Leg 500 - Assignment 2: the Value of Digital Privacy in and Information Technology Age

Only available on StudyMode
  • Download(s) : 75
  • Published : February 18, 2013
Open Document
Text Preview
Assignment 2: The Value of Digital Privacy in and Information Technology Age LEG 500 - Law, Ethics, and Corporate Governance

1. List and describe at least three (3) technologies that allow an individual to research citizens' private data. A technology that allows an individual to research private data is the Global Positioning System (GPS). This “is a navigation and precise-positioning tool” (Glasscoe, 1998) developed in the early seventy’s by the Department of Defense. Although GPS was originally designed for the military, its applications have extended into the public sector to provide researchers the specific location of an individual (Glasscoe, 1998). A malicious technology that can be used to research an individual’s private data is spyware. In general, it is software that can be loaded on an internet ready device, such as a computer or smartphone, with the sole purpose of gathering and transmitting one’s private data to another person. Spyware is “designed to be difficult to remove,” and the collection and transmission of information can be completed without the individual’s consent (Microsoft, 2012). In contrast to spyware, social networking services are freely provided with and individual’s private data. Social networking services are web based platforms built to facilitate communication between internet users. “When creating an account user[s] disclose private information about their social contacts and interests by including friends, business associates, and companies in their networks” (The White House, 2012). Services such as “Facebook, the largest social network service” (Halbert & Ingulli, 2012) can gather enormous amounts of private data that is associated with an individual including: “written updates, photos, videos, and location information” (The White House, 2012). 2. Discuss the advantages and disadvantages of public access to this information, both for the researchers and those who are being investigated. “Personal data...
tracking img