Term Paper on "Computer Ethics"

Term Paper 10 pages (3784 words) Sources: 30 Style: Harvard

[EXCERPT] . . . .

Computer Ethics

The Internet's rapid evolution as a publishing and commerce platform further extends its ability to serve as another marketing, selling, and service channel for companies globally, yet with this potential for revenue growth comes the ethical responsibility of managing customers' data vigilantly. The issue of benevolent or benign surveillance or the providing of personal information by the public to complete transactions at ATM machines, automated pay terminals in shops or restaurants, or the online purchase of products or services is considered by many to be one of the characteristics of living in a highly developed technological society. Included in this papers' discussion of benign surveillance are technologies including personalization, cookies (small files that capture a website visitors' specific information items), and use of continual recording of click stream data through a site is being captured, organized and analyzed through data warehouses and data marts.. The ethics of capturing so much customer data and creating a data warehouse and data marts and then analyzing it to find new strategies to get customer to buy more, and the unethical practice of reselling the information captured from Internet-based marketing campaigns puts ethical dilemmas in the forefront of many companies. In addition the collection of customer data from website visits and responses to e-mail campaigns create the risk of potential identity theft due to having so much information in one place on prospects and customers in one series of databases. The collection and analysis of customer data captured without consent raises many ethical dilemmas for companies, and also creates dilemmas and potential co
Continue scrolling to

download full paper
nflicts of interest relating to the capture, analysis, or sales of customer information without their knowledge

The ethical issues of whether benign surveillance is a commentary of a modern high-tech society or a precedent for ethical misconduct and harm to others is discussed in this paper. There are also the considerations of how data captured and stored in data warehouse is used by programmers and management analysts in the devising of selling and loyalty program strategies (Albrechtslund, 63). The ethical considerations of using data warehouses and data marts constructed from data accumulated through benign surveillance requires an entirely different set of standards, practices and processes (Danna & Gandy, p. 374, 5). The ethics of strategies based on data obtained through benign surveillance have conflicting assessments (Ess, p. 220, 221) that highlight the polarity of the use of online data and enterprise-class predictive analytics software applications to ascertain customer segments and understand their preferences. Harrah's Casinos and Entertainment practices this pervasively with their customer base, sending the least profitable customers to competitors and giving the most profitable ones an opportunity to gain free stays at their hotel and casino locations globally for their loyalty, relying on the insights gained from predictive analytics applications to define and execute this strategy.

The use of data obtained through benign surveillance to specifically "fire" unprofitable customers and segment them based on profitability is considered unethical by ethicists studying information technologies (Lacey & Sneath, pp. 459, 460). Floridi (pp. 109, 110) discusses in detail the ethical considerations of data privacy and the need to ensure there is "opt in" or specific approval from consumers for their data to be analyzed and used for the creation of strategies (Peeples, pp. 27, 28) (Tavani, 268, 269).

The Ethics of Analyzing Data Obtained Through Benign Surveillance

Websites and other forms of electronic initiatives that companies use to capture customer data are increasingly being seen a untrustworthy by consumers as a result of the reported unethical use of their data (Vedder, pp. 276, 277) (Triplett, p. 79) (Phukan, pp. 235, 236, 237). The erosion of trust in many forms of electronic payment systems is one of the largest inhibitors of their global adoption (Peterson, p. 347). The ethics of using consumers' data without their permissions have actually brought greater scrutiny than ever to loyalty programs (Lacey & Sneath, et.al) and abandonment (Ingram, Skinner & Taylor, pp. 238, 240, 241). From this perspective of trust as defined through the empirical studies presented (Weckert, p. 93), a dichotomy emerges from the impact of benign surveillance-based data having the implied warranty of staying private (Soraker) and the development of loyalty programs with it without the knowledge of consumers (We & Royakkers, et.al.). Ethicists may argue the points of implied warranties of privacy, yet the public, through the use of social media including blogs, Wikis and other forms of social networking, is quick to condemn a violation of this trust. In many respects the role of a more communicative and collaborative Web as defined as Web 2.0 (Bernoff & Li) is forcing a high level of transparency into how data collected through benign surveillance is used. While there are a multitude of standards being deployed to force transparency, including those from the Association of Computing Machinery (ACM) (Peslak, et.al), the immediacy and level of transparency of social networking is redefining and clarifying what level of use is considered part of modern living and which is considered clearly a violation of ethics leading to a deterioration of public trust (G rniak-Kocikowska. p. 48). There is no specific benchmark or ethical standard as defined that is applicable globally across the spectrum of data analyses, marketing and sales plans based on data collected through benign surveillance; there is however a significant increase in the volume and intensity of consumers' concerns as voiced through social media and social networking sites. The collection of technologies Bernoff and Li (pp. 36, 37) discuss and analyze are forming the foundation that quickly redefines what is acceptable vs. unacceptable in the use of data sets. Social networking and Web 2.0 define what specific uses of benign surveillance-based data is part of living in a technologically advanced society vs. being taken advantage of through unauthorized data mining and unethical use of the data (Phukan, pp. 234, 235). This is not to say that "the wisdom of the crowds" pervades the definition of ethical behavior through social networking; it does say however that those consumers whose data is being used for analysis have the right to say how that data will be used, regardless of the prevailing and often imprecise standards of ethics that vary significantly between those who seek the advantage of the data in marketing vs. those whose data it is (Johnstone, et.al).

The Ethics of Creating Strategies Using Data Derived From Benign Surveillance

The ethics of capturing data through benign surveillance is one factor in the debate of the ethicacy of this activity, yet the synchronization of strategies based on its use, including the use of the data in programming contexts and environments is another (Himma, p. 226, 227). For example the development of an entirely new service offering from a bank or credit union that capitalizes on trends found in data obtained through benign surveillance is a case in point, requiring the participating and cooperation of several different groups of employees. As a result of these projects, confidential purchasing data and trending by consumer is easily accessible to any member of the team, accelerating concerns over benign surveillance being a liability to consumers (Bynum, 2006, pp. 157, 158).

From the initial uses of data obtained through benign surveillance in financial services throughout the last seven years the extent of potential breaches to data obtained through benign surveillance is exponentially increasing (Bynum, 2001, et.al.). The examples of this and the perils of it from a personal privacy perspective include the extensive capture of personal loan and financial information on the part of prospective lenders through voluntary mass surveillance, capture of loan and financial information on consumers to other firms, and the theft of this data as well from breaches during the development process (Bynum, 2001, et.al.). Globalization is forcing the distribution of development teams globally, further complicating governance and control of the use of confidential data.

These examples underscore the critical need for defining ethics standards for financial professionals including financial services developers who work with data obtained through voluntary mass surveillance. The ethics of working with data not specifically created from opt-in data present ethical dilemmas for developers (Pemberton, pp. 77, 78) (Tavani, p. 37). Ethical governance is critical during the development phases of new financial services applications as there are many examples of data being either stolen or resold without the consumers; consent. Examples abound of this practice of reselling financial data on consumers, and worse, the theft of the data from companies who have purchased it. Certegy Financial Services' data breach of 8.5 million checking account customers is a case in point, where a systems administrator in the it Department stole backup tapes of account names, social security numbers, and checking account and routing numbers for resale to an undercover FBI agent. Luckily only the last four digits of the account numbers were only shown and best of all the FBI captured the administrator and the data sets before they could enter the black market and be resold to criminals who use this data to both in turn… READ MORE

Quoted Instructions for "Computer Ethics" Assignment:

I will send email to you with question and other requirements through attachments.

I would like my project to be undertaken by *****.

Thanks,

K BHASKARAN KARUPPIAH *****

How to Reference "Computer Ethics" Term Paper in a Bibliography

Computer Ethics.” A1-TermPaper.com, 2008, https://www.a1-termpaper.com/topics/essay/computer-ethics-internet-rapid/237547. Accessed 26 Jun 2024.

Computer Ethics (2008). Retrieved from https://www.a1-termpaper.com/topics/essay/computer-ethics-internet-rapid/237547
A1-TermPaper.com. (2008). Computer Ethics. [online] Available at: https://www.a1-termpaper.com/topics/essay/computer-ethics-internet-rapid/237547 [Accessed 26 Jun, 2024].
”Computer Ethics” 2008. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/computer-ethics-internet-rapid/237547.
”Computer Ethics” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/computer-ethics-internet-rapid/237547.
[1] ”Computer Ethics”, A1-TermPaper.com, 2008. [Online]. Available: https://www.a1-termpaper.com/topics/essay/computer-ethics-internet-rapid/237547. [Accessed: 26-Jun-2024].
1. Computer Ethics [Internet]. A1-TermPaper.com. 2008 [cited 26 June 2024]. Available from: https://www.a1-termpaper.com/topics/essay/computer-ethics-internet-rapid/237547
1. Computer Ethics. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/computer-ethics-internet-rapid/237547. Published 2008. Accessed June 26, 2024.

Related Term Papers:

Computer Ethics: Internet Privacy Essay

Paper Icon

Computer Ethics: Internet Privacy

One of the more interesting aspects of privacy in general is how people from different countries view the need. In the highly individualized United States, many… read more

Essay 3 pages (1058 words) Sources: 3 Topic: Computers / IT / Internet


Ethics in a Computerized Society Research Paper

Paper Icon

Ethics in a Computerized Society

Ethics are extremely important in our society since they help to determine whether an action is right or wrong. There are different types of ethical… read more

Research Paper 7 pages (2132 words) Sources: 6 Topic: Ethics / Morality


Ethics of Privacy Is a Very Controversial Research Proposal

Paper Icon

Ethics of privacy is a very controversial ethical issue that affects just about everyone in the world today. Who can access your information stored on computer systems? What kind of… read more

Research Proposal 7 pages (2370 words) Sources: 4 Style: MLA Topic: Computers / IT / Internet


Ethics in Information Technology Essay

Paper Icon

James Moor: What Is Computer Ethics

Given how new the field of computing is, it is no surprise to find that the field of computer ethics is still evolving. Issues… read more

Essay 6 pages (2011 words) Sources: 1 Topic: Computers / IT / Internet


Ethics of Virus Research Self-Replicating Code Essay

Paper Icon

Ethics of Virus Research

Self-replicating code, such as viruses and worms, are a part of the Internet landscape. The nature of their design means that they can quickly spread around… read more

Essay 7 pages (2230 words) Sources: 6 Style: MLA Topic: Computers / IT / Internet


Wed, Jun 26, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!