Abstract: This paper examines the use of Internet technologies (specifically SafeWeb.com) to counteract invasions of personal privacy and censorship. The paper begins by exploring the methods by which governments, corporations, and commercial agents invade personal privacy. It also discusses Internet censorship on the corporate and governmental levels. It then proceeds to discuss SafeWeb.com, a technology that allows Internet users to surf the Web privately and view censored content. The paper finishes by exploring some of the ethical issues raised by Internet privacy and censorship in specific relation to SafeWeb, concluding that the application of SafeWeb in circumventing the authority of governments and corporations is inherently unethical.
Part of the allure of the Internet has always been the anonymity it offers its users. As the Internet has grown however, causing capitalists and governments to enter the picture, the old rules are changing fast. E-commerce firms employ the latest technologies to track minute details on customer behavior. The FBI's Carnivore email-tracking system is being increasingly used to infringe on the privacy of netizens. Corporations now monitor their employees' web and email usage. In addition to these privacy infringements, Internet users are also having their use censored, as governments, corporations, and other institutions block access to certain sites. However, as technology can be used to wage war on personal freedoms, it can also be employed in the fight against censorship and invasion of privacy.
Network technologies have allowed for an unprecedented invasion of persona...
... middle of paper ...
Cooper, Charles. Saudi Arabia's Battle of the Bits. 2001. ZDNet. Feb. 20, 2001.
Tanaka, Jennifer. The Secret (Server) Service. 2001. AdWeek. Feb. 20, 2001. <http://www.adweek.com/daily/January/iq/iq012001-2.asp>.
The 20 Enemies of the Internet. 1999. Radio Free Europe / Radio Liberty. Feb 20, 2001. <http://www.rferl.org/nca/special/enemies.html>.
Sussman, Leonard R. The Internet and Press Freedom 2000. 2000. Freedom House. Feb. 20, 2001. <http://www.freedomhouse.org/pfs2000/sussman.html>.
Graham, Robert. Carnivore FAQ. 2000. Feb. 20, 2001. <http://www.robertgraham.com/pubs/carnivore-faq.html>.
Conrey-Miller, Andrew. The Pros and Cons of Employee Surveillance. 2001. Feb. 20, 2001. <http://www.websense.com/company/news/features/01/020501.cfm>.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- It has become a sad fact that in today’s society the truth is that the right to one’s privacy in the information technological world has simply become a joke. The growth of computers and information technology has raised new personal challenges in today’s world. All our personal information be it our health data, financial information, demographic information or our children’s information, has become digitized and is stored in the servers which are beyond our control. The Fourth Amendment to the U.S.... [tags: Internet ]
1355 words (3.9 pages)
- New technologies raise new ethical challenges besides new technical problems. Cloud computing is the recent technology in IT that moves the data away from portable storage devices to large data centers called cloud. It basically means that every application given as services over the Internet to the user. In the view of User it is accessing his/her files, programs and other services through Internet which are hosted by other service providers. One more aspect of cloud computing is the cost effectiveness of this technology which attracted enterprises to use this technology to consume their IT services in a cost effective way.... [tags: technology, cloud, ethical]
1447 words (4.1 pages)
- Living Proof, Miss Evers Boys, You Don’t Know Jack and the Ethical Issues Each Case Faced Wendy E. West Brown Mackie College July 27, 2015 Abstract This paper explores the ethical issues that were faced in three different movies. The first movie, Living Proof, is based on the true story of breast cancer research and the drug Herceptin. This movie deals with the issues of funding the project and the criteria needed to be accepted into the trial. The movie follows the story of seven women with breast cancer that campaigned to receive the drug Herceptin.... [tags: Ethics, Morality, Voluntary euthanasia, Cancer]
1713 words (4.9 pages)
- ... Responsible sourcing of minerals is another ethic policy that Apple holds a high regard for. Their supplier must be in accordance with the Organization for Economic Co-operation and Development (OECD) “…Due Diligence Guidance for Responsible Supply Chains of Minerals from Conflict-Affected and High-Risk Areas, on its entire supply chain with respect to the sourcing…” of all metals, including tin, gold, tantalum, and tungsten contained in its products—this must be accomplished to decide whether those metals are from the “…Democratic Republic of the Congo (“DRC”) or any adjoining country and, if so, to determine whether those metals directly or indirectly financed or benefited armed groups... [tags: Customer service, Customer, Data warehouse]
1083 words (3.1 pages)
- ... For example, an animated advertisement on a static web page may increase fixation since the motion will grab the user’s attention throughout the search process. Fixation location involves the part of the visual range that the studied person fixates on. Commonly, the areas that eyes fixate on are the most important due to experience, curiosity, shock, and significance. It has been more than a century that psychologist use eye tracking for psychoanalysis. Complex psychological profiles can be created from people by using eye movement analyzing.... [tags: wearable computer, privacy, secrecy]
1733 words (5 pages)
- ... To be more specific, all false information distributed can be used against the victim when it comes to this issues because they can give location, health condition, and other information that shouldn’t be released to the public, but instead to the family members before anyone else. • Your reaction to the ethical issues raised by the information in the article: o Credibility: I understand the demand to distribute and receive information in short amount of time because of the quick time expansion and the need to receive the maximum ratings.... [tags: Ethics, Critical thinking, Distributor, Source]
1046 words (3 pages)
- ... Law enforcement are the true criminals because they will go to any means to convict someone. There have been over five thousand six hundred federal request for customers’ personal information. Microsoft fights for human rights and to give their customers the privacy they pay for. However, if any company distributes personal records to the government under a gag order against the company cannot tell their customers. Microsoft’s lawsuit sets the stage for another high-profile confrontation between the government and a tech giant.... [tags: Law, Human rights, Privacy]
1342 words (3.8 pages)
- Ethical Issues Raised by Data Mining Data mining is the practice of gathering data from various sources and manipulating it to provide richer information than any of contributing sources is able to do alone or to produce previously unknown information. Businesses and governments share information that they have collected with the purpose of cross-referencing it to find out more information about the people tracked in their databases. Data mining has many benefits. Stores are able to stock merchandise that better reflects what customers want.... [tags: Databases Technology Computers Essays]
3397 words (9.7 pages)
- Ethical Management of E-mail Privacy As I am sitting at my work station in a crowded office building, I hear the wonderful sound of "You've got mail." In turn I open my E-mail mailbox and find a letter from a nearby employee. This letter contains the usual funny joke of the day and a short joke ridiculing the boss, as usual. Who was to know that my supervisor would eventually find this letter, which would lead to both the termination of my job and my fellow employee. Do you feel this is right.... [tags: Privacy Electronic Email ]
2392 words (6.8 pages)
- Privacy Globalization is the tendency of businesses to spread throughout the world to offer their products and services. To reflect their global market presence, multi-national companies have adopted management models such as region-specific management, and product-specific management to maximize the potential to offer efficient products and services to their customers. One such management model that has been successful in the past few years is the business process outsourcing model. Businesses outsource processes such as back office operations and customer support services offshore.... [tags: Business Information Essays]
2203 words (6.3 pages)