Premium Essay

The Value of Digital Privacy

In:

Submitted By moscote1
Words 1950
Pages 8
Assignment 2: The Value of Digital Privacy
Strayer University
Law, Ethics and Corporate Governance – LEG 500

1. List and describe at least three (3) technologies that allow an individual to research citizens’ private data.

Google Inc. offers what may be the largest and most used tool to search for information over the internet. Their mission statement says it best: “Google’s mission is to organize the world’s information and make it universally accessible and useful.” (Google, Inc., 2013). By typing any word or set of words into the search field, Google is able to bring together information about individuals, businesses; just about any subject imaginable. Google is increasingly used by employers to gather information about job applicants. Private individuals use it to find information about family members, friends, or complete strangers. Features like Google Earth can give you a bird’s-eye view of someone’s home by simply typing in an address, and Google Maps can take you straight to their front door. The global reach of Google

Online phone books and reverse directories such as White Pages provide a limited amount of information free of charge, but offer the opportunity to provide more information for a one-time or recurring fee. These directories normally display information such as current and past addresses, possibly phone numbers, age, and household members or relatives. These tools are useful for individuals who are simply looking for a little information with which to find someone, but, for the right price, could provide further information, such as email addresses, and criminal records (White Pages, 2013). Facebook may be the single largest repository of personal information in the world. Unlike other technologies that gather and share our information, with Facebook, we are willingly providing our information for

Similar Documents

Premium Essay

Value of Digital Privacy

...The Value of Digital Privacy in an Information Technology Age A weekend getaway in Vegas…$400, dinner at a fine restaurant…$200, digital privacy in the information technology age…PRICELESS. No value can be put on the importance of digital privacy in today’s world of the Internet. There are numerous technologies that allow individuals to research citizens’ private data. Websites such as Facebook, Intelius, and Spokeo allow for easy access to individuals’ personal information. Technologies That Allow Research of Private Data For today’s generation, Facebook has become as conventional as the telephone. You will not find many people functioning in today’s technological environment without a Facebook page. With so many people using the website, it has become a prime source in gathering personal data about individuals. So many users post personal information about where they work, what schools they attend, what vacations they’ve taken, the names/ages of theirs kids, and much more. And, of course, there are usually pictures to go along with all of the unsolicited information that’s posted. Social networking sites usually allow their users to join and host their information for free. These companies sometimes make their money by helping marketers to target advertising campaigns--a service for which advertisers pay tremendously. This creates profit for social networking companies as they provide a free service to users (Petryni, 2013). Intelius is one example of a people search...

Words: 979 - Pages: 4

Free Essay

Value of Digital Privacy

...Assignment 2: The Value of Digital Privacy in an Information Technology Age Since the personal computing revolution, popular entertainment has given us nightmare scenarios of computers and machines taking over the world or threatening our security. From War Games to The Matrix to the Terminator movies, each depiction has seemed like science-fiction at the time, but in the new digital age, they may be closer to reality than we care to admit. And while cyborgs from the future aren’t coming back to exterminate us or are we playing against a machine capable of setting off a doomsday attack, the implications of how much information is available about us on the World Wide Web can set off a personal doomsday. Ways to Find Data For many people with questions, the first step towards an answer is logging on to the popular search engine Google. Simply type in a subject and click the search button and users are provided with page after page of information. You can easily find that recipe you’ve been looking for, the latest news headlines or personal information on yourself or your family and friends. A Google search can provide background information, phone numbers, addresses, photos and even directions and maps to your address. The popular search engine also provides e-mail services and cloud-based storage for documents. And while these services are password protected, e-mails stored on Google’s server for more than 180 days can be turned over to governmental agencies without...

Words: 1248 - Pages: 5

Premium Essay

The Value of Digital Privacy in an Information Technology Age

...The Value of Digital Privacy in an Information Technology Age Diana Flynn Strayer University Professor James Merola April 30, 2012 1. List and describe at least three (3) technologies that allow an individual to research citizen’s private data. Intelius.com is a technology that helps people find family members, friends, classmates, military buddies and almost anyone living in the United States. It sells background information to anyone or anybody regardless of who you are. DateCheck is a site hosted by Intelius which stores reports including names, addresses, birth dates, court records, and cell phone numbers. People can access personal records by name, social security number or phone number through Intelius. The second technology is Google.com. If you are looking for information on someone, searching the web using Google is one of the best places to start. A person can find background information, phone numbers, addresses, maps and more. On the flip side, anyone can find the same information about you. Information is given by citizens opening up an account. It is the basic information such as name, address, phone, email or credit card number. Information is shared with companies, organizations, and in individuals outside of Google with consent. Data searched on the web is stored to improve and maintain the security of their systems. Government agencies request information from...

Words: 1451 - Pages: 6

Premium Essay

Assignment 2: the Value of Digital Privacy in an Information Technology Age

...Assignment 2: The Value of Digital Privacy in an Information Technology Age Professor Weekley Law, Ethics and Corporate Governance May 5, 2013 There are many reasons you may want to get someone’s personal information, maybe you just need their address to send a card, but there are many people who have access to citizen’s private data with the click of a button. Your information can be searched for by anybody for any reason, and there are companies out there willing to help for a fee. The fourth amendment states, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated” (Halburt/Ingulli 2012). This law keeps people safe from searches for absolutely no reason, but the same protection does not expand to the internet, where these searches happen every day. There are a few ways of obtaining information about someone, and all you need to do is pay a small fee then you can have access to their address, phone number, criminal record and much more. You should only be able to get a background check on a person if you are a potential employer and after the person has signed a waiver. One such site offering these services is Spokeo.com. For $39.95 I can get the following information about anyone: Full Name, Photos & Profiles, Address, Property Records, Phone Number, Public Records, Relatives, Court Records, Month/Year of Birth, Sex Offender Check, Address History, and Criminal Check....

Words: 1128 - Pages: 5

Premium Essay

The Value of Digital Privacy in an Information Technology Age Brenda Steen Strayer University Leg/500 December 19, 2012 Professor: Dr. Pino the Following Assignment Contains Information Regarding Individual

...The following assignment contains information regarding individual privacy in this age of information technology. On today’s vast information superhighway, private information can be found on most individuals within a couple of clicks of a computer mouse. This assignment will describe a minimum of three technologies that allow people to research the private information of citizens. This report provides and analysis of the advantages and disadvantages of having this information made public. Additionally, this report includes options individuals have to protect their private information. Last, this report discusses the existence and effectiveness of electronic privacy laws enacted to protect private information. Google is probably the most used search engine on the internet. It is usually the first step used to research private information. Google collects all available private information and conveniently places it at a researcher’s fingertips. Such information as address, telephone numbers, pictures and work history is available on Google. Facebook is another popular website people use to obtain private information. Researchers can gain information such as posted pictures, family/friend information, and place of employment. Researchers can also find out recreational information such as local establishments a person frequents or when he or she is on vacation. Many states use have county property tax websites. A researcher can simply type in a person’s name and find...

Words: 951 - Pages: 4

Premium Essay

Digital Privacy

...The Value of Digital Privacy in the IT Age The Value of Digital Privacy in the IT Age Digital Privacy in the IT age is almost extinct. The World Wide Web houses information about anything and everyone. People use the digital technology everyday with the impression that what they are doing is protected from others, unless they chose. While few consumers are fully aware of how their data is being used and even fewer are capable of actively managing it, most individuals expect their digital identity to be treated responsibly and openly: 79%, for example, said companies should be more transparent about use of personal data. There are systems and technologies that people use to gain access to a person’s information. The information obtained can be an advantage or disadvantage. The government has implemented laws for years to try to establish some controls There are many technologies that will allow an individual to research citizens, but the three that will be discussed are Facebook, Intellus, and Google. Facebook is a web based social app use to contact friends. A person can either download for free or buy “apps” for a small amount of money. Apps are games, quizzes and sharing services. These “apps” are consists a host of personal information which includes emails, current locations, sexual preferences of “app” users and their friends. Intelius allows people to access personal records by name, social security number or phone number. People use this system to find family or do...

Words: 963 - Pages: 4

Free Essay

Management Info Systems Ethics Hw

...help define the solution. Second, you must define the conflict and identify the higher-order values involved. This is because the parties usually claim during a dispute they are all pursuing higher values. Third, stakeholders should be identified so you can figure out what they want, which might also be used later when figuring out a solution. Fourth, you must identify the options that you can reasonably take, even though this may not satisfy all the stakeholders. Finally, you must identify the potential consequences of your actions. This would include looking at the consequences from various points of views. There are also six ethical principles that can be used to help. One principle is called the Golden Rule, which is to do unto others as you would have them do unto you. Another principle is Descartes’ Rule of Change. This principle states that if an action cannot be taken repeatedly, it is not right to take at all. Another principle would be the Risk Aversion Principle. This one says you should take the action that produces the least harm or least potential cost. There is also Immanuel Kant’s Categorical Imperative, which first has you evaluate the action. If the action is not right for everyone to take, then it is not the right one to take at all. Another principle would be the Utilitarian Principle, which says that one should do the action that achieves the higher or greater value. Finally, there is the Ethical “no free lunch” Rule. This principle says that you should assume...

Words: 1596 - Pages: 7

Premium Essay

Project 1 - Ccjs 321 Digital Forensics

...INCIDENT rEPORT CCJS 321 – Digital Forensics | Stan Vos Date of submission: FEB 5, 2016 | INCIDENT rEPORT CCJS 321 – Digital Forensics | Stan Vos Date of submission: FEB 5, 2016 | Project 1 - CCJS 321 Digital Forensics For the purposes of this project, imagine you are an Information Security (InfoSec) Specialist, an employee of the Makestuff Company, assigned to the company’s Incident Response Team. In this case, you have been notified by Mr. Hirum Andfirum, Human Resources Director for the Makestuff Company, that the company has just terminated Mr. Got Yourprop, a former engineer in the company’s New Products Division, for cause.  Mr. Andfirum tells you that at Mr. Yourprop’s exit interview earlier that day, the terminated employee made several statements to the effect of “it is okay because I have a new job already and they were VERY happy to have me come from Makestuff, with ALL I have to offer.”  Mr. Yourprop’s statements made Mr. Andfirum fear he might be taking Makestuff’s intellectual property with him to his new employer (undoubtedly a Makestuff competitor).  In particular, Mr. Andfirum is worried about the loss of the source code for “Product X,” which the company is counting on to earn millions in revenue over the next three years.  Mr. Andfirum provides you a copy of the source code to use in your investigation.  Lastly, Mr. Andfirum tells you to remember that the Company wants to retain the option to refer the investigation to law enforcement in...

Words: 1700 - Pages: 7

Free Essay

Information System Ethics Notes

...wrong that individuals use to make choices to guide their behaviour. IS creates opportunities for intense social change, threatening existing distributions of power, money, rights and obligations. * Internet and digital firm techs make it easier to assemble, integrate and distribute info, unleashing new concerns about appropriate use of customer info, protection of personal privacy and protection of intellectual property * Other issues: establishing accountability, setting standards to safeguard system quality, and preserving values and institutions * 5 moral dimensions of the info age * Info rights and obligations individuals/firms possess in respect to themselves * Privacy – Claim of individuals to be left alone, free from surveillance/interference from other individuals, organizations, or the state; claim to be able to control info about yourself * Privacy in public spaces * Data storage & exchange * Laws & expectations in US Vs. EU & Australia * Protecting traditional intellectual property rights in digital society * Who is held accountable and liable for harm done to info and property rights * System quality: standards of data and system quality to protect individual rights * Quality of life: preservation of values in an info and knowledge based society * 4 technological trends of concern * Computing power doubles every 18 months Increased reliance on, and vulnerability to, computer sys * Data storage costs rapidly...

Words: 983 - Pages: 4

Premium Essay

Internet Challenges to Security and Privacy

...ASSIGNMENT ON TERM PAPPER INTERNET CHALLENGES TO SECURITY AND PRIVACY SUBMITTED BY : GIFTY KARUVELIL SAM ID NUMBER: 0160011 SUBMITTED TO : PROFESSOR . JOYCE JAMES MG. 650: MANAGING INFORMATION TECHNOLOGY ACROSS THE ENTERPRISE TABLE OF CONTENT : * INTRODUCTION * ANALYSIS OF SECURITY AND PRIVACY * CATEGORIZATION AND SESITIVITY * STATE OF RESEARCH * MAJOR PLAYERS I THE INTERNET * GLOBAL SENSOR NETWORK MIDDLEWEAR * RFID * PHYSICAL MECHANISM * CRYPTOGRAPHIC PROTOCOLS * RESEARCH FROM OTHER DOMAINS * INFORMATION ACCOUNTABIILITY * CRYPTOGRAPHIC IDENTIFIERS * KEY EXTRACTION FROM WIRELES CHANNL CHARACTERISTECS * CONCLUSION 1 1 Introduction The Internet has undergone severe changes since its first launch in the late 1960s as an outcome of the ARPANET. The initial four-node network has quickly grown into a highly interconnected and self-organized network that builds the daily basis for business, research, and economy. The number of people using this worldwide network has exponentially grown up to about 1.5 bn and hereby makes up about 20% of the world population. This sheer number of end...

Words: 4680 - Pages: 19

Premium Essay

Marketing Plan

...Marketing Strategy 7 Value Proposition 7 Segmentation 7 Targeting 7 Positioning 8 Actions 9 Website 9 Outbound Media Messaging 9 Social Media Promotion 9 Specific Initiatives 9 Budgets, Assumptions, & Risks 10 Controls 11 Appendices 12 References 14 Introduction The Marketing Plan to launch the new Gerrarrom service to new users, is summarised below for January to June 2014. UK based early adopter academics at three specific universities, fit the high knowledge, heavy digital usage profile most likely to value a cutting edge internet experience given their collaborative digital enterprise, and likelihood to rapidly grow usage. Viral marketing is used to secure digital word-of-mouth recommendations from the targeted influencers by competing for attention, referals, and useage activity. The service is positioned for digitally productive academics needing a superior layer of compartmentalised internet, a less intrusive interface and an evolved content feed that provides the one stop shop for all public and private Social Media (SM) productivity. The plan covers the logical flow of considerations, goals and actions defined by Armstrong and Kotler (2012), for creation, definition and communication of value to the target segment. Marketing Situation Gerraroom will drive adoption via unforeseen modes of web interaction but launches to existing SM users, so current and evolved trends are relevant. Mckinsey's Digital Economy report (2012)...

Words: 3010 - Pages: 13

Premium Essay

Dols of Mattel - Challenges on the Global Markets

...Mattel ­ Case Study ­ Dolls facing new challenges on the global market I. Executive Summary Mattel produces and sells various toys around the world and among these Barbie fashion doll is the flagship. This product was criticized from more aspects from other cultures of Aisa where the lifestyle Barbie represents is not commonly accepted. On the other hand privacy issues were raised by parents regarding the digital marketing activity of Mattel, as rights of children are related in this market. Mattel needs to consider whether these challenges are related specifically to the lifestyle Barbie represents, whether the lifecycle of Barbie can be expanded in a changing global environment. Or the issues are the signs of a general change regarding toys marketed internationally and also digitally. I came to the conclusion that Mattel needs to introduce a new doll which fits the new expectations. II. Problem/Issue Statement Mattel is the No 1. toy producer in the world, in terms of Sale. Their products with the strongest market presence are based on the concept of dolls / collectibles, where these characters are supported with background story, additional gadgets, additional releases of attached tools. The flagship brand of the company is the fashion Barbie doll, which was 50 years old in 2009. Barbie represents an independent, young American girl and as a fashion doll it acted in different professions and situations during the years. Thanks to this concept the lifecycle of the brand could been expanded on...

Words: 2127 - Pages: 9

Premium Essay

Big Brother Is Watching

...Information Privacy is a somewhat fresh concept. It is considered the third—and newest— layer controlled through digital technology (Anita Beveridge, 2014). Privacy is important in one’s personal and professional life. My definition of privacy is something that belongs to an individual person such as my personal information, things that I purchased myself, something that I have the right to that no one else does without my permission. According to Merriam Webster dictionary privacy is defined, “as the quality or state of being apart from company or observation” and/or “freedom from unauthorized intrusion.” The concept of information privacy has become more important as more systems controlling more information appear. It was suggested in about 1986 that information systems would increase privacy concerns (Bélanger, 2014), in present time this proves have been an accurate prediction. Information systems can develop the world with amplified access to information which includes communication and better productivity of large systems. We can enhance our lives with the usage of technology. With this same technology privacy can be destroyed and economies can be harmed by unethical acts such as cyber-attacks. The need to observe the go-ahead between information-sharing efforts and privacy and civil liberties is only likely to raise more pressing as the nature of the threats facing the United States shifts (Nelson, 2014). As technology continues to develop new ways to gather...

Words: 1769 - Pages: 8

Free Essay

Digital Marketing

...The Survey of Digital Technology and Internet Use measures the adoption and use of various digital technologies, including the Internet.  The use of the Internet and digital technology has become pervasive in today's society. Like electricity, the Internet has become so ingrained in the way that business operates, it can be considered a General Purpose Technology (GPT) because it affects the way the entire economy functions. The use of digital technologies and electronic commerce, while of great potential, also pose numerous challenges to both businesses and policy makers. In order to understand the effects and impacts of these technologies, it is essential to first understand who is using them and how.  The data from this survey are used by businesses and policy makers to monitor the uptake and adoption patterns of Information and Communication Technologies (ICTs) and assess their impact on the economy. Results are also monitored by international organizations such as the Organization for Economic Co-operation and Development (OECD) for benchmarking purposes and to study the development and the influence of the digital economy. Statistical activity Science and technology (S&T) and the information society are changing the way we live, learn and work. The concepts are closely intertwined: science generates new understanding of the way the world works, technology applies it to develop innovative products and services and the information society is one of the results...

Words: 3974 - Pages: 16

Premium Essay

Pros And Cons Of A Cashless Society

...the main arguments against the establishment of a cashless society and demonstrate how they are neglectable. Author, advisor and commentator on digital financial services, David Birch has classified these arguments in his book “Before Babylon, Beyond Bitcoin: From money we understand to money that understands us” (London Publishing Partnership: June 2017). They are: conservatism, demographics, seigniorage, security and privacy. 1.4.1 Conservatism It is argued that every person has an innate sense of conservatism, a risk-averse attitude towards innovations, and anchors himself to traditional value. This is what brings some persons to think there...

Words: 1667 - Pages: 7