StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Privacy in the Digital Age - Term Paper Example

Cite this document
Summary
This paper "Information Privacy in the Digital Age" investigates the measures to protect information privacy and intellectual property rights using the examples of famous companies. The definition and degree of information privacy may depend on each organization or individual who imposes it…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Information Privacy in the Digital Age
Read Text Preview

Extract of sample "Information Privacy in the Digital Age"

Computer Science Term Paper Information Privacy in the Digital Age Outline I. Introduction II. Information Privacy A. Definition B. Policies and Other Guidelines III. Classic Example A. Microsoft B. Netscape IV. Ethical Problem: Licensed vs Open Source Programs V. Implications of Information Privacy A. Political B. Economic C. Social D. Technological VI. Conclusion Information Privacy in the Digital Age Abstract Since the birth of the digital age, various technological advances have been developed, particularly the creation of the Internet. But with the rampant evolution of information technology, information privacy has also been one of the most controversial issues society has ever faced today. This paper seeks to define and contextualize the meaning and essence of information privacy, while citing a few case scenarios wherein privacy has been an issue. On the other hand, the paper also attempts to identify its implications in the political, economic, social, and technological aspects. I. Introduction Since the birth of the digital age, various technological advances have been developed, particularly the creation of the Internet. But with the rampant evolution of information technology, information privacy has also been one of the most controversial issues society has ever faced today. Information privacy may stem from a computer scientist’s perspective, as software and hardware innovations are constantly protected from hackers, spammers, and other threats to security through encryptions, passwords, security update, and the like. On the other hand, consumers and internet users accept end user license agreements (EULA) as an assurance that any personal information is protected from inappropriate use or any acts of deception. With the onslaught boom of internet commercial, personal (known as blogs), educational and service provider web-sites, through the efforts of licensed and open source programs, various questions have been raised on the ethical implications of these innovations on information privacy. Prevalence of internet crimes related to information privacy has been increasing by the number. And because technology has been rapidly changing year by year, the long-term ethical problems on information privacy is a question yet to be solved. Nonetheless, an attempt to tackle such issue would not, in any way, resolve the problem. Instead, this paper will provide useful insight on the issue of information privacy, and hopefully as a starting point of future research in such aspect. II. Information Privacy The concept of information privacy has been one of the most critical issues an inventor, company, author, scientist, and like takes into serious consideration. Imagine a world without information privacy, credit cardholders would have difficulty purchasing and exchanging vital information via the internet. Meanwhile, multinational companies would simply lose its potential revenues as other companies would emulate or “pirate” innovations as their own. Social security numbers other people would be used as a means to commit fraud, estafa, and even money laundering. On the brighter side, the lack of information privacy creates a breeding ground for technological sharing and distribution. People would be more willing to contribute to technology, rather than creating programs for spam, viruses, among others, towards the betterment of the digital age. Software programs and trade techniques are shared, rather than protected with intellectual property rights. As of to date, the definition and degree of information privacy may depend on each organization or individual who imposes it. Personal information is kept in website databases or encrypted data for safekeeping. Before a program or software is installed, a “terms of agreement” form is laid out for the consumer and subjected for approval. By accepting the terms of the organization or company who owns the software, the consumer is subject to follow their rules and regulations, as well as the privacy options that the software offers. According to the National Academies Computer Science and Telecommunications Board1, the United States has had a “slow and uneven development of privacy policy.” In 1974, the Privacy Act of 1974 was passed by the Unites States Congress which states that: No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains....2 The law posed several exceptions in allowing the use of personal records such as its use for: statistical purposes (through the Census Bureau and the Bureau of Labor Statistics), routine purposes of the US government agency, law enforcement purposes, administrative purposes, Congressional investigations, and for archiving. An amendment to the Privacy Act is the Computer Matching and Privacy Protection Act of 1988, which is mandated to ensure the procedural uniformity of carrying out machine programs, oversee matching programs through the establishment of Data Integrity Boards at each agency engaging in matching, and due process for those individuals or entities wherein their rights must be protected.3 As technological advances progressed, attention to medical privacy grew during the 1990s. Since then, the country has yet to implement a law which provides information safety and security to World Wide Web users. Some file-sharing, warez, and peer-to-peer networks have tried to protect themselves by claiming the so-called existence of “Internet Privacy Act”, signed by US President Bill Clinton in 1995, which had never existed in the first place. An example of an erroneous statement claiming to protect its web site is the following: If you are affiliated with any government, police, anti-piracy group or other related group or working for Adidas, Manolo Blahnik, Converse, Louis Vuitton, Chanel, Burberry, Hermes, Prada, Air Jordan, Nike, Timberland, Gucci, Cartier, Oakley either directly or indirectly, or any other related group, or were formally a worker, you CANNOT enter these web pages, links, nor access any of its files and you cannot view any of the HTML files. If in fact you are affiliated or were affiliated with the above said companies, by entering this site you are not agreeing to these terms and you are violating code 431.322.12 of the Internet Privacy Act signed by Bill Clinton in 1995 and that means that you CANNOT threaten our ISP(s) or any person(s) or company storing these files, and cannot prosecute any person(s) affiliated with this website.4 These futile efforts only prove to simply show how the US government is unable to implement accurate policies and implementing guidelines on the aforementioned matter; thus leading to various unethical practices that not only degrades the use of the internet, but as well as the future of the information technology. For purposes of discussion, the term information privacy being denoted in the following classic example refers to information and licensing agreements within software programs and other related products. III. Classic Examples Microsoft and Netscape During the so-called “browser wars,” Microsoft and Netscape were at neck-to-neck competition for coming up with the ultimate Internet web page browser. This occurred during the time when Internet browsers were starting to boom, due to the availability of a graphical interface and hypertext. At the early in the competition was Netscape Navigator, the original Internet browser. Netscape’s Navigator adheres to the model of freeware or open source information, allowing other users to modify and contribute to their innovation. Participation is highly encouraged to all those who can input to the software. With the source code for Navigator openly available for all, public advocacy is encouraged to all members of the developer community, which is now called as Mozilla project. Netscape also advocates the operability of its source code to all operating systems, such as Windows, Linux, Macintosh, etc. Before Microsoft entered the picture, the company was able to capture 80% of its browser users. On the other hand, Microsoft’s Internet Explorer is only devoted to operate on Windows. Using the technology that was originally developed by Netscape creators, Microsoft used and modified this knowledge to justify its own means. Its source code is not available in the public domain and is carefully protected by intellectual property laws. Information with regards to its programming techniques and methodologies are exclusively private. Microsoft maneuvers at all costs to protect and keep control with itself, particularly in the desktop and internet browser business. This is even made worse by the fact that the consumers can only avail of Internet Explorer when he/she purchases its operating system (Windows). The company has also successfully used its very own end user license agreement (EULA) for the benefit of profitability.5 With the information privacy and intellectual property rights at their side, Microsoft eventually won the battle. The company was not only able to monopolize its web browser sales; it had also increased sales on its operating system. The bundling of Internet Explorer browser with the Windows operating system was the key to the success of Microsoft. On May 18, 1998, the United States Department of Justice and twenty US states filed an antitrust law suit against Microsoft Corporation. The case was filed due to the fact that Microsoft abused its monopoly power (with the release of Internet Explorer and Windows Operating System) thus unfairly limiting the global market for other web browsers as that of Netscape, Apple Computers, IBM, etc. Aside from its technological edge, its aggressive pricing scheme and innovative development had adversely affected competition across the board. Adding to Microsoft’s disputes is its restrictive licensing agreements with OEM computer manufacturers. Aside from its questionable business tactics, the real predicament behind Microsoft’s controversial case is its unethical propriety rights for the usage of its software. Various business and technological organizations, individuals, and scientists have argued the fact that its restrictive licensing agreements, which are naturally aimed to protect information privacy and their own self-interest, does not appeal to the ideal meaning of Software Engineering Code of Ethics. The sixth principle highly questions the software methodologies utilized by Microsoft: Number 6. PROFESSION - Software engineers shall advance the integrity and reputation of the profession consistent with the public interest.6 IV. Ethical Problem: Licensed vs Open Source Programs In analyzing the ethical dilemma of information privacy over licensed versus open source programs from various social structures, the following ethical issues are taken into consideration: quality of life, use of power, safety, property rights, privacy, equity and access, and honesty and deception. Licensed programs have considerably affected the quality of life of society, particularly in Third World countries who are unable to purchase expensive licenses. Clearly, it has dictated the way people should live, as those who cannot afford to buy the licenses are forced to pirate or rendering the software inaccessible in these areas. Despite the fact that the safety and privacy of their intellectual property are well-protected, multinational software companies have unconsciously exerted their control, power and deception over, and well-beyond, those open source programs through increased marketability and more advanced technological innovation. On the other hand, open source programs are yet to reach its fullest scale as more and more people are willing to invest their money’s worth over licensed programs. Furthermore, the lack of privacy and property rights makes open-ware advocates more prone to software piracy from those individuals belonging to multinational companies. In terms of power, open source programs have less competitive advantage over licensed ones. Overall, these two opposing forces leave a big question mark over which is more valuable in technological information development: ETHICS or PROFIT? V. Implications of Information Privacy Political As ethical problems have sprouted like mushrooms all over the Internet, the world has yet to carefully delineate property rights from information privacy laws. Without it, the Internet will never be a safe place. Indeed there exists the presence of license agreements from varying software developers, but for as long as the rules are dictated by the profit-oriented multinational companies; ethical standards on software development will eventually be forgotten. Companies will continue to manipulate the policies, rules and regulations towards their vested interests, never minding the affordability and capabilities of its consumers. Economic Without information privacy, software companies will continue to reap profits up to a million fold. Personal information of consumers, ranging from credit card numbers, social security number, address, e-mail addresses among others, would be indeed safely secured. But on the downside, the expensive continuous maintenance costs of these web sites would be passed on to consumers, thus leaving the consumer empty handed. Again, profit making are more valued than ethics. Morality is set aside in favor of making profitable business decisions.7 Social As more and more people are now discovering the uniqueness and accessibility of the Internet, they are also resorting to online purchases as opposed to the traditional marketing scheme. People trust the privacy agreements whenever they use credit cards, as well as other critical purchases. Because of this, people have become less socially inclined to do the job themselves. Household bills and other necessities are done over the Internet. Getting new friends are also done online. In this particular case, ethics is less considered as there is less human contact. People get what they want, regardless whether they have been polite or kind enough in asking so. Technological Technology will continue to devise ways and means to improve its information privacy systems and database, at the expense of one’s moral and ethical background. Companies are more willing to venture into profitable business ventures just so to justify the means. Without the presence of proper ethical perspective on information privacy, technological advances, despite the goodness it can bring, will be instrumental in the degradation of mankind’s morality. VI. Conclusion Information technology has brought new avenues that have been unimaginable to mankind over a century ago. And as a price to pay for the information privacy that these technological advances have brought, man’s ethics and moral standards have deeply suffered, as manifested by Microsoft and Netscape’s browser war. The challenge for society nowadays is to come up with a technology that will promote the overall well-being and ethical standards of man, without sacrificing information privacy. This may be far from impossible, given that current belief systems of computer scientists, multinational companies, and the like are in unison towards the betterment of mankind. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Information Privacy in the Digital Age Term Paper, n.d.)
Information Privacy in the Digital Age Term Paper. https://studentshare.org/information-technology/1705199-computer-science-term-paper
(Information Privacy in the Digital Age Term Paper)
Information Privacy in the Digital Age Term Paper. https://studentshare.org/information-technology/1705199-computer-science-term-paper.
“Information Privacy in the Digital Age Term Paper”. https://studentshare.org/information-technology/1705199-computer-science-term-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Privacy in the Digital Age

Privacy in a Digital Age

Privacy in a digital age In today's age of round-the-clock networking and socialization, the phenomenon known as privacy is like milk in black tea.... Life in this age has neither the comfort nor the warmth of a simple lifestyle which prevailed a few years back.... Moreover, the definition of privacy has changed in the present age.... Lastly, the most disturbing revelation of lives becoming public is that with our lives going big and digital, they have also gone empty and shallow....
4 Pages (1000 words) Essay

The Value of Digital Privacy in an Information Technology Age

The paper “The Value of Digital privacy in an Information Technology Age” will discuss computer hacking, which has been rampantly used to access sensitive individual information.... The companies, through their websites, collect information ranging from names, physical address, e-mail address, age, password and other information necessary to conduct business with these companies.... Different cabling companies have different terms of use in regard to privacy....
4 Pages (1000 words) Research Paper

The Value of Digital Privacy in an Information Technology Age

It discusses about the advantages and disadvantages of the public access to an individual's private information and the measures that citizens should take in order to protect their privacy in regard to information dissemination.... hellip; This paper talks about the importance of digital privacy, and the various laws that affect it.... This paper gives an example of a federal privacy law that allows the government an access to any private information of an individual....
5 Pages (1250 words) Essay

The Value of Digital Privacy in an Information Technology Age

The companies, through their websites, collect information ranging from names, physical address, e-mail address, age, password and other information necessary to conduct business with these companies.... Different cabling companies have different terms of use in regard to privacy.... Invasion of personal privacy shows inefficiency on the government's part and other organizations that keep citizens' records.... Hacking may either be used by computer criminals or computer… In the wrong hands, unauthorized access to information may lead to destruction of vital information or usage of information for destructive purposes. Another way through which individuals can access private information is through phishing....
4 Pages (1000 words) Research Paper

Privacy and surveillance in the Information Age

Communication technology has also a long history beginning with inscriptions on the walls of caves to the… In a modern world, the use of technology has managed to increase communication among human beings, but at the expense of personal privacy.... ), information technology has not only affected communication, but has actually led to a need to redefine privacy.... With increasing surveillance and information recording, personal privacy is taking a new direction....
12 Pages (3000 words) Essay

On Questions of Privacy in a Digital Age

The paper "On Questions of Privacy in a digital age" tells us about information and other personal data.... hellip; In dealing with complex issue of privacy, there is a need to look at in a theoretical perspective: ethical theory of privacy.... Three – fold premises emerges: something vital and important to defend and something based on individual's preference and the importance of privacy (Moor 1997:28).... Sometimes, in intimate relationships, like marriages, privacy can be considered absence since trust is a condition to be met....
7 Pages (1750 words) Term Paper

Online Privacy

n conclusion, online privacy in a fundamental aspect in the digital age and privacy should be respected.... They called for the end of intrusive digital surveillance on other countries because every state has the right privacy, whether in the context of domestic or extraterritorial surveillance.... Therefore, online privacy is the… Maintaining privacy while online is an essential attribute because one is free from theft, fraud and cyber security (Independent....
2 Pages (500 words) Coursework

Digital Era and Its Effect on Privacy

This work "digital Era and Its Effect on Privacy" demonstrates the increasing level of development, efficient flow of information, new possibilities of communication.... However, privacy is one of the major concerns that are associated with this digital era.... he government has a role to protect the privacy of internet users.... Even the administration had to obtain a court order in order to infringe on people's privacy....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us