| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

Toward an Approach to Privacy in Public: Challenges of Information Technology

Page history last edited by Riela Isabel Antonio 15 years, 1 month ago

 

Chapter: Toward an Approach to Privacy in Public: Challenges of Information Technology

Quote:

They did not, however, anticipate the vigorous public outcry against Lotus Marketplace Households. An estimated 30, 000 letters of protest expressed its displeasure. Defenders were astonished. How was it possible to construe Lotus Marketplace as an invasion of privacy when the information it contained was taken from public sources only and not by violating any sensitive or personal realms.? It was to be compiled from information already.  “Out there” and would use no intrusive in bedrooms. Information was to be harvested from public records and from records of transactions that individuals carried out in the public arena and made no efforts to hide. No private zones would be breached, the integrity of home and family would be respected, and embarrassing personal facts would not be revealed. Defenders argued, furthermore, that opposition to Lotus Marketplace violated the right of its creators to pursue profitable enterprise.

What I expect to learn:

To know the correct approach to privacy in public

Review:                    

There are numerous challenges that information technology faces today but one thing for sure is that they try their best to protect each and everyone’s right of privacy. Why privacy you say?  Because privacy is something we should have, it is something that should be provided to us fully without making a fool of ourselves to other people because you have to admit, all of us has a dirty secret we would not want the world, our neighbour, our best friend, our friends, or our families to know because it can either make you or most of the time, break you. Privacy does not only mean privacy of oneself but also of one’s work.

I am a software developer and as much as possible, I wouldn’t want my programs to be taken or to even be viewed by anyone yet because I treasure my work as a part of me which I am proud of. Now, if in such a case like someone might have intentionally copied my work just to gain credit for it, I would be mad but come to think of it, I didn’t implement much privacy such as I should so I don’t have anything against that person. In that situation, it can be my fault in the first place because I might have left my workstation open for him to openly scan and tinker through my files so I really have nothing against him but verbal blame which is equivalent to nothing without proof. It may have been my own fault but I am thankful that the Information Technology industry is thinking of ways to protect users like me with their files, their work, and especially, themselves.

What I learned:

·         Privacy

·         The personal Realm

·         Violating privacy in public – the case of Lotus Marketplace: Households

·         Two misleading Assumptions

·         Erroneous Assumption1

·         Erroneous assumption 2

·         Implications for a theory of privacy

Integrative Questions:            

1.    What is privacy?

2.    What do you mean by personal realm?

3.    Explain the first erroneous assumption.

4.    Explain the second erroneous assumption.

5.    What is the final implication for the theory of privacy?

Comments (0)

You don't have permission to comment on this page.