The motivation behind Moor's 2005 paper on why we need better ethics in developing technologies can be easily seen as we continue our progress through the Information Age. The internet, itself a sub-revolution of the greater Computer Revolution, is vital to communicating and conducting business in the world of today. While the practices of many sites operating on the internet and how they gather data are not strictly unethical, the ways in which the intentions of some websites are communicated can be tricky to understand.
Every website has a policy on how they collect and share data. This may entail how a company keeps data they collect safe, but it may also describe the ways in which a website shares data. This policy is publicly available through a sometimes cryptic document called a privacy policy, which Wikipedia defines as:
...a statement ... that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data. ...
[client's data] can be ... the person's name, address, date of birth, ... ID issue, ... financial records, credit information, medical history, where one travels, and intentions to acquire goods and services.
Laws do exist to make policies easier to understand, however the world remains divided on what data websites can collect and use. Where legal, the collected data is sometimes sold as a source of revenue alongside more traditional sources of income, like selling ad space or subscription fees. Entities that acquire this data may be brokers who gather information with the expressed intent to sell it to others, meaning...
the only thing separating your data from someone you don't want to have it could be nothing more than an inexpensive pay wall.
Hi Thomas,
ReplyDeleteI enjoyed reading your post and think it brings up a very important idea of data security. You incorporated the readings into your post and added hyperlinks so that readers could do further research into the topic which was nice. I especially like your end quote because this is something that most people do not realize; that your information can be bought from data brokers for pretty cheap. I liked the picture you added with the different cybersecurity laws for each country, but I believe you could have explained what those entail and how each one is different from one another.
I liked how you wrote about an extremely relevant yet controversial topic. The connection to both Turilli/Floridi's and Moor's readings was clear, and it was clear that you made an effort to build off of their claims not just summarize them. I was surprised to learn how easy it can be to protect my data. However, at what point do you think users should take personal responsibility for protecting their personal data? Overall, I really enjoyed your article. The only thing I would recommend is adding a caption explaining your infographic.
ReplyDelete