    2012A3PS200G

    Prepared for Dr. Reena Cheruvalath in fulfillment of partial requirements oHSS F343 Professional Ethics

  • 8/10/2019 Online Privacy and Cyber-Ethics

    2/12

    Our World, Our Lives, Our Data: Online

    News & Knowledge Our information database

    Encyclopedias

    Journals

    Blogs

    Collaboration

    Learning

    Sharing & Hosting

    Discussion Forums

    Communication

    Dedicated Channels

    E-mail

    VOIP

    Video Calling

    Social Media Services

    Social Networking

    Photo & Video Sharing

    Professional Networking

    Miscellaneo E-Commerce

    Online Shop

    Internet Ban

    Travel Reser

    Database Man

    Cloud Computi

    Stock Market Tr

    Entertainment

  • 8/10/2019 Online Privacy and Cyber-Ethics

    3/12

    Privacy: Defined Data PrivacyData privacyis that aspectechnology (IT) that deals worganization or individual oin a computer system can third parties.

    - Margaret Rou

    When it comes to privacy andaccountability, people always demandthe former for themselves and the latterfor everyone else.

    - David Brin

  • 8/10/2019 Online Privacy and Cyber-Ethics

    4/12

    Online Privacy: A Necessity?

    Why?

    Information Confidentiality

    Personal Media

    Corporate Data

    National Security Right to Privacy: Ahuman right

    UDHR, 1948

    Liberty, Freedom

    Why Not?

    Research

    Adverse effects of drugs

    Smart Grid

    Traffic Control Human Behaviour

    Protection

    Law Enforcement

    Counter - Terrorism

  • 8/10/2019 Online Privacy and Cyber-Ethics

    5/12

    Freedom vs Protection: The Balance

    Key Concept: Ethical decision making

    Approaches

    Rights

    Justice

    Utilitarian

    Common Good

    Discussion:

    Do all people have an equal need for privacy?

    Are some people more vulnerable than others?

  • 8/10/2019 Online Privacy and Cyber-Ethics

    6/12

    Case Study: Facebooks Beacon Syste

    What Provided for Targeted

    Advertising by sharingusers activities with their

    friends

    Exchanged users data

    with external websites like

    Blockbuster Online

    Conflicted with

    Facebooks mission

    statementto ensure users

    have jurisdiction over their

    own private information

    When Launched on November 6,

    2007

    Shut down in September,

    2009due to a class action

    lawsuit involving a 9.5

    million USD settlement.

    Why Breached Fede

    and video-rent

    laws

    Commercialize

    private data

    Improper Term

    Behavioral Targ

    users

  • 8/10/2019 Online Privacy and Cyber-Ethics

    7/12

    Case Study: Facebooks Ethical Decisio

    Utilitarian

    Approach

    Justice

    Approach

    Rights

    Approach

    Virtue

    Approac

    Options Max Points Score Score Score Score

    Keep Beacon 10 5 2 2 2

    Modify Beacon 10 7 10 10 7

    Cancel Beacon 10 5 8 8 8

    Source: Case Study by George Washington School of Busines

  • 8/10/2019 Online Privacy and Cyber-Ethics

    8/12

    Cyber-ethics: Code of Fair InformationPractices for Organizations

    Based on 5 principles outlining the requirements for records keeping systems.

    1. There must be no personal data record-keeping systemswhose very existence is sec

    2. There must be a way for a person to find out what information about the person is in a

    it is used.

    3. There must be a way for a person to prevent information about the person that was o

    purpose from being used or made available for other purposes without the person's c

    4. There must be a way for a person to correct or amend a record of identifiable inform

    person.

    5. Any organization creating, maintaining, using, or disseminating records of identifiable

    must assure the reliability of the data for their intended use and must take precaution

    misuses of the data(Harris, 2003).

    Implemented in 1973by the U.S. Department of Health, Education and Welfare

  • 8/10/2019 Online Privacy and Cyber-Ethics

    9/12

    Microsofts Cyber-ethics Dos & Donts

    for Users

    Do

    1. Use the Internet for communication

    2. Report cyberbullying

    3. Use the Internet for research andinformation

    4. Enjoy music, videos and games on theInternet

    5. Shop, bank and pay bills online

    6. Use the Internet to expand your socialand business networks

    Dont

    1. Be a cyberbully

    2. Encourage cyberbullies

    3. Use copyrighted informationown

    4. Download or share copyrighinformation

    5. Share personal information o

    6. Lie

  • 8/10/2019 Online Privacy and Cyber-Ethics

    10/12

    Conclusions

    The Internetis the most prominent network of computers and has becomefundamental part of life in the modern world.

    It is necessary to respect users privacy while ensuring a balance betweenand Protection.

    Corporates must adhere to Privacy Laws while designing their terms of servnot violate their customers human right to privacy in any way.

    Ethical Decision Making is essential to ensure adherence to Ethics and Law

    Both Companies as well as users can follow Ethical guidelines in the form oof Ethicsthat must be well formulated.

  • 8/10/2019 Online Privacy and Cyber-Ethics

    11/12

    References

    Batchelor, Nikki and Houston, Daniel: Facebook Case Study. GeorgeWashington School of Business, 2013.

    Warren and Brandeis, "The Right To Privacy"

    http://www.scu.edu/ethics-center/privacy/balance/

    http://www.microsoft.com/security/online-privacy/cyberethics-practice.aspx

    http://www.wired.com/2012/09/beacon-settlement-approved/

    http://en.wikipedia.org/wiki/Facebook_Beacon

    http://epic.org/privacy/consumer/code_fair_info.html

    http://www.scu.edu/ethics-center/privacy/balance/http://www.microsoft.com/security/online-privacy/cyberethics-practice.aspxhttp://www.microsoft.com/security/online-privacy/cyberethics-practice.aspxhttp://www.wired.com/2012/09/beacon-settlement-approved/http://en.wikipedia.org/wiki/Facebook_Beaconhttp://epic.org/privacy/consumer/code_fair_info.htmlhttp://epic.org/privacy/consumer/code_fair_info.htmlhttp://epic.org/privacy/consumer/code_fair_info.htmlhttp://en.wikipedia.org/wiki/Facebook_Beaconhttp://en.wikipedia.org/wiki/Facebook_Beaconhttp://www.wired.com/2012/09/beacon-settlement-approved/http://www.wired.com/2012/09/beacon-settlement-approved/http://www.wired.com/2012/09/beacon-settlement-approved/http://www.wired.com/2012/09/beacon-settlement-approved/http://www.wired.com/2012/09/beacon-settlement-approved/http://www.wired.com/2012/09/beacon-settlement-approved/http://www.microsoft.com/security/online-privacy/cyberethics-practice.aspxhttp://www.microsoft.com/security/online-privacy/cyberethics-practice.aspxhttp://www.microsoft.com/security/online-privacy/cyberethics-practice.aspxhttp://www.microsoft.com/security/online-privacy/cyberethics-practice.aspxhttp://www.microsoft.com/security/online-privacy/cyberethics-practice.aspxhttp://www.microsoft.com/security/online-privacy/cyberethics-practice.aspxhttp://www.microsoft.com/security/online-privacy/cyberethics-practice.aspxhttp://www.scu.edu/ethics-center/privacy/balance/http://www.scu.edu/ethics-center/privacy/balance/http://www.scu.edu/ethics-center/privacy/balance/http://www.scu.edu/ethics-center/privacy/balance/http://www.scu.edu/ethics-center/privacy/balance/
  • 8/10/2019 Online Privacy and Cyber-Ethics

    12/12