StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Ethical Framework: Computerized Invasion of Privacy - Essay Example

Cite this document
Summary
This research will be used to substantiate the need for an ethical framework in regards to the specific area of computerized invasion of privacy and the legal ramifications of this. Through literary means, this paper sets out to implement and develop this idea for improved ethics in computer technology with regard to individual privacy…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful
Ethical Framework: Computerized Invasion of Privacy
Read Text Preview

Extract of sample "Ethical Framework: Computerized Invasion of Privacy"

Running Head: Ethical Framework: Computerized Invasion of Privacy Ethical Framework: Computerized Invasion of Privacy Goes Here Institutional Affiliation Goes HereAbstractThis research will be used to substantiate the need for an ethical framework in regards to the specific area of computerized invasion of privacy and the legal ramifications of this. Through literary means, this paper sets out to implement and develop this idea for improved ethics in computer technology with regard to individual privacy.

This is in relation to the need for individuals, using the net to surf or other computer programs online to still feel they have a complete right to privacy.Running Head: Ethical framework: Computerized invasion of privacyIn order to develop a proper and concise ethical framework for information technology, there must be clarity to the morals, main aspects, and concerns of the implied whole structure of computer privacy. What needs to be specifically addressed is the right to individual privacy in computer technology.

Every human being is entitled to be assured their personal information is safe and solely confidential, at all times on the internet. Furthermore there are many bills that have been passed and laws made (old and new) to assist in the efforts to make sure these ethical concerns stay steered on the correct path but sometimes issues do arise ( "Using Global Liberty Campaign" 2005). 1There must also always be acknowledgement with regard to the rights of an individuals' personal history. What must be understood is the fact that no one's identifiable history can legally be passed through the net without consent from that specific individual.

This must come as either a hand signed statement or it can also be verbal approval or an electronic signature but it must always be one out of those three. As long as these steps are taken then there would not be a reason for a feeling of deception or of having an invasion of privacy invoked upon the person. There are so many wonderful points to the internet and sharing of information. However, it is this same capability of being able to utilize shared information that can demean and invade another's right to computerized privacy.

Though this research is directly relating to privacy with regard to information technology, it sill can be applied to the Universal Declaration of Human Rights (1948) because even those utilizing a computer system are still entitled to having their information kept private. 2 According to this human rights statute every human being has the right and pronounced liberty to be allowed to feel their personal information or works that they have created, etc; are protected from those who would willingly and deceivingly access and share them with others without designated permission of doing so.

Although this is a wonderful human rights law it still often gets overlooked by would be hackers and other internet intruders who would choose to degrade a persons character or financial background, even fully knowing the legal ramifications of doing so. This law is breached quite often (as was previously stated) with regard to computerized privacy and personal information. The one positive issue about having this law is the steps that can be taken if someone does access your private information.

You won't be out in the cold. Because of the many bills congress has also passed, such as H.R.313, which was previously mentioned, any victim of identity theft or invasion of privacy can file charges in a civil court and be awarded for mental anguish and relief damages in a court of law. In concluding this research on computerized invasion of privacy, if everyone would respect each other's privacy enough and recognize the establishment of an ethical framework and legal guidelines there would not need to be an issue such as this one.

Also, if everyone could finally come to an understanding about what human ethics are and what an ethical frameworks purpose is for, then all of us using computer systems and surfing the net would feel much more comfortable in knowing our personal information was not going to be vandalized or swept away in the computerized world. References1. 106th Bill By Congress (1999) "H.R. 313" 2. Universal Declaration of Human Rights (1948) "Article 12"3. Global Internet Liberty Campaign (2005) "Privacy and Human Rights" An International Survey of Privacy Laws and Practice Accessed at: http://www.gilc.org/privacy/survey/intro.

html#invasion

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ethical Framework: Computerized Invasion of Privacy Essay”, n.d.)
Retrieved de https://studentshare.org/technology/1507936-ethical-framework-computerized-invasion-of-privacy
(Ethical Framework: Computerized Invasion of Privacy Essay)
https://studentshare.org/technology/1507936-ethical-framework-computerized-invasion-of-privacy.
“Ethical Framework: Computerized Invasion of Privacy Essay”, n.d. https://studentshare.org/technology/1507936-ethical-framework-computerized-invasion-of-privacy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Ethical Framework: Computerized Invasion of Privacy

Role of State in Data Protection

Extensive material in literature on the definition of privacy reveals that the term's meaning differs under various approaches to privacy offered by different scholars.... A functioning society thus requires the provision of privacy for its members (Introna, 2000) and that applies to data both computerized and on paper records of its members.... Data Protection is one of the primary issues in the information society where new technologies have emerged posing new threats to privacy....
13 Pages (3250 words) Essay

Hacking with Hacktivism

Hacking is typically an ethical issue.... The popular theory of ethics is ethical relativism that suggests the need for universal moral rights and wrongs to allow hacking to be taken place.... This essay "Hacking with Hacktivism" is about the marriage of computer hacking and political activism....
15 Pages (3750 words) Essay

Fraud detection in accounting

While the company grew rapidly through the 1990s, some of the worst manifestations of its culture -- obsessions with bonuses, the stock price and exotic accounting -- were also growing, and out of control… Though the corporation's character flaws can be traced to its earliest days, they flourished under top executive Jeff Skilling....
11 Pages (2750 words) Essay

State Intervention in Private Spheres of Activity for their Intended Public Interest

The writer of this research "State Intervention in Private Spheres of Activity for their Intended Public Interest" intends to take a close look at the topic of privacy in the society.... he extensive material the n literature on the definition of privacy reveals that the term's meaning differs under various approaches to privacy offered by different scholars.... More specifically, the paper will attempt to find the ways of reducing the privacy issues number....
13 Pages (3250 words) Essay

Ethical, Professional and Cultural Issues of Information and Communication Technology

These violations of rights has created new problems in the human social systems, such as the digital divide, digital security, cybercrime and a number of privacy concerns, all of these have affected people's lives either indirectly or directly.... Latest computerized databases are being extensively used to store all forms of confidential data of political, economic, social or personal nature for the support...
10 Pages (2500 words) Essay

McDonald's ethics

They are focused on it completely and have staff that catch up on its usage and conformance .... This code of morals spells out numerous issues that the particular restaurant heads are… The code is a guarantee to comply with the guidelines of business behavior.... They additionally guarantee to maintain trustworthiness and keep off potential clashes that may be either private of open in nature ....
5 Pages (1250 words) Term Paper

The Future of Neuroethics

This discipline acknowledges the complexity of human beliefs by providing a broad conceptual framework to encompass beliefs whether mystical or religious, economic or environmental, political or social or otherwise.... This paper "The Future of Neuroethics" focuses on the fact that advancement in the different areas in the field of neuroscience has, as a result, raised the public's awareness on a number of ethical issues concerning long-held views of the Self, the individual's relationship to society....
13 Pages (3250 words) Term Paper

Radio Frequency Identification (RFID)

In research last year, the 25 privacy Commissioners based in recognized that they anticipate the technology to emerge to be one of the chief basics of a forthcoming "ambient intelligence environment," and stated alarm at the likelihood of this technology to "violate human dignity as well as data protection rights” (Beckner & Li 2010, p.... Similar to covert filming, keylogging, biometrics, the monitoring of internet use, drug testing, and other privacy-invasive technologies, which have been availed into the workroom over the latest years, the arrival of this technology will also produce a place of work privacy issues, however, in the meantime, it will probably have to be acknowledged as a new way of checking employees' behavior and efficiency (Beckner & Li 2010, p....
7 Pages (1750 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us