Premium Essay

Techonology and Privacy

In:

Submitted By Nhien
Words 3636
Pages 15
The development of Information Communication Technology has created new ethical dilemmas due to the out-of-date moral, legal, and social boundaries. These boundaries can be represented by rules and legislation, laws and human nature. The expansion of technology has created a new era of office work. The majority of offices around the world are now filled with newly available technological advances; from personal computers to large network servers. Over the last decade there has been an increase among employers to monitor the actions and performance of their employees. This is due to worries about; quality of work, productivity employee theft or misuse of company property
One of the main ethical issues of the workplace is employee privacy and surveillance. Argument raised is: is it ethical to monitor employees whilst they are in the workplace? Is there privacy for employees and should employees expect Privacy at workplace?
Technology has offered various options to help people maintain privacy depending on their situation. At the same time, technology has made it almost impossible for anyone to have privacy. There are devices and programs that can help you get privacy but they can also be used to invade it. Modern society has too many incidences and events that include invasion of privacy, including on national and international levels. Is it possible to ever maintain a level of privacy when you are on the computer, your cellphone, or even in your own home due to technology advancements?
In this writing the prominent examples of surveillance at work that I would like to discuss about are surveillance cameras and internet surveillance.
Since this topic is based around privacy in the workplace, "privacy" is a key term to be explored. I will analyze the definition of “Privacy” term as well as the reality of using Surveillance today to illustrate for my opinion on this

Similar Documents

Premium Essay

Ethical Application of Biometrics

...order to safeguard and protect the privacies of technological users, technology has also adapted its growth to find better and more fail safe measures by which to guard the individual users. Having evolved from rudimentary passwords, to pin codes and card readers, to encrypted data relying on the application of the aforementioned safeguards, one of the newest and more failsafe applications to guard a person or companies privacy has become the application of biometrics. Biometric devices have helped institute a safeguard that, while not completely “hack proof,” is exponentially harder to replicate as it requires almost 100% reproduction on an individual’s personal body characteristics. Using a variety of biometric devices, a person or company can safeguard their privacies by relying on the one thing they think is immune to a host of scams to gain access – themselves. While the applications of such devices are gaining a stronger foothold among the masses, now enters an additional task to the workforce. Employers and individuals must ensure that they are using the technology practically, and ethically, in order to achieve maximum results without causing unintended harm. To better understand how to effectively utilize biometrics and biometric devices, we must first obtain a better understanding of what ethical dilemmas such usage can entail. “There are a number of ethical issues centering on biometrics, but those issues concerning privacy rights of individuals and personal...

Words: 921 - Pages: 4

Premium Essay

Disadvantages Of Information System

...a CBIS also uses ‘software’ which is sets of data and programs used to operate the computer. The two types of software is Systems Software, which controls the computers operations, and Application Software, which is specific to apps and documents inside the computer and allows you to control those functions.8 Databases, another component, are well-categorized bundles of data and information which can also be used by customers of the business to help provide neccessary information and to also gather more data, for example, a list of company transactions.9 Other components of CBIS include telecommunications, such as emailing and text messaging, which allows business to send data through networks,networks being the digital connection of techonology such as computers, cellphones, and any other equipment which use networks, to communicate internationally. The Internet, or World Wide Web, is the biggest network which is used to provide information a link to other networks.10 CBIS require people to help run and maintain the system, along with using the system to the best of its ability to produce valuable information which can be used by the company to help it grow and become more efficient and profitable.11 An example of who would use a CBIS would be the Chief Information Officer of a company who is directly incharge of managing the IS and the people who help to maintain, improve and use the system.12 When using a CBIS, there are procedures needed to ensure that you achieve the wanted...

Words: 996 - Pages: 4

Premium Essay

Interoperability

...Interoperability Sandra McKnight BSHS/375 April 17, 2015 Jacqueline Sommerville Technology has advanced over the past forty years. The changes have advanced from inoperable to interoperable. These advances in technology impacted human services in a very positive way. Through email, text messaging, face time or skype, human service workers can communicate in or out of the office. We will identify and describe services provided by mental health, discuss interoperability and human services, describe three modes of interoperability, describe how each model could be integrated into the organization, and possible back up plans should technology fail. Mental Health Provider and Services Provided The mental health organization provides services to adult, children, adolescents, and families as a unit. The service varies according to the need of the individual or family. A mental health provider may work in different settings, such as private practice, hospitals, community agencies, or other facilities. They include but not limited to: psychiatrist, psychologist, psychiatric mental health nurse, physician assistant, licensed clinical social worker, licensed professional counselor, or clergy. According to Mayo Clinic (Staff, 1998-2015), the psychiatrists diagnose and treat mental disorders, provide counseling, and provide medication to the client. The psychologist can diagnose and treat the disorder while providing counseling. They are unable to provide medication but can...

Words: 1409 - Pages: 6

Premium Essay

Telenursing

...Introduction Telenursing uses the technology for the nurses to do follow-up care with patients. The modern approach of follow-up care comforts the patient. Telenursing, the use of technology to allow nursing from a geographic distance, is used in many different settings including hospitals, home care, and other health related facilities. Telenursing is communicated via many different devices of technology. These are many different advantages in using telenursing rather than disadvantages. There are many different organizations involved in developing telenursing. Topic Availability This topic I chose was based on need of patient care. Our hospital is doing follow-up phone calls weekly to Congestive Heart Failure patients in order to reduce within thirty day of readmission. This phenomenon became interesting to understand how many places use tele communication. Doing the research, I discovered many different types of tele communications were available to community along with hospital setting. In searching for references, I started with wiki, google, scholarly journal, and blog but limited to scholarly journal only. As a professional nurse, I found that scholarly journal were more reliable and pertain to nursing. Also, scholarly journal talks about nursing informatics in how they use technology to assist in nursing care on continuum of patient care. The process used to locate source of information was Thomas Edison State College online library access. The keyword...

Words: 1405 - Pages: 6

Premium Essay

Mobile Computing and Social Networks Term Paper

...Mobile Computing and Social Networks. Abstract Mobile computing has rapidly evolved for the last two decades with the use of wireless technology making the location irrelevant and increasing the opportunities for business to streamline business processes, reduce operational processing times and provide better customer service. Mobile revolution has also forced many industries to reengineer their business processes to accommodate the many mobile devices. Mobile computing and social networks are part of the daily lives of millions of Americans. 42% of American adults own a mobile and tablet computing device. “Additional research shows that about three quarters of U.S. adults are online, with about 66% of them using social networking sites” (Brenner, 2012). Specific methods for how IT departments and mobile app developers and designers can decide on supporting different mobile platforms like the Apple iPhone, Apple iPad, Windows Phone, or Android supported smartphones and tablets will be discussed. Other topics addressed in this paper include the issue of “high availability” for mobile app users’ Based on these considerations organizations and businesses are nowadays focusing on the implementation of these applications, while replacing their desktop platforms to the mobile devices (Shih, et.al. n.d). “On the other hand, it is also observed that, these applications may also enhance various risks and vulnerabilities,...

Words: 4537 - Pages: 19

Premium Essay

Ebusiness Assignment

...eBusiness Assignment 1 eBusiness Development and Strategies Name | Maksis Rudovs | Class | BM | Exam No | 6506276P | Teacher | Marie Boner | Contents Methodology 3 Introduction 4 Current Developments in eBusiness 6 eBusiness Strategies 11 Conclusion 14 Recommendations 14 Refrences 14 Bibliography 14 Methodology Brief * Research the development of eBusiness to include emerging eBusiness technologies and applications. * Appraise the main eBusiness strategies and technologies in current use to include business to consumer, business to business and business to government markets. * Utilise a range of current eBusiness terms within the context of providing eBusiness solutions. Objectives * To define the terms eBusiness and eCommerce. * To talk about eBusiness types 1. Bricks and Clicks 2. Pureplay 3. Brick and Mortar * To discuss different eCommerce modules: 1. Business to Consumer 2. Business to Business 3. Business to Government * To investigate current developments of eBusiness including: 1. Web1,2,3 2. Mobile Technology 3. Social Media 4. Big Data, Data Mining, Data Warehousing, Data Analytics Research Design Scope and Limitations Action Plan Introduction This assignment is a report to gather information about eBusiness, eCommerce, current developments in the area and different types of Strategies in use. It is very popular nowadays to use the...

Words: 6150 - Pages: 25

Premium Essay

Case Study

...obr76817_ch01_002-044.indd Page 3 09/09/10 9:50 AM user-f501 CHAPTER 1 207/MHRL043/kno31619_disk1of1/0070131619/kno31619_pagefiles: Management Challenges Business Applications Module I Development Processes Information Technologies Foundation Concepts FOUNDATIONS OF INFORMATION SYSTEMS IN BUSINESS Ch apt er Highligh t s L ea r n i n g O bj ect i v e s Section I Foundation Concepts: Information Systems in Business 1. Understand the concept of a system and how it relates to information systems. 2. Explain why knowledge of information systems is important for business professionals, and identify five areas of information systems knowledge that they need. 3. Give examples to illustrate how the business applications of information systems can support a firm’s business processes, managerial decision making, and strategies for competitive advantage. 4. Provide examples of several major types of information systems from your experiences with business organizations in the real world. 5. Identify several challenges that a business manager might face in managing the successful and ethical development and use of information technology in a business. 6. Provide examples of the components of real world information systems. Illustrate that in an information system, people use hardware, software, data, and networks as resources to perform input, processing, output, storage, and control activities that transform data resources into information...

Words: 24619 - Pages: 99

Premium Essay

Unidentified

...Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K (Mark One) x ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended February 1, 2013 o TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to or Commission file number: 0-17017 Dell Inc. (Exact name of registrant as specified in its charter) Delaware 74-2487834 (State or other jurisdiction of (I.R.S. Employer Identification No.) incorporation or organization) One Dell Way, Round Rock, Texas 78682 (Address of principal executive offices) (Zip Code) Registrant’s telephone number, including area code: 1-800-289-3355 Securities registered pursuant to Section 12(b) of the Act: Title of each class Common Stock, par value $.01 per share Name of each exchange on which registered The NASDAQ Stock Market LLC (NASDAQ Global Select Market) Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes o No R Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act. Yes o No R Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities...

Words: 69050 - Pages: 277