Preview

SBMT 2010

Powerful Essays
Open Document
Open Document
4413 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
SBMT 2010
Abstract:
Personal information is an essential part of our identification and is useful in many aspects of our life. However, it's also becoming more and more vulnerable in contemporary society with a multitude of approaches for collecting and using people’s information emerges. The leak and abuse of personal information can cause serious troubles to people’s life and selling others’ information for commercial purposes has long been regarded as unethical behaviour in business world. With the backdrop of the recent privacy violations committed by the Octopus Card Company ,wherein they sold the personal information of users to corporations, we thought it was of the utmost importance to increase awareness about the severity of the issue by providing users’ with thorough research on the issue as well as means to minimise the harm. By researching the current condition of personal information security and providing people with useful information on how to protect their personal data, we hope that our project can help people cope with this ethic issue. We believe that knowledge is power and an alert consumer is a safe consumer. Hence, we created a research-oriented website wherein research was conducted using academic reports, personal surveys, in-person meetings and interactions with decision making authorities like the Privacy Commissioner of Personal Data of Hong Kong. Then, we compiled this research together and disseminated it by uploading it onto our website (http://businessethics07.wix.com/information-security) and marketing that website through in-person meetings with individuals off-campus, various online consumer forums in Hong Kong, social networks like Facebook and Twitter and by conducting a talk on the campus of the Hong Kong University of Science and Technology.
INDEX (Andre:, make this?)
In today's contemporary world, knowledge is power. Just as we lock our houses before leaving for work or school in the morning, it is necessary to protect your

You May Also Find These Documents Helpful

  • Powerful Essays

    Sb202

    • 899 Words
    • 4 Pages

    Results of a Phase 2 Efficacy and Safety Study with SB204, an Investigational Topical Nitric Oxide-releasing Drug for the Treatment of Acne Vulgaris…

    • 899 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Websites are routinely collecting information about customers and visitors to understand and serve their customers better. Personal information is collected and administrated with integrity, responsibility, and security.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Since the dawn of civilization, man has sought to further communication and interaction with his fellow man. The motivation behind this pursuit has been many fold: Some sought and seek this interaction for economic purposes, some for cultural purposes, and some still for educational purposes. Regardless of the incentive, different people in different times have sought to enhance the technology so as to further this pursuit. From the advent of writing in pre-bronze age Mesopotamia to the creation of the printing press in Renaissance Germany to more modern inventions like the radio and telegraph, much of human history has been devoted to making this large world smaller and smaller and furthering our communication and interaction. In this vain, society invented the internet, possibly the most revolutionary piece of technology in human history. Like the other aforementioned innovations, the internet provided man a medium to communicate with his fellow man. Yet, the internet furthered the pursuit of shrinking the world so much that thanks to it, physical distance is a small hindrance in the free exchange of ideas and opinions. One of the major disciplines constructing internet based communication is social networking. During the recent years, social networking has been the victim of ethical issues concerning vigilance and safeguard of privacy for the members and their personal data. The invasion of personal information is a cause of distress for many individuals and organizations. Moreover, it has become an issue that requires constant effort from the concerned parties who are striving to create a safe and comfortable environment for everyone to communicate on these social sites. During the course of this paper some ethical issues regarding the social networking sites such as Facebook will be discussed and the decision making process will be implemented to explore alternatives and implement the solutions.…

    • 1126 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    The year is 2010, the era is the 21st century; and we, citizens of the world, are living in the Information Age. Our information is made available on the Internet where it can be viewed by millions. The days where our data was recorded on scraps of paper and left in a box in an office along with thousands of other registers are long gone. Our personal data is permanently recorded in the hard drives of computers where they can be analysed and exploited by anyone with access to that computer; or worse, identity thieves and hackers may get their hands on the data.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    The word 'privacy' means different things to different people, it affect both personal and business. As individuals, we need some amount of privacy to succeed. As a person we need to protect our thoughts from intruders because if others new our must intimate thoughts they could use that information to manipulate our decision making process. Business, need to protect their trade secret and information they collect from their customer to succeed. My objectives for this week e-activity consist of, evaluating the circumstances that contributed to the privacy violation, the consequence to the company to the breach, and management’s response to the breach, indicating the appropriateness of the response. Facebook is an online social network that allows users to create detailed online profiles and connect with other users, with an emphasis on social relationships such as friendship. This network let users share information with other approved users, such as one’s gender, age, interests, educational background and employment, as well as files and links to music, photos and videos. As concerns about online privacy grow, users of social media sites are increasingly looking for new way to improve their social media experience by posting more personal information and intimate picture about themselves. A class action…

    • 820 Words
    • 4 Pages
    Good Essays
  • Good Essays

    We must be secure in your life, to keep your things safe from anyone or any damage. The consequences of losing items vary from item to item according to its value and importance. For us to be able to function in today’s society requires security. And this security is needed in almost every aspect of life; no matter how large or small it may be.…

    • 508 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Privacy is a person’s right to control access to his or her personal information. Everybody value the protection of their personal information. No one wants to see some of their personal information made public, especially on the internet. However, the recent evolution of technology has started to threaten every individual’s privacy by reducing the amount of control that they had over their personal data and making it possible for people who do not have the proper authority to access them. According to Zalta (2014), the 21st century has become the century of Big Data and advanced Information Technology allows for the storage and processing of exabytes of data. The combination of increasing power of new technology and the declining clarity and agreement on privacy give…

    • 480 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Information Acts Paper

    • 418 Words
    • 2 Pages

    Technology advancements made it necessary to protect everyone’s privacy since it had become much easier to store and access an individual’s personal data within a corporation’s database. According to our text: “privacy is the right to be left alone and to be free of unreasonable personal intrusions. Information privacy is the right to determine when, and to what extent, information about yourself can be gathered and/or communicated to others (Rainer & Cegielski, 2011, pg. 79). Identity theft has become a very serious issue since technology advancements have made it easier for criminals to commit Identity Theft or allow companies to track one’s habits and create a personal profile of a consumer within seconds.…

    • 418 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cell Phone Impact

    • 978 Words
    • 4 Pages

    The new technology and apps make things simpler for the consumer but also make personal information less secure and more accessible to identity thieves. This is a concerning and a more common problem that we face wich impacts individuals in a very negative way.…

    • 978 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Personal Privacy

    • 813 Words
    • 4 Pages

    The purpose of this paper is to explain what I use to protect my personal privacy. There are many different things that can be use to protect someone’s information and keep hackers from accessing their computer. Some people use anti-virus, firewalls and anti-spam software to help protect their personal privacy. As we all know with today’s technology having just anti-virus or firewalls are not good enough, but having something is better than nothing. They do not protect you from new or custom-made viruses and evil-scripts. There is no one solution to protect you from Identity Theft, it’s just too many threats to keep up with, and having one software will not do the job for you. One key to protecting your information would be multi-layer protection; this means having more than one program monitoring you computer for different reasons.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Case 12-1

    • 335 Words
    • 2 Pages

    As we have increasing privacy and risk concerns in the world today with identity theft, questionable marketing, data mining, and profiling, it is becoming increasingly important to explore how consumers feel and react to the use of their data. This study makes an important contribution to the literature by presenting common positive and negative myths surrounding these issues and exploring how ethical or unethical consumers believe these practices are by looking at the myths and their reaction to them. We focus on consumers’ perceptions because at the end of the day it is what the consumers perceive to be happing that will determine their reaction. An ethical data practice is one that is believed to increase consumer,…

    • 335 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Contemporary information systems technology, including internet technologies, challenges traditional regimens for protecting individual privacy and intellectual property. Data storage and data analysis technology enables companies to easily gather personal data about individuals from many different sources and analyze these data to create detailed electronic profiles about individuals and their behaviors. Data flowing over the Internet can be monitored at many points. The activities of website visitors can be closely tracked using cookies and other web monitoring tools. Not all websites have strong privacy protection policies, and they do not always allow for informed consent regarding the use of personal information.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Over the last few years the internet crime industry has changed very dramatically. Think back almost twenty years ago, computers were just beginning to make their marks in the professional world. However, big companies were the main individuals with computers, mainly because they weren’t that popular in homes. Nowadays, computers can be found anywhere. They are so convenient and you can do almost anything from a computer, pay a bill, shop, order food, even banking. The convenience has even been extended to a cell phone or smart phone as they are referred too. At the same time, all of the convenience and little to no security method is implemented. This proposal is geared to help people who have been victimized. Surveys, secondary data, and field research will all be of help to anyone that needs it.…

    • 2464 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Back in the 599-661 CE, Imam Ali first mentioned “Knowledge is power” (Nahj Al-Balagha, Saying 146). Today, we are living in a world where knowledge has become a commodity, thus, knowledge being a form of power has also been exploited. Some services, goods, and information have become instant to obtain because of technology—an applied knowledge. Despite the benefits that people get from the easy access of these things, gaps like the digital divide and social stratifications widened and…

    • 1112 Words
    • 5 Pages
    Good Essays