The Name of the Class
The Name of the School
Electronic systems reach so deeply into the every aspect of our lives that it is literally impossible to imagine our world without them. What everyone has to realize is that all those systems are always trying to improve their performance based on the data the every user provides. Such parts of our everyday life as google search, online shopping, reading favorite blogs, using health insurance, taking a taxi, travelling, give to their creators every opportunity to collect data from the users in order to get a deeper insight on what exactly user wants, what is the user’s online behavior, and what exactly company can do in order to provide a better service.
But there are a lot of downsides of this situation. First of all, every party should be informed beforehand which data are being collected. Secondly, since users trust the company with a sensitive personal information, the company has to ensure that all private data are stored on secure servers (Williams, 2016). Thirdly, there is always a threat that some information will be not only leaked, but purposely sold to the third parties and it cannot be allowed (Ramey, 2015). It is also important for every provider of the information to be able to revoke the right to use this information at any time by the first demand.
References
Ramey, K., 2015. 5 Ethical Challenges of Information Technology - Use of Technology. [online] Use of Technology. Available at: http://www.useoftechnology.com/5-ethical-challenges-information-technology/ [Accessed 9 Jan. 2017].
Williams, R., 2016. Ethical Dilemma in the Use of Information Technology. [online] Smallbusiness.chron.com. Available at: http://smallbusiness.chron.com/ethical-dilemma-use-information-technology-18366.html [Accessed 9 Jan. 2017].
WARREN, E., JUSTICE, C., & SUPREME, U., 2005. Legal, Ethical, and Professional Issues in Information Security. Available at: http://www.cengage.com/resource_uploads/downloads/1111138214_259148.pdf [Accessed 9 Jan. 2017].