Concerns on Privacy Issues in ICT
Globalization and advent of technological advancements have imposed various ethical concerns (Joinson, 2007). Privacy being of perennial usage often impacts the quality and quantity of data that is processed. Often corporations manipulate data by various tools on search engines, online social media though there has being a number of legislations to curb the same. Privacy on the internet ought to be provided as there are various personal private materials available. The scope of this essay argues the ethical concerns governing privacy issues in ICT. While ICT has provided humans with tremendous scope and rapid expansion of technology there are certain negatives to it as well. The rise in unethical usage of ICT for benefits and revenue generation scope for various companies has impacted serious norms and issues of users. There is an ethical concern as user has to often share their various personal details as well as information online such as to avail various conveniences (Fogel, 2009). Tomas Chamorro-Premuzic and Nathalie Nahai’s article, “Why we’re so hypocritical about online privacy” in Harvard Business Review dated 1st May 2017, discusses the relevant ethical concerns governing use of internet and social media (hbr.org, Retrieved on 13th May 2017). Such data is shared by the user for certain limited usage however, companies are using such data for their advanced analytics and interpretation systems. A user is hence not secure and protected. Kaveh Waddell in his article, “The Internet of Things Needs a Code of Ethics” dated 1st May 2017 discuss the need for evolving technology to adopt a moral and legal framework for managing it (theatlantic.com, Retreived in 13th May 2017). The scope of this essay argues and put across relevant concepts that can be used for understanding the relevant ethical concerns facing users across social media and internet usage.
There are several concerns encompassing issues arising out of imposing privacy on use of ICT (Information and communication technology). Privacy can be explained in a better way by Solove as “shade “for an extended and similar nature of work group. Privacy is combination of Body, Communication, Territory and information. Study released by Westin between 1978 and 2004 depicted that Press collects data and has rights to control such personal information under them and later can use it to publish as per requirement (Atzori, 2010). As per Westin’s “Privacy Index” creation people can be counted in one of 3 kinds as per their position as fundamentalist, Pragmatist and Unconcerned. Invasion of Upgraded and high internet technology has reduced the ratio of Unconcerned and become more aware to safeguard their privacy. The internet of things has high potential issue of privacy. Internet technology is now so advanced that it can hike data and information searched or downloaded or stored in any one’s personal system. Therefore, Ziegeldorf’s literature counts very known internet threats in Internet of Things. This adds threat of track individual people location called tracking via GPS, Smart phone locations and so on and so forth (Welbourne, 2009). Prevailing threat finds identifier through name and address which indicates greater concerns surrounding ethical usage of ICT. Press publish data and information publicly, so information accumulated of an individual or groups or any organization its becomes threat to privacy when it has been transferred or exchanged between software and press employees.
Solutions to Privacy Concerns
Profiling which is used by ecommerce for the purpose of advertisement. News reporters and media used cameras and phones to captures news on prompt sometimes, this creates threat for few innocent people as they forced them to erase data in front of them forcefully, but due to availing technology it can be restore and can use as unauthorized access later on, this can also be referred to as Linkage (Hann, 2007). Wright and Rag explains new products privacy principles to protect privacy which is based on international guidelines, like right to keep confidence of whereabouts of media people like few are into criminal press media and into field jobs.
Privacy preserving solutions introduced to help number of end users and even to privacy safety of service providers to media’s researchers have submitted various reports on this. Few tactics like Cryptographic techniques and information manipulation (Sheng, 2008). Privacy awareness which points mainly on devices used by individuals like smart phones, televisions, wearable devices for fitness, this can be restricted by they can only give access to their location if they want with activation of that application. Access control is same like encryption which defines as power to control own private data(CapBAC). Data minimization refers to internet service providers put band of personal information which is not relevant or not in connection with the press release work (Dwyer, 2007).
Method used by author Pickering and Byren to assess the limits of privacy which violates the rules of Internet. Their theory helps to recognize the websites use to collect data as for instance Papers which are printed was gathered from electronic database, like Google scholars, Science Direct and so on. Europe leads in literature study and publication for internet privacy along with other countries like Germany, America and so on and so forth (Smith, 2011).
Ethical analysis of internet privacy and security publish information technology which takes places in computer systems, smart phones and other new internet technologies. Internet technology privacy helps to provide protection against unapproved information, operations and so on (Angst, 2009). The main perspective behind internet security professionals is to keep private valued information and data to limited employee. As per reports and analysis by few authors’ ethics is mainly concerned with rights, harms and interest. Internet security conveys harm to press company by passing confidential information before its publication. It can also violates privacy rights, as in case a reporter gathers information on some issue and if it leaked by some internal employee and before this channel flash the news, other channel to whom this data passed will be the owner of such data (Buchanan, 2007). As per debate by Jeroen Van den Hoven access to information of other is not violation but it’s a right of people as it’s an essential resource to be successful in business field due to high competition in globalized world.
Ethical Analysis of Internet Privacy and Security
Internet security along with prevention can also cause harm and violates rights. Government has imposed many rules to gain internet security to control public for the betterment and safety of the country. Studies proposed by philosopher Helen Nissenbaum says that new techniques has been introduced for internet privacy due to constant concern for Country security (Son, 2008). His views are like cyber security helps to gain access to control and take measures for private information. As per author Tanvani tracking information and location of anyone is a crime. Application and privacy hacker cannot continue its action; internet security principles and notification can alert concerned people in some way and can be detained.
Computer and technology professional working for company’s or websites alert for virus information look after their responsibilities to protect company’s useful data’s from the leakage to other related jobs (Young, 2009). Privacy is utmost important not only to protect individuals from several threats but also from many other issues like harassments, blackmailing, theft and so on. Thus, there are various for arguments that support ethical causes in misusing of user information. As per primarily defended by American Judges Samuel Warren and Louis Brandies. Ferdinand Schoeman a well-known philosopher says that any person can assess to information of other as per permission granted (Debatin, 2009).
On the contrary, some researchers as well as senior members of leading organizations argue that corporations need to make use of such data and information to be able to provide services to users better. As rightly pointed out by Tomas Chamorro-Premuzic and Nathalie Nahai’s and Kaveh Waddell with rapid advancement of internet and technology a legal as well as moral framework has to be imposed. Companies while utilizing such information needs to provide a framework or a disclaimer that enables customers make utmost usage of the internet (Weber, 2010). Companies are using such information for their benefits which cannot be overlooked but such benefits can be further extended to customers by making good usage of data analytics. Through social media and other forms of tracking a company is able to provide better services and scope to customers such that they can also make extensive usage of internet and technology. While there is a growing concern over the ethical misuse of information and data in the internet government and private organizations needs to come together to establish a balance between the same for higher growth of the ecommerce market and user dependability.
Corporate and User Responsibilities in Privacy Issues
Recommendation and Conclusion
An individual, government or a body faces various ethical concerns while using of ICT. Various researchers are of the point of view that no such threats for users exists while transacting or using of social media but there is a contrary school of thought that aims to establish that users of internet does face pertinent threats form security hence there is an ethical concern governing the same. Government and several other bodies aims to cover such ethical issues that faces companies such that users can avail the internet and make full utilization from it. However as there are greater ethical concerns governing such usage users from their ends needs to be more careful and adopt strategies such that they are able to emerge as successful users without sharing of their information. Companies need to adopt corporate governance and ethical policies that prohibits them from hacking or unethical usage or publishing of such data. Once corporates adopt such norms and practices then there will be advanced usage and greater reliability regarding sharing of such information.
Reference Lists
Angst, C. M. (2009). Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion. . MIS quarterly, 339-370.
Atzori, L. I. (2010). The internet of things: A survey. . Computer networks, 2787-2805.
Buchanan, T. P. (2007). Development of measures of online privacy concern and protection for use on the Internet. . Journal of the American Society for Information Science and Technology, 157-165.
Debatin, B. L. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. . Journal of Computer?Mediated Communication, 83-108.
Dwyer, C. H. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. AMCIS 2007 proceedings, 339.
Fogel, J. &. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in human behavior, 153-160.
Hann, I. H. (2007). Overcoming online information privacy concerns: An information-processing theory approach. . Journal of Management Information Systems, 13-42.
hbr.org. (Retrieved on 13th May 2017). Ethics in internet. https://hbr.org/2017/05/why-were-so-hypocritical-about-online-privacy.
Joinson, A. N. (2007). Self-disclosure, privacy and the Internet. The Oxford handbook of Internet psychology, 237-252.
Sheng, H. N. (2008). An experimental study on ubiquitous commerce adoption: Impact of personalization and privacy concerns. Journal of the Association for Information Systems, 344.
Smith, H. J. (2011). Information privacy research: an interdisciplinary review. . MIS quarterly, 989-1016.
Son, J. Y. (2008). Internet users’ information privacy-protective responses: a taxonomy and a nomological model. . Mis Quarterly, 503-529.
theatlantic.com. (Retreived in 13th May 2017). Ethics in IoT. https://www.theatlantic.com/technology/archive/2017/05/internet-of-things-ethics/524802/.
Weber, R. H. (2010). Internet of Things–New security and privacy challenges. Computer law & security review, 23-30.
Welbourne, E. B. (2009). Building the internet of things using RFID: the RFID ecosystem experience. IEEE Internet Computing.
Young, A. L.-H. (2009). Information revelation and internet privacy concerns on social network sites: a case study of facebook. . In Proceedings of the fourth international conference on Communities and technologies. ACM , 265-274.