slide1 l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
ISYS205 Strategic Uses of Information Systems Fall, 2001 Ethical Issues in Information Systems Greg Fulton Anuja Desai T PowerPoint Presentation
Download Presentation
ISYS205 Strategic Uses of Information Systems Fall, 2001 Ethical Issues in Information Systems Greg Fulton Anuja Desai T

Loading in 2 Seconds...

play fullscreen
1 / 11

ISYS205 Strategic Uses of Information Systems Fall, 2001 Ethical Issues in Information Systems Greg Fulton Anuja Desai T - PowerPoint PPT Presentation


  • 160 Views
  • Uploaded on

ISYS205 Strategic Uses of Information Systems Fall, 2001 Ethical Issues in Information Systems Greg Fulton Anuja Desai Tom Schaeffer. Topic #5. Internet privacy (as part of this question, consider the information captured in tracking an individual’s digital “identity”). Definitions. Privacy:

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'ISYS205 Strategic Uses of Information Systems Fall, 2001 Ethical Issues in Information Systems Greg Fulton Anuja Desai T' - xiujuan


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1

ISYS205 Strategic Uses of Information SystemsFall, 2001Ethical Issues in Information SystemsGreg FultonAnuja DesaiTom Schaeffer

topic 5
Topic #5

Internet privacy (as part of this question, consider the information captured in tracking an individual’s digital “identity”).

definitions
Definitions
  • Privacy:
    • The quality or condition of being secluded from the presence or view of others.
    • The state of being free from unsanctioned intrusion: a person's right to privacy.
  • Identity:
    • The distinct personality of an individual regarded as a persisting entity; individuality.
    • The collective aspect of the set of characteristics by which a thing is definitively recognizable or known.
    • The set of behavioral or personal characteristics by which an individual is recognizable as a member of a group.

source: “http://www.dictionary.com”

threats to privacy
Threats to Privacy

1. Don't share your hard drive over the Internet.2. Be careful what programs you run.3. Beware public machines.4. Can the spam!5. Be careful what you write and where you send it.

protecting your privacy
Protecting your Privacy

1. SpyCop will search your computer for covert surveillance spy software.

2. Anonymizer makes your browsing experience anonymous.

3. AdSubtract Pro blocks cookies and manages the cookies that are already on your computer.

protecting your privacy cont
Protecting your Privacy (cont.)
  • Cookie Pal

Internet Cookie Filter And Manager Protects Your Online Privacy -- Kookaburra Software

  • Firekeys

Firewall + Security -- Software Appliance Company

  • Internet Privacy Service

Provides Filtering, Blocking, And Cookie Controls -- McAfee.com Corp

  • Invisible Secrets 3

Secure Your Files And Communications -- NeoByte Solutions

  • McAfee Internet Security 4.0

Anti-Virus, Firewall, And Parental Monitoring -- McAfee Retail Software

  • McAfee QuickClean 2.0

Removes Unnecessary E-Mail And Internet Files -- McAfee Retail Software

  • Netkeys ULTRA

Comprehensive Security For Internet And PC -- Software Appliance Company

  • SecureFile

Creates Self-Decryption Archive Using Symmetric / Asymmetric Key Mechanism -- SecureSoft Technologies

  • SpyDetect

All You Need To Protect Yourself Online -- SpyDetect, Inc

acm general moral imperatives
ACM General Moral Imperatives
  • 1.7 Respect the privacy of others
  • 1.8 Honor confidentiality

source: “http://www.acm.org/constitution/code.html”

1 7 respect the privacy of others
1.7 Respect the privacy of others

… It is the responsibility of professionals to maintain the privacy and integrity of data describing individuals. This includes taking precautions to ensure the accuracy of data, as well as protecting it from unauthorized access or accidental disclosure to inappropriate individuals. Furthermore, procedures must be established to allow individuals to review their records and correct inaccuracies.

1 8 honor confidentiality
1.8 Honor confidentiality

… The ethical concern is to respect all obligations of confidentiality to employers, clients, and users unless discharged from such obligations by requirements of the law or other principles of this Code.

for more information
For more Information
  • PHIL 311-001: Computer Ethics
  • Computer Professionals for Social Responsibility
  • THOMAS – U.S. Congress on the Internet
references
References
  • www.anonymizer.com
  • www.perfectlyprivate.com
  • http://ipw.internet.com/protection/privacy/