Value creation technology - National Chi Nan University

Download Report

Transcript Value creation technology - National Chi Nan University

Privacy in the Age of the
Internet
Dilemma of Internet Civilization
Provocations



A complete privacy vs. a de facto tapestry
of privacy
Balance between individual privacy and
social participation
The requisite foundation: a means for
enforcing each individual’s zone of
inaccessibility.
Is ethics the caboose?



Data collection as a by-product of the constant
use of electronic communications technology
An asynchronous principle: the development of
values, strategies, and policies for achieving
common good lag behind technological innovation
Wanted:


Profound sense and investment on public safety and
public health potentially encouraged or threaten by
technological innovation
moral, legal, social issues that arise when servicing the
common good entails violating privacy.
A case: the Internet terrorism


A mysterious intruder called the Russian Maxim
copied CD Universe’s customer credit card files in
1999
The Internet terrorist Maxim as an e-blackmailer
threatened the card owners to pay $100,000 for
fixing the Internet bugs or he will make their
credit card numbers available to the public on a
foreign website before Jan. 2000.
Ethics and privacy

Ethics is concerned with human well-being and
emerged out of human relationships.


Ethical issues arise when one member of society, in the
pursuit of his or her own goals, impedes or inhibits the
ability of another to achieve his or her own goals.
Privacy refers to “the state of being free from
intrusion or disturbance in one’s private life or
affairs.”


The negative right to be “left alone”
The positive right to choose whom or what he or she
will share personal information
Ethics vs. law

The former



A norm of moral regulation to guide people to behave
prudentially in a proper relation to others
The regulation for careless side effect arises whenever
any unpredictable or unintended consequences come
beyond the antecedes of goodness.
The latter


A code for directing or deterring some specific
behaviors
The anti-crime disposal especially to the purposeful
actions for personal interest regardless of the harm
insulted to others
Privacy in the customer-toseller relationships

An intimate cyber enterprise offers the cradle-tograve services



Cyberhome.com provides a large array smart toys to the
children and continuously reprograms the provision to meet
the changes of children’s interests, knowledge, and skills
Marketing enthusiasm and empathy foster the customers’
mind share and sustain their loyalty
A housebreaker or robber?

By Culnan’s survey: 92.8% of websites collect some personal ID
and 56.8% collect personal demographic information. Only 6.6% of
the sites collected no personal information
Immediate gratification may
threaten trust

Many dot.coms’ personal portal and customization
strategy



a far-reaching repository capturing highly personal
information about each customer from demographic
data, gender, age, wealth, buying preferences, health,
habits, friends and associations
Unregulated power makes customers vulnerable
Trust should be justified/falsified, esp. between
strangers, through

Familiarity, calculative-ness, institutional arrangement
Decision structures are susceptible
to information temptation



A bargain with the fiduciary on each decision
structure containing helping and controlling
services
Controlling information possesses power as well
as business opportunity
However, power could corrupt integrity

Augmented by the data mining approaches, neural
network, artificial intelligence, decision analysis,
statistical rules, OLAP, etc.
A case of a powerful
information controller

Fidelity personal investments and brokerage
group

Allowing the customer to customize the personal
financial service through a common platform of
automatic linkage to several international finance
institutions, such as, Merrill Lynch, Bank of
America, Prudential Insurance, Metropolitan Life,
Allstate, Visa, Glendale Federal Savings and Loan,
Citicorp, etc.
Illegal detection of customer
behavior



Cookies—Amazon’s 1-click action
A secret cyber-wiretap—DoubleClick’s
advertisement web bug for monitoring
the surfer’s activity
Without privacy therapy, more intrusive
symptoms emerge—demanding
institutional lawsuits and enforcements
Data about employees is also
a temptation



The degree of necessary information about an
employee is entitled to collect?
How may it be used?
With whom within the firm may it be shared?


With whom outside the firm may it be shared?


The trap of e-blackmailer
Illegal transfer s of information
Who will be in charge for ensuring the personal
information to be accurate, complete, secure,
and confidential?
Fair organizational information
principles

Derived from 1973 code of U.S.
Department of Health, Education, and
Welfare





Notice,
Choice,
Access,
Correction,
Data stewardship
Some other codes




A self-regulation within industry—Individual Reference
Service Group (IRSG) maintains the industry principles
governing the collection, use, and distribution of personally
identifiable information
The Health Insurance Portability and Accountability Act of
1996 (HIPAA)—mandate how healthcare providers and
insurance firms are to maintain and disclose the clients’
information
Privacy for Consumers and Workers Act of 1991
Coalition Against Unsolicited Commercial E-mail (CAUCE)—
deter the spam & spyware
Some other codes (cont.)




EU deter the Internet terrorism based on the country of
destination principle rather than FTC’s the country of origin
principle
EU’s Directive 95/46/EC of the European Parliament and of
the Council of 24 October 1995 on the protection of
individuals with regard to the processing of personal data
and on the free movement of such data
IEEE-CS, ACM, AITP, ICCP, etc, develop IT professional
codes of ethics—violators may lose their membership
U.S. Patriot Act of 2001—allow FBI to attach to the ISP
servers to monitor email
Extending readings




Lessig, Lawrence (1999), Code and Other Laws of
Cyberspace, Basic Books.
Lessig, Lawrence (2001), The Future of Ideas: The Fate of
the Commons in a Connected World, Random House.
Vaidhyanathan, Siva (2002), Copyrights and Copywrongs:
The Rise of Intellectual Property and How It Threatens
Creativity, New York University Press.
Stallman, Richard M. and Lawrence Lessig (2002),Free
Software, Free Society: Selected Essays of Richard M.
Stallman, Free Software Foundation.