Sunday, April 18, 2010

What new threats to privacy are likely to develop from new computer and Internet applications in the next five years?

Regardless of what new computer-related product is introduced, security should always be a major concern. Introduction or updates to laws such as the Patriot Act could hamper or improve the government’s attempt at going after cyber terrorists. Ramifications of its influence could shape how a company does business with its customers. Smart Phones bring security challenges as well because of its capability to act as a mini-computer with a phone. Infiltrating the security of such a device could render it useless as well as open potential holes in its network. Whenever a new product comes out such as the Apple’s iPad hackers and others alike look to find early vulnerabilities. With the increase use of video surveillance challenges to privacy have vastly increased. Hacking, malicious logic, and social engineering will continue to permeate networks. GPS-enabled vehicles could be tracked wherever they travel. Privacy on such vehicles would be minimized at best.



Baase, S. (2008). A gift of fire: Social, Legal, and ethical issues for computing and the internet 3rd Ed. Upper Saddle River. Pearson Prentice Hall.

What does re-identification mean?

Re-identification means identifying the individual from a set of anonymous data. The best example is characterized by AOL’s lawsuit 2006 involving records of more than 650,000 people. This vast wealth of information was copied, mirrored, and cross-referenced throughout the internet resulting in actual identification of some AOL customers.



Baase, S. (2008). A gift of fire: Social, Legal, and ethical issues for computing and the internet 3rd Ed. Upper Saddle River. Pearson Prentice Hall.

What does the term secondary use mean?

Secondary use suggests handling of personal information for purposes other than what is was provided for. Personal information could ultimately be manipulated for marketing and possible data mining purposes. Customers would not expect to have their information used as a marketing tool or mining for dishonest purposes.



Baase, S. (2008). A gift of fire: Social, Legal, and ethical issues for computing and the internet 3rd Ed. Upper Saddle River. Pearson Prentice Hall.

Briefly list and explain the following:

a. Right, wrong, and okay. The categories of ethically right and ethically wrong at times incur dilemmas of deemed ethically acceptable. One could easily argue it would be best to view ethics as obligatory, prohibited, and acceptable thus right, wrong, and okay. This greatly defines reality since ethics or morals are not absolute for everyone.
b. Distinguish wrong and harm. Ethically distinguishing wrong or harm depends on intent and consequences. A company that creates a new product that leads to the closing of a rival’s business may have done so legally, with good intentions. In contrast an individual hacking into a system may do so to notify an establishment of security vulnerabilities but at the same time violate property right law.
c. Separating goals from constraints. The separations of goals from constraints are simple: whether a company’s goals are to maximize profits or minimize expenses, the actions to achieve these goals must be within the realm of ethical constraints. Illegal or unacceptable behavior breaks ethical constraints.
d. Personal preference and ethics when crossed have to be evaluated properly. Can one’s personal preferences and ethics at work for instance be balanced? As an Information Assurance Officer I have seen situations where another person’s privacy could be potentially invaded. Legally searching for a certain criteria was sound but I still didn’t feel comfortable performing the task. After it was explained more definitively by the Information Assurance Manager, I understood the purpose and was agreeable with doing my assignment.
e. Laws and ethics should be consistent although at time they are very complex. For instance, a law prohibiting marijuana use in the workplace is very specific as are laws that allow for medical use of marijuana in California. Laws cannot account or safeguard all ethical aspects of life. We can only attempt to have laws that best align with ethical standards. When laws go beyond the scope of ethically sound judgment, they appear to be weak and ineffective for the majority of society.


Baase, S. (2008). A gift of fire: Social, Legal, and ethical issues for computing and the internet 3rd Ed. Upper Saddle River. Pearson Prentice Hall.

Which kind of ethical theory, deontologist or consequentialist, works better for arguing ?

The consequentialist way of thinking would be more ethical. In contrast a deontologist would look at driving on one side of the road as absolute and thus be opposed to another country driving on the other side. The consequentialist would view driving on the other side of the road as a means to get where one has to go, just differently.



Baase, S. (2008). A gift of fire: Social, Legal, and ethical issues for computing and the internet 3rd Ed. Upper Saddle River. Pearson Prentice Hall.

Give an example of a law that implements an ethical principle.

In general all states have laws that prohibit murder, sexual assault, and theft just to name a few. In principle these laws enforce a greater ethical obligation to society. Without them society would have little to no control or moral fabric. Give an example of a law that enforces a particular group's idea of how people should behave? The Veteran’s Administration recently passed a new law to allow for a Post-911 Era education benefits for those serving in the military after September 2001. This law was pushed very hard by the “Veterans of Common Sense” and by the Department of Veteran Affairs.

Baase, S. (2008). A gift of fire: Social, Legal, and ethical issues for computing and the internet 3rd Ed. Upper Saddle River. Pearson Prentice Hall.

Veterans for Common Sense (2010, January 10) Retrieved 16, March 2010 from http://www.veteransforcommonsense.org/index.php/veterans-category-articles/1566-imperial-valley-news

Veterans Today (2010, January 26) Retrieved 16 March 2010 from http://www.veteranstoday.com/2010/01/26/g-i-bill-benefits-pushed-aggressively-by-dva/

Explain the difference between act utilitarianism and rule utilitarianism?

Act utilitarianism is opposed to rule utilitarianism. Act utilitarianism is based on ethics in a more personal manner as a person’s utility or usefulness satisfies the individual’s needs and morals. In stark contrast, rule utilitarianism is more general in approach unlike act utilitarianism. Rule utilitarianism takes as a whole that morally correct actions brings about good consequences for everyone. For example, a child labor law is designed to protect minors from working in unsafe and unhealthy conditions. Otherwise without such laws, minors may confront mistreatment, neglect, and other abuses.



Baase, S. (2008). A gift of fire: Social, Legal, and ethical issues for computing and the internet 3rd Ed. Upper Saddle River. Pearson Prentice Hall.