Security And Ethical Challenge ;
1.
Privacy issues
The power of information technology to
store and retrieve information can have a negative effect on the individuals’
right to privacy. The internet itself gives users a feeling of anonymity while
actually being quite the opposite.
2.
Violation of Privacy
Accessing individuals private e-mail
conversations, and/or collecting and sharing information about individuals
without their knowledge or consent.
3.
Unauthorized Personal Files.
Collecting telephone numbers, credit card
numbers, e-mail addresses, and other personal information to build individual
customer profiles.
4.
Computer Monitoring
Using technology to monitor conversations,
employee productivity or an individuals movement.
5.
Computer Matching.
Using costumer information gained from
multiple sources to create customer profiles that can be sold to information
brokers or other companies and used to market business services.
6.
User Privacy Protection.
The Electronics Communications Privacy Act
and the Computer Fraud and Abuse Act prohibit intercepting data communications
messages, stealing or destroying data. The Computer Matching and Privacy Act regulate
the matching data held in federal agency files. Individuals can also protect their
privacy using such software and services like encryption and anonymous
remailers.
7.
Censorship.
The right of people to know about others may
want to keep quiet, the rights of people to express their opinion, and to
publish those opinion, is the center of a major debate between the rights of
individuals and the rights of society. Issues regarding spamming, flaming,
pornography, and copyrights protection are just some of the issues being
debated by various groups and government.
No comments:
Post a Comment