existing or emerging technology and its related ethical issues
Question Description
Instructions
Paper C2 (Individual) – Individual research paper on existing or emerging technology and its related ethical issues.
This is the second part of a three-part assignment, an individual assignment to research an existing or emerging technology and its ethical impact using the Web for the topic and questions that you selected for Paper C1. Please ensure that your research for this assignment addresses the ethical issues of an existing or emerging technology!
Prepare a minimum 3- 5 page, double-spaced paper and submit it to the Assignments Module as an attached Microsoft Word file. Indicate appropriate APA compliant reference citations for all sources you use. In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style.
Preparation for Paper C3 (see Table below):
The instructor has assigned Study Groups for the third part or Paper C3.
To assist in collaboration for Paper C3, please prepare and post an approximate one-page synopsis (i.e., a brief summary) of Paper C1 concerning your topic selection to your assigned Group topic under the Group Collaboration on Paper C3 forum in the LEO Discussions section. This will permit further interaction of the group in preparation for the group presentation of Paper C3. The synopsis should state why you feel this topic is important and describe any supporting resources you found supporting your choice.
To assist in the further collaboration for Paper C3 please post your research paper (i.e., Paper C2), when it is completed in the assigned Group topic under the Group Collaboration on Paper C3 forum in the LEO Discussions section. This will enable others in your Group to read additional details on the topic that you wrote about.
In order to clarify a potentially confusing situation for the C series of papers, due to overlapping dates, the following table has been constructed:
Item | x/xx – x/xx | x/xx – x/xx | x/xx – x/xx | x/xx – x/xx |
Paper C1 | Start paper | Complete and Post to Assignments | ||
Paper C1 – Synopsis | Prepare and Post to assigned Group topic under the Group Collaboration on Paper C3 forum in the Discussions section, when completed | |||
Paper C2 | Start paper | Complete and Post to Assignments | ||
Paper C2 | Post to assigned Group topic under the Group Collaboration on Paper C3 forum in the Discussions section, when completed | |||
Paper C3 | Groups review the Paper C1 synopsis and Paper C2 when they are posted and start to build consensus for the group topic to be featured in Paper C3 | Designate Group Leader and start paper by completing consensus building on the topic and commence group preparation of presentation. The designated Group Leader must identify him or herself to the Instructor | Group completes presentation and only Group Leaders post to Assignments and to the respective DT-8 Group topic. |
This is C1 answer
Social Networking and Privacy
Social networking has impacted the lives of human beings in numerous ways. Despite the wide range of benefits realized from its use, there have been several concerns about the privacy issues of the same. Each tweet or Facebook post shared via the internet reaches a wider audience than we could ever imagine. Every online move that we make seems to be leaving footprints that are later used by malicious individuals to get to us or even our pertinent personal information (Library, 2016). Consequently, there have been debates among philosophers on the information privacy of computers whereby there are concerns as to whether privacy should be defined as restricting the access to information, contextual integrity or even the control over information (University, 2016). The topic has therefore become a focal point of much attention and ought to be addressed from various dimensions. Thus, this article is a presentation of the questions raised over privacy in social networking.
Supernumerary, the first topic regards the third parties’ access to user information. Malicious individuals can collect data pertinent to a person’s for law enforcement, surveillance, commercial marketing, and even research. The course of action is promoted by the presence of facial recognition software that can match individuals with their pictures and others that can even collect and consequently publish an individual’s personal information without their consent. The applications are supported by the use of privacy cookies that track the online activities of a person. Therefore, lots of sensitive personal data remain under the risk of exposure (Vallor, 2016).
Moreover, social networking is also said to have sparked a series of predicaments interrelated with privacy culture. Could there be chances that these users will lower their privacy at one particular time due to the excellent control over the amount of their personal information that they share on social media? People fail to understand the implications of sharing too much of their confidential information on social media (Library, 2016). It is the feature of freely accessing personal data shared by others that makes it a favorite technique for unauthorized individuals to use in hacking private information. Therefore, there are no chances that violation of dignity and privacy will go unquestioned (University, 2016).
Lastly, scholars have also raised the question of intensity of the social network service’s architecture to the nature of human socialization behavior. The character of these systems is in a way that they treat the manner in which people relate in a similar way. There are distinct variations in the levels of friendship such as professional, marital and commercial. There should be boundaries, and the framework of these applications does not account for privacy in the vitiating social spheres (University, 2016). Therefore, an integral environment is one in which the information practices of people are contextually sensitive. Social media has failed to observe the limits of integrity.
References
Library, D. (2016). Legal and Ethical Implications. NCSU Libraries. Retrieved 22 (Please use UMUC Data base)
November 2016, from https://www.lib.ncsu.edu/social-media-archives-toolkit/legal University, S. (2016). Unavoidable Ethical Questions Social Networking - Resources - Internet Ethics - Focus Areas - Markkula Center for Applied Ethics - Santa Clara University. Scu.edu. Retrieved 22 November 2016, from https://www.scu.edu/ethics/focus-areas/internet-ethics/resources/unavoidable-ethical-questions-social-networking/
Vallor, S. (2016). Social Networking and Ethics. Plato.stanford.edu. Retrieved 22 November 2016, from http://plato.stanford.edu/entries/ethics-social-networking/#SocNetSerPri
This question has not been answered.
Create a free account to get help with this and any other question!
Brown University
1271 Tutors
California Institute of Technology
2131 Tutors
Carnegie Mellon University
982 Tutors
Columbia University
1256 Tutors
Dartmouth University
2113 Tutors
Emory University
2279 Tutors
Harvard University
599 Tutors
Massachusetts Institute of Technology
2319 Tutors
New York University
1645 Tutors
Notre Dam University
1911 Tutors
Oklahoma University
2122 Tutors
Pennsylvania State University
932 Tutors
Princeton University
1211 Tutors
Stanford University
983 Tutors
University of California
1282 Tutors
Oxford University
123 Tutors
Yale University
2325 Tutors