Computers, Information Technology, the Internet, Ethics, Society and Human Values Philip Pecorino, Ph.D. Queensborough Community College, CUNY Chapter 6 Privacy |
|||
Overview Most people value their privacy. There are different types of privacy and the value may vary from person to person and from time to time but it still remains that most people do hold privacy to be important to them. Computer technologies have in various ways compromised or invaded or removed various forms of privacy. The invasion of or diminishment of privacy has been the result of actions by governments, commercial enterprises, employers, criminals and even by individuals. For an overview of privacy and the computer technologies READ: Privacy and Technology by Gary T. Marx. Privacy has been compromised by actions taken in the private as well as public sphere. Indeed the distinction between the two becomes more difficult to make and less significant to those being observed or whose information is being taken and shared and all without their direct knowledge and often without even their suspicion. Murky Conceptual Waters: The Public and the Private by Gary T. Marx In Ethics and Information Technology, 2001. Vol. 3, no. 3, pp. 157-169 For an experience of how much is already or can be already known about you in the commercial sphere go to this page and experience something not too far removed from where we are in 2006. ACLU Surveillance Campaign How bad can it get? Almost there? What should be the reasonable expectations of individuals to privacy? How much privacy? What types of privacy? How much is needed by individuals? How much invasion of privacy is needed by others? Even as you read this page on a computer by means of the internet your computer is being accessed by others checking on what it is doing. Demonstration of snooping by computer The CDT Privacy Demonstration Page. Any people that would give up liberty for a little temporary safety deserves neither liberty nor safety”. Source: http://www.thomasjeffersonquotes.net/ If you have a Smart TV, there may be groups gathering information on what you say and do. They may do this for several purposes. See: https://www.youtube.com/watch?v=_VhOkg_g3uo |
|||
Web Surfer's Caveat: These are class notes, intended to comment on readings and amplify class discussion. They should be read as such. They are not intended for publication or general distribution. ppecorino@qcc.cuny.edu @copyright 2006 Philip A. Pecorino Last updated 8-2006 Return to Table of Contents |
|||