Privacy-related matrix

Assignment Help Basic Computer Science
Reference no: EM13837188

Privacy-Related Matrix

Ethical Dilemma: Locational Privacy and User Privacy Policy

 Stakeholders

Confidentiality

Non-Maleficence

Publicity

1.      You

I have the duty to respect the privacy of information and actions of others.

I have the duty to cause no harm, both individually and for all.

I have the duty to take actions based on ethical standards that must be known and recognized.

2.      Other Users

Only those I chose to allow to view my profile information on Facebookhave the duty to repect my privacy of information and safeguard their own actions.

Only those I allow have the duty to cause harm, both to my information, my person, or their person or information.

Others have the same duty as I have. Based on the fourth amendment of the Bill of Rights and based on known ethical standards and norms that society deems reasonable.

3.      Facebook

The site is limited by law. (Epic.org, 2015)

Facebook should cause harm both to the individual whom uses their site, and to repect their privacy of information, not togive it out to third parties for advertising marketing.

The publicity that Facebook gets should be for their company's recognition, not for the users of their  site.

Why I chose this Dilemma

I chose this dilemma because I detest being tracked in any manner whatsoever. Individuals and the public in general, when moving about in public or private spaces, do not to be tracked where ever they go, not for one hour or 24 hours, seven days a week. (Epic.org, 2015) However with the increasing usage of smartphones with their location storage and tracking ability throughout any given day and time, has significant implications for individuals and for their constitutional privacy rights suck as the cases, Jones and Riley v. California..

Why I chose the Three Principles of Confidentiality, Non-Maleficence, and Publicity

I chose confidentiality based on the personal belief that as a American citizen, whom I chose to let into my public world on the Facebook site is my own public and private right as an individual. Those whom I let into this world should respect my information as their ethical duty as I would their information privacy. There is no fail-safe proof method to know that are not respecting my information privacy.

I chose non-maleficence based on my personal belief that I wish no harm to come to myself or others by using the site of Facebook, or if my chance I come into contact by whom I let into my Facebook world, or by the company itself, such as damaging my reputation or livelihood or those of others.

I chose publicity on my personal belief that any publicity that I received or that of others received should be due to their own merits and not those of the Facebook site.

Facebook has modified its User Privacy Policy to allow advertisers to include a "buy" buttondirectly on targeted advertisements on a user's page. Facebook also allows these advertisers to use the location data gathered from tools on the site such as "Nearby Friends" and location "check-ins" to push geological-based targeted advertisements. (Epic.org, 2015) I personally think this is in direct violation of our fourth amendment right decreed by the Bill of Rights backed up by the Constitution of the United States.If Facebook continues this practice all three principles will become to be inside jokes with in the Facebook company itself, and in time, all the users of the Facebook site.

REFERENCES:

Epicorg. (2015). United States v Jones. Retrieved 5 September, 2015, from https://epic.org/amicus/jones/

In-text citation: (Epicorg, 2015)

Epicorg. (2015). Facebook Privacy. Retrieved 5 September, 2015, from https://epic.org/privacy/facebook/

Requirement:

Write an organizational policy to address the IT-related ethical workforce privacy issue that ... Your policy should include the following major headings: a) Overview of policy b) Purpose c) Scope (roles and responsibilities of stakeholders) d) Policy/Procedures to follow e) Sanctions/Enforcement

Reference no: EM13837188

Questions Cloud

Explain what information you learned from given article : Lower Of Cost Or Market Inventory Valuation: IFRS Versus US GAAP- Read the attached article (provided as attachment 1 named art 1) and explain what information you learned from this article
Explain the importance of a csr program for an organization : Explain the importance of a CSR program for an organization
Explain briefly what is bad strategy : Explain briefly what is bad strategy
What will be the rate of unemployment next year : The unemployment rate in the U.S is currently 5.6%. If the unemployment rate in March 2016 is 5.0%, what will be the rate of GDP growth according to Okun's law? Suppose GDP growth this year is 2%, what will be the rate of unemployment next year?
Privacy-related matrix : Privacy-Related Matrix-Ethical Dilemma: Locational Privacy and User Privacy Policy
Factor of production in perfectly competitive market : In a perfectly competitive factor market, a firm finds that the marginal factor cost of a factor of production is: The price paid by a firm for a factor of production in a perfectly competitive market:
Unrestrained expansion of a fluid : Which of the following causes a system to be irreversible? All of the other choices Mixing two different substances
Increase in value that future consumers-exhaustible resource : If the interest rate rises, the owners of oil will supply ________ oil today and conserve ________ for the future. An increase in the value that future consumers are expected to place on an exhaustible resource ________ the marginal cost of extractio..
A reasonable number of significant digits : Suggest a reasonable number of significant digits for reporting the following common values and give some indication as to your reasoning: a. Your body weight for a passport b. A car's fuel usage (use liters per 100 km) Strain gauge Eo Excitation vol..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Draw the hieararchy chart and then plan the logice program

draw the hieararchy chart and then plan the logice for a program that calculates a person's body mass index BMI. BMI is a statistical measure that compares the person's weight and height.

  Write a program that computes the area of trapezoid

Write a program that computes the area of Trapezoid. Unknown values should be input by user.

  Maximum speedup-achieved by pipeline over non-pipelined unit

Non-pipelined system takes 200ns to process task. Determine the maximum speedup that could be achieved with pipeline unit over the non-pipelined unit?

  Macro running in response to form button

All of the following are events except: a macro running in response to a form button being clicked, changing the data in a cell, clicking on a control button or opening or closing an Excel workbook.

  Discussion focuses on optimization

Discussion focuses on optimization

  Calculate the first n amount of terms of following sequence

if given x0=5, x1=2 and xi=(2xi-1+ 2xi-2) use c++ to calculate the first n amount of terms of this sequence. Using only recursion

  Final project plan

Final Project Plan

  What planning methods would you use to develop business

What planning methods would you use to develop business

  What is the time complexity of the better method

Modern object-oriented software makes extensive use of the malloc and free operations. Unfortunately, they are generally quite expensive (in time) and thus efficient routines are important.

  Technology aided in the evolution of instrument

Identify one musical instrument that has evolved over the centuries (e.g., the piano or guitar) so that you can enlighten us about the evolution of this instrument.

  What is the effective throughput of this lan?

Consider a 20,000,000-character message to be transmitted between two stations that are 150 meters apart, using a 10BaseTX LAN with a transmission speed of 50 meters per microsecond

  Newly released vulnerabilities on a daily basis

The world has to deal with newly released vulnerabilities on a daily basis.  These vulnerabilities eventually lead to active exploits of systems, and it is our job as cyber security professionals to stop that from happening.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd