Monday, May 4, 2020
Privacy and Security
Question: Analyse the importance of privacy and the security. Answer: Privacy and Ethical Issues: In the present time of using The Internet, each and every organization and the company are trying to collect the maximum data of the customers. The companies believe in collecting the data of the customers and also targeting the feature of the ethical dilemma, which causes the profit and the privacy against one or the other. In this case, we shall discuss the ethical issues of the IT in the privacy. For the last two decades, the internet is considered as such a legal territory, which lacks the protection and the regulatory standards of the firm by the international law (Yao-Huai, 2005). We shall in the report also discuss the suggestions to the user regarding the privacy protection in the new era of the internet. With the development of the new technologies, great changes are also observed in the internet usage and also in the privacy standards of the internet. Many of the market, companies collect data or information from the users of the internet. The Internet at the beginning is considered as such the place which is used by the one for comfortable sharing of the personal information. But today the scenario of the internet has completely changed along with its standards for the privacy (Yao-Huai, 2005). Many of the companies on the internet have started collecting data or the information from the consumers of the internet. This data collected from the number of the consumers is being, bought, analysed and sold for creating a large number of the profiles for the target advertisements to the users. This transformation of the software helps in the free propagating of the information all across the web. Ethical Issues: With the increasing access to the internet, a new technology of the cookies is introduced, which is that small piece of the data which is stored in the web browser of the user and is sent to the different sites when it is browsed by the users. This cookie helps the companies to track the users all across the huge network (Weber, 2006). This also increases the ethical issues related to the IT. When it is easier to gather, use and store the personal data and the users are also showing the concerns to the issues related to the privacy, then it is to be the responsibility of the companies to check the associated ethical dilemma. The ethics involve the recommendations and systematizations regarding the concept of wrong and right. Many of the theorists considered this concept of the privacy as the valuable concept. A different theorist has a different view of the pros and cons of the ethical issues of the privacy in IT. This concept of privacy will be discussed with the two different theories of the ethics. The two theories are the theories of the Consequentialist and Deontological. Consequentialist Theory The theory of the consequentialist helps in maintaining the fundamental judgement of the ethics which involves the state of affair to be intrinsically good or bad. Utilitarianism is one of the most important theories of the consequential. The hedonistic act of the utilitarianism morally gives the right actions which help in producing a large amount of the happiness and the lesser amount of the pain (Card, 2004). This theory also helps in providing the base for the rights as compared to the other theories. The theory also helps in defining the importance and the existence of the rights. The theory of the consequentialism claims the act to be wrong or right depending on its capacity for maximising the happiness. Privacy is the t fundamental aspect of the human value where the right is not to be self-verifying. The privacy right is derived from the two values which are the autonomy and the dignity (VYRYNEN, 2006). The larger portion of the securities of the computer involves the safety of the computer resource, intentional disruptions, data, etc. the hacking with all these actions includes the Right to privacy derivatives from two values: dignity and autonomy. A large part of computer security involves the protection of computer resources, data, intentional disruptions, etc. Hacking includes all these actions along with unauthorized access to computer resources. This term is seen as a negative approach to reach ones information for malicious purposes. The positive impact of hacking is that it provides data for everyones use (Volkman, 2003). Deontological Theory The theory of the deontological is the theory based on the virtues and the theory of the consequentialist is a theory based on the right. The theory of the utilitarianism helps in explaining the importance and the existence of the rights and also in explaining the rights as the foundational and not derivative. Due to this character of the derivative, the degree of the absolutism lies within the theory of deontological (Smith, 2011). This theory of the deontological says that the correction of the actions depends on upon the ability to produce the ends but also follows the fundamental features of the act. The first and the foremost consideration is to protect the right of one's own privacy. Few theories also concluded that the information related to the right of privacy is to be established as the legal right on the basis of the four basic sources such as the human rights, legal rights, position rights and the contract rights. Conclusion: Hence, it is concluded that the privacy is the right of each and every person. This paper helps us in understanding the importance of the right of privacy. How the new technologies in the It is affecting the privacy rights of the individuals (Capurro, 2005). The rights of the privacy of the computers are not only the moral right, whereas is important for protecting the interest and the rights of the consumers. According to the ethical theories of Consequentialist and Deontological, the privacy issues have both good and bad things attached to it. The analysis of the privacy and the security, ethical issues will help the professionals to resolve the moral predicament and introducing the guidelines for using the information technology (Card, 2004). It is also concluded with the analysis that the designing and the data sharing needs the moral manifestation. Hence, the impression of the ethics and the privacy of the computers is to be built in advance for securing the privacy of the consumers. References Capurro, R. (2005). Privacy. An Intercultural Perspective.Ethics And Information Technology,7(1), 37-47. Card, R. (2004). Consequentialist Teleology and the Valuation of States of Affairs.Ethical Theory And Moral Practice,7(3), 253-265. Smith, M. (2011). DEONTOLOGICAL MORAL OBLIGATIONS AND NON-WELFARIST AGENT-RELATIVE VALUES.Ratio,24(4), 351-363. VYRYNEN, P. (2006). Ethical Theories and Moral Guidance.UTI,18(03), 291. Volkman, R. (2003). Privacy as life, liberty, property.Ethics And Information Technology,5(4), 199-210. Weber, M. (2006). Tough-Minded Theories in Ethics.Dialogue,45(04), 747. Yao-Huai, L. (2005). Privacy and Data Privacy Issues in Contemporary China.Ethics And Information Technology,7(1), 7-15.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.