Tuesday, May 5, 2020
Article Review Of Privacy Will Hit Tipping Point In 2016 Free Sample
Question: Describe about the Article Review of Privacy Will Hit Tipping Point in 2016. Answer: Introduction Privacy is great matter of concern in the contemporary times. There are several examples of violating privacy measures. In this review of Privacy will hit tipping point in 2016 the story is analyzed with respect to the ethical theories. Analysis of the Article According to Ethical Theories Application of Deontological ethical theory on the article Deontological theory of ethics states that it puts emphasis on the interrelationship between the duty and moral consent of the human being (Birnbaum Lach, 2014). Deontological ethical theories have several formulations of ethics (LaFollette Persson, 2013). Among all of these ethical formulations in deontological ethics, Kantianism is selected in order to evaluate the news story: Privacy will hit tipping point in 2016. According to the Kantianism, the duty comes in the first priority (Floridi Taddeo, 2014). Every god thing is considered good, as because the intention behind it is good, the result may be right or wrong. According to the context of the story paying for fewer ads with more privacy is not harmful for the society as there will be advertiser and user both are getting benefitted. It is the duty of the organization those are using internet for making transaction or providing other facilities to their user to understand the concern of their user about privacy measures (CNBC, 2015). Fewer ads will be releasing less amount private data of the user. Facebook has not adopted this morale where, Google has changed their privacy landscape. According to the context of the report it is found that the add blocking companies like AdBlock, AdBlock Plus are willing to collaborate with the internet companies that are providing services to the users in conjunction with that they will not be harming their private data (CNBC, 2015). According to Kantianism they are being offensive to their duties and claiming for that option which will directly harm their users (Chen Zhao, 2012). On the other hand, the decision of blocking ads will reduce the value of advertisement revenue model. Regulatory wrath against privacy violators highlights the importance of the regulatory measures of the government that is emphasising their duty towards the user of Internet of things. According to the surveys, it is found that $32.5 million and $25 million are charged on Apple and ATT for their inconvenient feature that was falling under strict regulatory measures (CNBC, 2015). In addition to this, Disney has showed their concern over their duty toward their customers by providing appropriate privacy measures and applications within their services. Mobile wallet application is getting viral as the organization is securing the private data of the users by making encrypted online transactions possible (Enck et al., 2014). According to the Kantianism, Mobile wallet is doing their duty towards their concerned customers that is displaying their brand value in the competitive market. California government has also focused in case of privacy concern about their citizens (CNBC, 2015). This also highlights their focus on their duty that is in turns providing benefit to their citizens as well as the government. Application of Utilitarianism ethical theory on the article Utilitarianism theory of ethics is concerned with the normative form of ethics. This explains that the best moral form is the one that maximizes the utility of any situation (Stahl et al., 2014). It emphasizes the quality of pleasure but not the quantity (Guo, 2013). Finding the importance and impact of the good things highlight the specification of utility. According to the context of the news story, it is found that paying for fewer ads with more privacy is protecting the concern for the user safety. Facebook and Google followed different privacy frameworks to support their revenue model (CNBC, 2015). Though the average revenue per user of Google is low, still the utility of their system is high as it is providing ultimate pleasure to the user as well as to the advertisers. Blocking the ads may be nominated as the most useful aspect from the user perspective. AdBlock and AdBlock Plus are providing the protection of private data of the users (CNBC, 2015). Utilitarianism can nominate this aspect with highest utility from the users perspective. Several industries had to pay certain amount of money for the wrong providence to the users. Apple had to pay 32.5 million dollar of money for providing kids app without parental control. ATT had to pay 25 million dollar for effective data breaches happed within their organization that harmed the harmony of the country (CNBC, 2015). This scenario shows that this system is of low utility. Mobile wallet application is guarding several transactions of users. This prioritizes user data protection (CNBC, 2015). According to the context of Utilitarianism theory, this is of worth more than anything in contrast with utility perspective is. California government applied two laws on the privacy measures within their organization (CNBC, 2015). These two laws not only stopped the breaches but also show it utility over their citizens. Recommendations Following are the recommendations those are decided according to the context of the news story: Privacy protection: In case of the paying for fewer ads with more privacy, if the organizations providing the internet facilities use the concept of the ad blocks then it will benefit the users as well as the ad providers. Use of ad blocking apps: This aspect will reduce the chances of the leakage of data. Establishment of regulation policies against privacy violation: There must be some regulatory measures to prevent the wrong use of the internet or software. Use of Mobile Wallet: Utilization of this mobile application helps to protect the user from being leaked. Regulatory measures in California: California government should restrict the usages of the private data but according to the context of the news story it is found that there must not be two laws related to privacy measures of data, as these laws cannot be established and be obeyed at a time. There must be a single law to regulate the measures of the private data. Conclusion This can be concluded that according to the ethical evaluation of the news story about violation of privacy measures, breaches, violation of the data security measures it can be found that these are affecting human as well as organizational context from different perspectives. The news story is analyzed with respect to Kantianism ethical theory in this literature review. References Birnbaum, R., Lach, L. (2014). Teaching About What Ethical Social Work Practice Means: Responsibility Starts With Schools of Social Work.Lencadrement juridique de la pratique professionnelle, 37. Chen, D., Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. InComputer Science and Electronics Engineering (ICCSEE), 2012 International Conference on(Vol. 1, pp. 647-651). IEEE. CNBC. (2015).Privacy will hit tipping point next year: Study. [online] Available at: https://www.cnbc.com/2015/11/09/privacy-will-hit-tipping-point-in-2016.html [Accessed 15 Sep. 2016]. Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B. G., Cox, L. P., ... Sheth, A. N. (2014). TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones.ACM Transactions on Computer Systems (TOCS),32(2), 5. Floridi, L., Taddeo, M. (Eds.). (2014).The ethics of information warfare(Vol. 14). Springer Science Business Media. Guo, K. H. (2013). Security-related behavior in using information systems in the workplace: A review and synthesis.Computers Security,32, 242-251. LaFollette, H., Persson, I. (Eds.). (2013).The Blackwell guide to ethical theory. John Wiley Sons.Peltier, T. R. (2016).Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Stahl, B. C., Doherty, N. F., Shaw, M., Janicke, H. (2014). Critical theory as an approach to the ethics of information security.Science and engineering ethics,20(3), 675-699.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.