existing or emerging technology and its related ethical issues

rgbyb
timer Asked: Dec 1st, 2016

Question Description

Instructions

Paper C2 (Individual) – Individual research paper on existing or emerging technology and its related ethical issues.

This is the second part of a three-part assignment, an individual assignment to research an existing or emerging technology and its ethical impact using the Web for the topic and questions that you selected for Paper C1. Please ensure that your research for this assignment addresses the ethical issues of an existing or emerging technology!

Prepare a minimum 3- 5 page, double-spaced paper and submit it to the Assignments Module as an attached Microsoft Word file. Indicate appropriate APA compliant reference citations for all sources you use. In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style.

Preparation for Paper C3 (see Table below):

The instructor has assigned Study Groups for the third part or Paper C3.

To assist in collaboration for Paper C3, please prepare and post an approximate one-page synopsis (i.e., a brief summary) of Paper C1 concerning your topic selection to your assigned Group topic under the Group Collaboration on Paper C3 forum in the LEO Discussions section. This will permit further interaction of the group in preparation for the group presentation of Paper C3. The synopsis should state why you feel this topic is important and describe any supporting resources you found supporting your choice.

To assist in the further collaboration for Paper C3 please post your research paper (i.e., Paper C2), when it is completed in the assigned Group topic under the Group Collaboration on Paper C3 forum in the LEO Discussions section. This will enable others in your Group to read additional details on the topic that you wrote about.

In order to clarify a potentially confusing situation for the C series of papers, due to overlapping dates, the following table has been constructed:

Item

x/xx – x/xx

x/xx – x/xx

x/xx – x/xx

x/xx – x/xx

Paper C1

Start paper

Complete and Post to Assignments

Paper C1 – Synopsis

Prepare and Post to assigned Group topic under the Group Collaboration on Paper C3 forum in the Discussions section, when completed

Paper C2

Start paper

Complete and Post to Assignments

Paper C2

Post to assigned Group topic under the Group Collaboration on Paper C3 forum in the Discussions section, when completed

Paper C3

Groups review the Paper C1 synopsis and Paper C2 when they are posted and start to build consensus for the group topic to be featured in Paper C3

Designate Group Leader and start paper by completing consensus building on the topic and commence group preparation of presentation. The designated Group Leader must identify him or herself to the Instructor

Group completes presentation and only Group Leaders post to Assignments and to the respective DT-8 Group topic.


This is C1 answer

Social Networking and Privacy

Social networking has impacted the lives of human beings in numerous ways. Despite the wide range of benefits realized from its use, there have been several concerns about the privacy issues of the same. Each tweet or Facebook post shared via the internet reaches a wider audience than we could ever imagine. Every online move that we make seems to be leaving footprints that are later used by malicious individuals to get to us or even our pertinent personal information (Library, 2016). Consequently, there have been debates among philosophers on the information privacy of computers whereby there are concerns as to whether privacy should be defined as restricting the access to information, contextual integrity or even the control over information (University, 2016). The topic has therefore become a focal point of much attention and ought to be addressed from various dimensions. Thus, this article is a presentation of the questions raised over privacy in social networking.

Supernumerary, the first topic regards the third parties’ access to user information. Malicious individuals can collect data pertinent to a person’s for law enforcement, surveillance, commercial marketing, and even research. The course of action is promoted by the presence of facial recognition software that can match individuals with their pictures and others that can even collect and consequently publish an individual’s personal information without their consent. The applications are supported by the use of privacy cookies that track the online activities of a person. Therefore, lots of sensitive personal data remain under the risk of exposure (Vallor, 2016).

Moreover, social networking is also said to have sparked a series of predicaments interrelated with privacy culture. Could there be chances that these users will lower their privacy at one particular time due to the excellent control over the amount of their personal information that they share on social media? People fail to understand the implications of sharing too much of their confidential information on social media (Library, 2016). It is the feature of freely accessing personal data shared by others that makes it a favorite technique for unauthorized individuals to use in hacking private information. Therefore, there are no chances that violation of dignity and privacy will go unquestioned (University, 2016).

Lastly, scholars have also raised the question of intensity of the social network service’s architecture to the nature of human socialization behavior. The character of these systems is in a way that they treat the manner in which people relate in a similar way. There are distinct variations in the levels of friendship such as professional, marital and commercial. There should be boundaries, and the framework of these applications does not account for privacy in the vitiating social spheres (University, 2016). Therefore, an integral environment is one in which the information practices of people are contextually sensitive. Social media has failed to observe the limits of integrity.


References

Library, D. (2016). Legal and Ethical Implications. NCSU Libraries. Retrieved 22 (Please use UMUC Data base)

November 2016, from https://www.lib.ncsu.edu/social-media-archives-toolkit/legal University, S. (2016). Unavoidable Ethical Questions Social Networking - Resources - Internet Ethics - Focus Areas - Markkula Center for Applied Ethics - Santa Clara University. Scu.edu. Retrieved 22 November 2016, from https://www.scu.edu/ethics/focus-areas/internet-ethics/resources/unavoidable-ethical-questions-social-networking/

Vallor, S. (2016). Social Networking and Ethics. Plato.stanford.edu. Retrieved 22 November 2016, from http://plato.stanford.edu/entries/ethics-social-networking/#SocNetSerPri

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

This question has not been answered.

Create a free account to get help with this and any other question!

Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors