How would an individual privacy rights be violated

Assignment Help Management Information Sys
Reference no: EM131195306

For this assignment you will be writing a critical analysis on the topic of the privacy concerns surrounding "Facial Recognition Technology". Your analysis should focus on following:

Identify and summarize what Facial Recognition Technology is currently used for in government and businesses.

Critics of Facial Recognition Technology which includes The American Civil Liberties Union (Links to an external site - https://www.aclu.org/.), ACLU. The ACLU is criticizing state governments such as Ohio who are implementing the system. What is the ACLU concerned about with regards to certain abuses by the government?

How would an individual's privacy rights be violated if Facial Recognition Technology is used by businesses?

How could businesses abuse this technology in advertising campaigns?

Who are the advocates of this technology and what is their argument regarding potential privacy violations?

As a future IT manager, imagine that you are being pressured by your company to implement Facial Recognition Technology. You are aware that the general public is not aware of the potential privacy issues. How would you handle this situation?

You should provide at least three resources for this analysis. You are welcome to use online resources except for Wikipedia or any other open source resource. Be sure to use proper grammar, spelling and APA citation for this assignment. Use 12 point Times New Roman font and double space your paper. You should have approximately 3 - 4 pages for this particular assignment.

Reference no: EM131195306

Questions Cloud

Contingent valuation is used to estimate : Contingent valuation is used to estimate the a. perceived valuation or existence value of environmental goods. b. cost of the closest alternative program for achieving the public goal. c. value of economic losses in an environmental disaster. d. bene..
Highlight the key programming techniques : At a minimum, post at least three notes that highlight the key programming techniques and/or problems or lessons learned that you experienced with this week's lab.
Assigning distributional weights to different social groups : In assigning distributional weights to different social groups
How long would it take to fill up : If the town of Chapel Hill used the Smith Center as a refuse disposal site, how long would it take to fill up? Make all necessary assumptions.
How would an individual privacy rights be violated : As a future IT manager, imagine that you are being pressured by your company to implement Facial Recognition Technology. You are aware that the general public is not aware of the potential privacy issues. How would you handle this situation?
Discuss the deployment services situations : Please briefly discuss the deployment services situations; what initial facts would best determine what situation should be used? If you were deploying on 150 computers, which would you use? Please give a detailed explanation of everything you wou..
Project that incurs costs in early years and yields benefits : A project that incurs costs in early years and yields benefits in later years has been estimated to have costs just equal to benefits, in present value terms and ignoring risk factors. The project would be reevaluated as having greater benefits than ..
Desirability of proposed government programs : It is often difficult to agree on the desirability of proposed government programs because of different perspectives regarding:
What type of expressions should such a function expect : How many and what type of expressions should such a function expect, to be able to return such an area? Decide on a good, descriptive name for this function, and write an appropriate signature comment for this function.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe the different identification methods

Describe the different identification methods that organizations can use to identify their employees and to grant access to the organizational infrastructure.Format your paper using APA style.

  Determine a significant force that would have most impact

Determine a significant force that would have the most impact on the decision to implement HMIS. Justify your response

  Draw data flow diagrams from the given situation

Blue Skies Airline, Drawing data flow diagrams from the given situation - Please draw the data flow diagram by hand and document all the components. (external entities, data stores, processes, and data flows) in the DFDs.

  What differentiates a hispanic consumer from others

What differentiates a Hispanic consumer from others? What do they value? How do they like to interact with businesses (what medium)? What is the role of language and culture among the Latino target customer

  Summarize an ethical code of conduct in information security

Summarize an Ethical code of conduct in information security

  Calculate the expected savings the company may expect

Calculate the expected savings the company may expect for the first five (5) years, assuming cost per user remained the same and the number of users remained constant at 1,500 users

  Is the policy easy to read and understand

Compare and contrast the two policies. For example, one may have a very in-depth acceptable use section while the other one may be lax. You don't have to compare every section, just pick a few to get a good understanding of where one may be lackin..

  Informatics securitywho should be responsible for security

informatics securitywho should be responsible for security the government or individuals? why do you think that? defend

  What were the main causes of the difficulties with project

What were the main causes of the difficulties with the project at Aux Bons Soins and What were the key elements that led to the success of the project at Aux Bons Soins

  What approaches can be used to reconcile disparate principle

What approaches can be used to reconcile the disparate principles of the schools? Assess the significance of information management to corporate performance management.

  Feinstein inc an appliance manufacturer is developing a new

feinstein inc. an appliance manufacturer is developing a new line of ovens that uses controlled-laser technology. the

  Identify an appropriate purpose for the presentation

Identify an appropriate purpose for the presentation. Identify an appropriate audience for the presentation. Explain the significance of the chosen topic

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd