How protected is your online privacy

Assignment Help Management Theories
Reference no: EM131682103

Case: How Protected Is Your Online Privacy?

"Solitude and privacy have become more essential to the individual; but modern enterprise and invention have, through invasions upon personal privacy, subjected [individuals] to mental pain and distress. In this, as in other branches of commerce, the supply creates demand." This quotation appeared in the Harvard Law Review . Besides the sobering sentiment expressed, the more startling fact is that it was written in 1890, more than 120 years ago! Technology, whether it is in the 1890s or 2010s, can violate our sense of privacy as individuals. Consider these examples:

• Malicious programs launched by hackers spread through Facebook and Twitter accounts in 2009, taking over people's accounts and sending out messages to the users' friends and followers. One user found out five days later that his account had been sending out lingerie ads to all of his professional acquaintances.

• When Google introduced Buzz, its answer to Facebook and Twitter, in 2010, users found themselves with an instant, and in many cases unwelcome, collection of "friends," automatically selected by Google from their e-mail contact lists. The users complained that their e-mail information contained names of personal physicians and illicit lovers, as well as the identities of whistle-blowers and antigovernment activists, most of whom would not want their identities made available to these "friends."

• In 2010, a Wall Street Journal investigation discovered that Facebook regularly transmitted identifying information-providing access to peoples' names and in some cases their friends' names-to dozens of advertising and Internet tracking companies. These firms used the information to build user profiles to market new apps or games. The use of apps was a growing source of revenue for Facebook since it sold virtual currency that could be used to pay for games. This activity affected tens of millions of Facebook users, including people who set their profiles to Facebook's strictest privacy settings.

• The Wall Street Journal probe revealed that MySpace also had been transmitting information to advertising companies that could be used to identify users. Users' information was sent, without their knowledge, once they clicked on ads on the MySpace website. At that time, MySpace had 58 million visitors monthly in the United States. As this epidemic of privacy violations became public, many organizations, including the social network companies and the U.S. government, pledged to correct the situation. Some businesses, such as Microsoft and McAfee, saw this situation as an opportunity to offer online consumers software to protect them from online monitoring. Other companies offered users a commission every time their personal details were shared with marketing companies. "Data is a new form of currency," said a technology executive. The reasoning seemed to be that if the online advertising industry was bringing in $26 billion a year in sales from accessing this information, the consumers should share in the profits. Apple, Facebook, and Google also took the offensive and created plans to better protect their customers. In 2011, Apple announced it would no longer automatically track an iPhone's location, but download a subset, or cache, of the database from each phone.

This limited access to data prohibited Apple from locating the user who was using WiFi or a cell phone. While Apple needed to track its users to provide better service-for example, to identifying WiFi hotspots and cell towers-the new software would reduce the size of the database cached on the phone, cease backing up the cache, and delete the cache entirely when the location tracking feature was turned off. Facebook acknowledged the security vulnerabilities found in the Wall Street Journal investigation and reported that they had addressed the problem in 2011. "We've conducted a thorough investigation, which revealed no evidence of this issue resulting in user's private information being shared with unauthorized third parties," the company stated. "[Facebook has a] strong policy enforcement and technical measures that allow us to quickly catch and take action against suspicious behavior on the platform." Google also was caught up in the Wall Street Journal investigation. It had allegedly used a special computer code that tricked the Safari web-browsing software to allow Google to monitor users' activities. Safari was designed to block such tracking by default. Google reported in 2012 that it had disabled its code after being contacted by the Wall Street Journal, although the company maintained that "The [Wall Street] Journal [investigation] mischaracterize[d] what happened and why."

Finally, legislators also took action. Senators John Kerry and John McCain introduced a "privacy bill of rights," which included a "do not track" provision patterned after the "do not call" law that allowed people to block telemarketing calls to their phone. The proposed law would impose strict rules on companies that gather personal data, including requiring that people be given the right to access data collected about them and to block the information from being used or distributed. Although the Internet industry had resisted legislative controls for more than a year, a coalition of Internet giants joined the White House in support of the Kerry-McCain "do not track" provision. This provision allowed for a button to be embedded in most web browsers to give people greater control over the personal data collected about them. Yet, some experts questioned whether these measures would be enough. They pointed to powerful new methods of tracking, such as ones found on MSN.com and Hulu.com, that were almost impossible for computer users to detect. These new techniques were called "super cookies." These super cookies were similar to a traditional cookie, a small file routinely installed on users' computers to track their activities online, but were capable of recreating users' profiles after people deleted regular cookies.

Discussion Questions

1. How much privacy should people expect when using a social networking site or going online for information, shopping, or other tasks?

2. Who should be responsible for protecting Internet users' personal information? In your response, please address the appropriate role of the government, business, and individuals.

3. Should consumers share in the revenue generated from sales created by accessing the personal information from social networking and other Internet sites?

4. Do you believe there is a conflict between the economic interests of companies such as Facebook, MySpace, or Google, and their obligation to protect the personal information of their users? If you were an executive of one of these companies, how would you resolve that conflict?

Reference no: EM131682103

Questions Cloud

Identify sources and locations of groundwater : the hydrologic cycle, identify sources and locations of groundwater
Bankrupt home builder paid off the builder debts : The trustee for a bankrupt home builder paid off the builder's debts at the rate of 42 cents on the dollar.
Calculate the excess burden of the tax : Calculate the excess burden of the tax, assuming that automobiles are sold in perfectly competitive markets.
Make recommendations on how to improve its operations : As a management consultant to a public organization you have been requested to make recommendations on how to improve its operations.
How protected is your online privacy : "Solitude and privacy have become more essential to the individual; but modern enterprise and invention have, through invasions upon personal privacy.
Determine the cost of water per thousand gallons of water : Determine the cost of water per thousand gallons of water. Calculate the cost of the drip per year from the information you have
Happening with convenience products : Would you see this happening with convenience products?
Normative and descriptive ethics : Discuss the differences between normative and descriptive ethics
Making reference to the amended hague visby rules : Advise the carrier of its liability to the various shippers, making reference to the amended Hague Visby Rules.

Reviews

Write a Review

Management Theories Questions & Answers

  Learning in action

Learning contract proposal that will form the basis of your learning contract report.

  Change is the only constant

"Change is the only constant " Evaluate the different types of change that have occurred in Sony.

  How do advertisers try to use group influence

How do advertisers try to use group influence?  Will you find any specific examples and explain the relevant theory of group behavior and influence?

  Case study:saving sony

You have been appointed by Sony as a consultant on change management. Advise Sony on how they could implement the change by using the various theories of change you have learnt.

  How the stock market works

The purpose of this project is to help you to gain an understanding of how the stock market works and of the relationship between theory and practice.

  Find the optimal production quantities

Find not only the optimal production quantities, but also the optimal total cost.

  Describe the management process

Describe the management process and identify the skills required to manage business organizations.

  Case study : bert''s bonsai and aquatic sport museum

Case Study : Bert's Bonsai and Aquatic Sport Museum Prepare a knowledge management system.

  Knowledge management techniques

Demonstrate understanding of the many-sided nature of knowledge management

  Theory of transtheoretical model

Demonstrate understanding of the many-sided nature of knowledge management

  Write a paper on historical trends of management

Write a paper on Historical Trends of Management.

  Theory of reasoned action

Theory of Planned Behavior and Integrated Behaviors Model

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd