Preview

Data on Sale

Satisfactory Essays
Open Document
Open Document
657 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data on Sale
|Case Study: Data for Sale |
|Management Information System |
| |
| |
|Submitted By: |
|Samir Shrestha, 12532 |
|16th December 2012 |
| |
|EMBA 2012 |

1. Do data brokers pose an Ethical Dilemma? Explain your answer.
Answer:
Data brokers have both negative and positive social impact as such they pose an ethical dilemma.

In one hand, from the case, we know that information that data brokers provide or sell to its customers like Internal Revenue Service and Department of Homeland Security and Justice have used for law enforcement and counterterrorism. More broadly, these data are being used to locate the assets of delinquent taxpayers, and screen candidates for federally controlled airport security workforce. Likewise, the insurance companies, banks and state and local government agencies benefits from these vast pool of personal information to develop new products and services and/or to devise their marketing strategies. In short, the data brokers are

You May Also Find These Documents Helpful

  • Good Essays

    Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Mgt7019-5 It Challenges

    • 3406 Words
    • 14 Pages

    |Moor, J. H. (2005). Why We Need Better Ethics for Emerging Technologies. Ethics and |…

    • 3406 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    References: Otto, P. N., Anton, A. I., & Baumer, D. L. (2007, September/October). The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information. IEEE Security and Privacy , 15-23.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The events of September 11th, 2001 have had a larger impact on the United States Intelligence Community than any single event in its history. It forced the U.S. Intelligence community to look critically at their policies, organization, and how they handled business. The Joint Inquiry, 9/11 Commission, and Inspectors General found numerous deficiencies in communication, technological capabilities, and limited oversight. The government responded to these gaps through creation of legislation, implementation of regulations, a massive restructuring of the intelligence community, and utilization of new technologies.…

    • 1813 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    High technology gives criminals the opportunity to obtain valuable information. They are considered a cyber-threat. Criminals usually get illegitimate or legitimate work-related access to a company’s computer resources to sell wanted information.…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ISP Survey

    • 1455 Words
    • 5 Pages

    All Americans will need to have working relationship with the DOJ, that is, the Department of Justice, at some point in their lives. The DOJ is the agency that enforces federal laws. In its mission statement it states that the mission is to “… ensure public safety against threats foreign and domestic; to provide federal leadership in preventing and controlling crime; … and to ensure fair and impartial administration of justice for all Americans.”(Department of Justice, 2015) This document serves as a survey of the DOJ 2640.2F, Information Technology Security Policy and how this Program complements the mission, goals and objectives of the Department of Justice as well uncover weaknesses in the Program and include recommendations to reconcile these weaknesses.…

    • 1455 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    The intelligence may collect information notwithstanding that the law enforcement agency intends to use the information collected for purposes of a law enforcement investigation or counterintelligence investigation (Fritsch et al, 2015). Thus, this alters the traditional distinction between intelligence and law enforcement. So, the connection of these two government function raises questions concerning the methods of collection, targets of collection, and the use of the resulting information, corresponding with the development of Fourth Amendment jurisprudence.…

    • 1029 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Patriot Act Paper

    • 572 Words
    • 3 Pages

    The Patriot Act facilitates information sharing and cooperation among government agencies so that they can better “connect the dots.”…

    • 572 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The information that the government and the companies have taken away could be fallen into the hands of the criminals. For example, the criminals could hack into the governmental computer systems and obtain those information. Not only that the criminals could check the surveillance cameras as well, if they falsify their identity as some kind of authority. Also, the criminals can hack into the companies computers to get the information of where about of others through checking the tracking device that the companies use on their products. These tracking system that are attached to the products in the market are helpful to keep track of how much products are in stocks and help monitor to fill the stocks. But if these information is leaked then people’s locations can be known by certain criminals and might be used for some type of crime. We, as a citizen, can not trust that the government and companies are secure enough to store our information. When these criminals take such private information, they use people’s information as if it is theirs. For example, these criminals could use the card information that they might have gained from the governmental sites, that they hack into, or through looking at the surveillance cameras near ATM. Some might use such information to stock others. For instance, the stokers might gain some information through surveillance cameras and the tracking…

    • 778 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There were many advances in information technology that resulted in new ethical issues necessitating the creation of certain acts that the government had to implement. The two that will be discussed in this paper are the PATRIOT Act of 2001, and the Fair Credit Reporting Act of 1970. Both of these acts were deemed necessary due to increasing terrorist threats for the PATRIOT Act, and for fairness in obtaining credit for the Fair Credit Reporting Act.…

    • 738 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Data Breach Research Paper

    • 4412 Words
    • 18 Pages

    Numerous data breaches and computer intrusions have been disclosed by the nation’s largest data brokers, retailers, educational institutions, government agencies, health care entities, financial institutions, and Internet businesses. A data breach may occur when there is a loss or theft of, or other unauthorized access to, data containing sensitive personal information that results in the potential compromise of the confidentiality or integrity of data. Sensitive personal information generally includes an individual’s name, address, or telephone number, in conjunction with the individual’s Social Security number, driver’s license number, account number, credit or debit card number, or a personal identification number or password. Breach notification laws enacted by many states require the disclosure of security breaches involving sensitive personal information (Stevens, 2008).…

    • 4412 Words
    • 18 Pages
    Powerful Essays
  • Better Essays

    The type of information over the last thirty years has changed to fit wants and needs of the public. The invention of computers and cellular phones has dramatically changed how information is able to be attained and provided. People all over the world are able to research information on subjects they are interested in regardless of location, nationality, language and personality. There are many government conspiracies on tracking and storage of information through the computer ISP (Internet Service Provider) that help monitor trends. “Many ISPs compile anonymous browsing logs and sell them to marketing companies,” in other words, if marketing companies can use private information to their benefit why wouldn’t the government use the same information as a benefit to further their policies (privacypolicies.com).…

    • 1575 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Advances in information technology (IT) are intended to improve a variety of characteristics of life. Sadly, IT progresses are resulting in an increasing amount of ethical issues. The most important ethical problems connected with IT advancements are privacy, property, precision, and ease of access to susceptible information. Privacy can effortlessly be violated when information is stored in databases and shared over networks. Ethical problems due to advances in IT call for the creation of new acts to protect consumers. The Telephone Consumer Protection Act (TCPA) of 1991 and the Do Not Call Implementation Act of 2003 are two perfect examples of Acts being created as direct results of IT advancements coupled with ethical issues.…

    • 979 Words
    • 4 Pages
    Better Essays
  • Best Essays

    Data Warehousing and Olap

    • 2507 Words
    • 11 Pages

    In the 1990s, as businesses grew more complex, corporation spread globally, and competition became fiercer, business executives became desperate for information to stay competitive and improve the bottom line. Data warehousing technologies have been successfully deployed in many industries: manufacturing (for order shipment and customer support), retail (for user profiling and inventory management), financial services (for claims analysis, risk analysis, credit card analysis, and fraud detection), transportation (for fleet management), telecommunications (for call analysis and fraud detection), utilities (for power usage analysis), and healthcare (for outcomes analysis). This paper presents a roadmap of data warehousing technologies, focusing on the special requirements that data warehouses place on database management systems (DBMSs).…

    • 2507 Words
    • 11 Pages
    Best Essays