Thursday 22 December 2011

Security And Ethical Challenge


Security And Ethical Challenge ; 

1.       Privacy issues
The power of information technology to store and retrieve information can have a negative effect on the individuals’ right to privacy. The internet itself gives users a feeling of anonymity while actually being quite the opposite. 

2.       Violation of Privacy
Accessing individuals private e-mail conversations, and/or collecting and sharing information about individuals without their knowledge or consent. 

3.       Unauthorized Personal Files.
Collecting telephone numbers, credit card numbers, e-mail addresses, and other personal information to build individual customer profiles. 

4.       Computer Monitoring
Using technology to monitor conversations, employee productivity or an individuals movement. 

5.       Computer Matching.
Using costumer information gained from multiple sources to create customer profiles that can be sold to information brokers or other companies and used to market business services. 

6.       User Privacy Protection.
The Electronics Communications Privacy Act and the Computer Fraud and Abuse Act prohibit intercepting data communications messages, stealing or destroying data. The Computer Matching and Privacy Act regulate the matching data held in federal agency files. Individuals can also protect their privacy using such software and services like encryption and anonymous remailers. 

7.       Censorship.
The right of people to know about others may want to keep quiet, the rights of people to express their opinion, and to publish those opinion, is the center of a major debate between the rights of individuals and the rights of society. Issues regarding spamming, flaming, pornography, and copyrights protection are just some of the issues being debated by various groups and government.


No comments:

Post a Comment