There are 3 scenarios listed below. Each with its requested response accordingly
ID: 369090 • Letter: T
Question
There are 3 scenarios listed below. Each with its requested response accordingly. If you are unable to answer them, please say so.
Some of the Internet's biggest companies (i.e. Google, Microsoft, Yahoo, IBM and Verisign) implemented a "single sign-on" system called OpenID, that is available at thousands of Web sites. It allows the widespread practice that users who are logged into Facebook to click a Facebook button for an instant login. The benefits are obvious, the system makes it easier for users to sign on to a number of sites without having to remember multiple user ID's, passwords and registration information. Uder Open ID, the companies share the sign-on information, personal information such as credit card data, billing addresses, and personal preferences for any Web user who agrees to participate.
PLEASE any the following discussion questions:
1. Discuss any potential and real threats to privacy in this situation. Search for news articles about Facebook to find problematic incidents, if any.
2. Who would own the data? if any.
3. Who do you think should have access to the data? How should that access be controlled?
SpectorSoft markets eBlaster as a way to keep track of what your spouse or children are doing online. Operating in stealth mode, eBlaster tracks every single keystroke from instant messages to passwords entered into a computer. It also records every email sent and received and every Web site visited by the unsuspecting computer user. The data are sent anonynously to an IP address of the person who installed eBlaster. It could also be installed on the compters of a business.
PLEASE answer the following discussion questions in their order:
1. Do think it would be ethiccal for a business to install eBlaster to ensure that its employees are engaged only in work related activities? If so, under what conditions would using it be appropriate? If not, why not?
2. Apply the normative theories of business ethics to this situation.
Google, Inc. has a unique advantage beginning in March 2012. By combining information about user activity from it many popular applications (such as Google+, and YouTube), Google algorithms were able to alert users to things that might be of interest. This vast amount of information. analyzed properly, gave Google a way to compete. By combining data with information from Internet searches, Google could better compete against applications such as Facebook.
But this was a departure from it earlier privacy policy. In June 2011, the executive chairman of Google had declared, "Google will remain a place where you can do anonymous seaches [without logging in]. We're very committed to having you control over the information we have about you."
This may be possilbe for users who don't login to a Google account, but for those with a Google or other personal accounts or an Android mobile phone, it's more difficult to remain anonymous. Offering a counter viewpoint, Christopher Soghoian, an independent privacy and security researcher said, "Google now watches consumers practically everywhere they go on the Web [and anytime they use an Android phone]. No single entity should be trusted with this much sensitive data."
PLEASE answer these discussion questions:
1. Do you see any ethical issues involved in Google's recent approach in combining information from a particular user? Why or why not?
2. How might users change their behaviors if they were aware of this new approach?
3. Apply the normative theories of business ethics to Google's new policy about combining their information?
Thanks for your prompt reply.
Explanation / Answer
1. A single click button for the instant login is certainly a better idea for the users to enhance the convenience of login. This would make the login attempts of the customers easy and a good approach of making the customers satisfied. Now when considering the threats and risks related to the privacy, then it can be a crucial one. If the login details of this system are hacked then the hacker can certainly enter into multiples sites of the user which can put the user into a big trouble. Only if this system can ensure cyber security this system can be considered as a secured one.
2. The data will be owned and controlled by the database of the sites where the users are enrolled with. The system will have the permitted access to those details of the sites so that the customers can login directly through the single click.
3. The data can be accessed and controlled by the database management officers of the websites where the customers are registered with. These people can monitor or control the data which the customers are registering in the websites. This access can be controlled using the legal and ethical policies of the organizations. These people are also responsible for the security of the information which the customers post in the websites.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.