1 / 11

ISYS205 Strategic Uses of Information Systems Fall, 2001 Ethical Issues in Information Systems Greg Fulton Anuja Desai T

ISYS205 Strategic Uses of Information Systems Fall, 2001 Ethical Issues in Information Systems Greg Fulton Anuja Desai Tom Schaeffer. Topic #5. Internet privacy (as part of this question, consider the information captured in tracking an individual’s digital “identity”). Definitions. Privacy:

xiujuan
Download Presentation

ISYS205 Strategic Uses of Information Systems Fall, 2001 Ethical Issues in Information Systems Greg Fulton Anuja Desai T

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ISYS205 Strategic Uses of Information SystemsFall, 2001Ethical Issues in Information SystemsGreg FultonAnuja DesaiTom Schaeffer

  2. Topic #5 Internet privacy (as part of this question, consider the information captured in tracking an individual’s digital “identity”).

  3. Definitions • Privacy: • The quality or condition of being secluded from the presence or view of others. • The state of being free from unsanctioned intrusion: a person's right to privacy. • Identity: • The distinct personality of an individual regarded as a persisting entity; individuality. • The collective aspect of the set of characteristics by which a thing is definitively recognizable or known. • The set of behavioral or personal characteristics by which an individual is recognizable as a member of a group. source: “http://www.dictionary.com”

  4. Threats to Privacy 1. Don't share your hard drive over the Internet.2. Be careful what programs you run.3. Beware public machines.4. Can the spam!5. Be careful what you write and where you send it.

  5. Protecting your Privacy 1. SpyCop will search your computer for covert surveillance spy software. 2. Anonymizer makes your browsing experience anonymous. 3. AdSubtract Pro blocks cookies and manages the cookies that are already on your computer.

  6. Protecting your Privacy (cont.) • Cookie Pal Internet Cookie Filter And Manager Protects Your Online Privacy -- Kookaburra Software • Firekeys Firewall + Security -- Software Appliance Company • Internet Privacy Service Provides Filtering, Blocking, And Cookie Controls -- McAfee.com Corp • Invisible Secrets 3 Secure Your Files And Communications -- NeoByte Solutions • McAfee Internet Security 4.0 Anti-Virus, Firewall, And Parental Monitoring -- McAfee Retail Software • McAfee QuickClean 2.0 Removes Unnecessary E-Mail And Internet Files -- McAfee Retail Software • Netkeys ULTRA Comprehensive Security For Internet And PC -- Software Appliance Company • SecureFile Creates Self-Decryption Archive Using Symmetric / Asymmetric Key Mechanism -- SecureSoft Technologies • SpyDetect All You Need To Protect Yourself Online -- SpyDetect, Inc

  7. ACM General Moral Imperatives • 1.7 Respect the privacy of others • 1.8 Honor confidentiality source: “http://www.acm.org/constitution/code.html”

  8. 1.7 Respect the privacy of others … It is the responsibility of professionals to maintain the privacy and integrity of data describing individuals. This includes taking precautions to ensure the accuracy of data, as well as protecting it from unauthorized access or accidental disclosure to inappropriate individuals. Furthermore, procedures must be established to allow individuals to review their records and correct inaccuracies.

  9. 1.8 Honor confidentiality … The ethical concern is to respect all obligations of confidentiality to employers, clients, and users unless discharged from such obligations by requirements of the law or other principles of this Code.

  10. For more Information • PHIL 311-001: Computer Ethics • Computer Professionals for Social Responsibility • THOMAS – U.S. Congress on the Internet

  11. References • www.anonymizer.com • www.perfectlyprivate.com • http://ipw.internet.com/protection/privacy/

More Related