To help counter terrorism, many countries are planning the development of computer systems that track large numbers of their citizens and their actions. Clearly this has privacy implications. Discuss the ethics of developing this type of system.
Ethics is a concern of humans who have freedom of choice. Ethics is about individual choice: When faced with alternative courses of action, what is the correct moral choice? What are the main features of ethical choice?
Software engineers have wider responsibilities on systems development than the mere application of their technical skills. Ethically, an engineer should respect the confidentiality of the public irrespective of whether or not a formal confidentiality agreement has been undertaken.
Developing computer systems to counter terrorism by tracking citizens of a country and their actions has privacy implications. Privacy entails an individual's right to control the collection and use of his or her personal information, even after that information is disclosed to others with the consent of that individual. Systems are been developed that violates the human privacy rights. Examples are:
Surveillance cameras are setup in peculiar places and are often illusive in the sense that individuals don't realize that they are being filmed. For the most part these cameras are setup with good intensions namely for the benefit of public safety. They can be a vital tool in preventing or solving crimes. The problem is not that the individual is being filmed, but usually this is done without his or her consent. In some cases the surveillance cameras have been unlawful used or setup without permission.
When we contemplate all the electronic data that is now gathered about each of us as we move through our everyday lives, there seems little doubt that we are leaving behind an electronic record of our activities.
There are a multitude of data gathering tools available for everyone, and these are being used to monitor the activities of unsuspecting Internet users. What's alarming is that often these tools covertly collect the information without the user's knowledge.
One of the latest services offered by mobile phones is Location Based Services (LBS), which in its basic form will give individuals information about their location. Location Based Services doesn't only give away the location of individuals, but gives a pattern on what services individuals are interested in.
Countries are adapting a system that automates the passing through of cars by using a billing system which binds the vehicles identity to the owner. While these types of systems are beneficial in many circumstances, privacy could be jeopardized since they easily can facilitate the location of individuals.
It is often possible to obtain a biometric sample, such as a person's face, without that person's knowledge. This permits covert recognition of previously enrolled people. Consequently, those who desire to remain anonymous in any particular situation could be denied their privacy by biometric recognition.
All of the above given examples are having same privacy implication and such would be present in developing computer system to track citizens and their actions. Citizen’s confidentiality should be properly considered and evaluated before making decisions on their actions unknowingly. Information gathered from individual can go a long way to cause many damage to one’s life than anticipated.
Search the library or internet for the companies that supply utility computing. Select two or three companies and compare them to Amazon. What services do these companies provide? What promise do they make about availability? If you were launching a web startup business, would you choose one of these companies over Amazon for the technology services? Why or why not? Would your...