logo

Research, Ethics, and Professionalism in Computing

   

Added on  2021-06-14

27 Pages5582 Words21 Views
Data Science and Big DataLanguages and Culture
 | 
 | 
 | 
Running head: RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTINGResearch, Ethics, and Professionalism in ComputingTitle: Ethics of privacy and anonymity for handling online dataName of the Student Name of the University
Research, Ethics, and Professionalism in Computing_1

2RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTINGAbstractThe research topic that is selected for the research study is ethics of privacy and anonymity forhandling online data and the question that is aimed to focus on are How the IT professionalmaintain privacy and anonymity of the online data and what are the issues faced by theseprofessional while maintaining privacy and anonymity of user data. The research identifies thatprivacy refers to the situation when organization keep data to themselves; while, anonymity isdifferent than privacy and organization can broadcast the action of the users but hide the details,who have done. The method of interview and survey and questionnaire are selected for obtainingdata regarding the research question. The sample size for the research is 200 IT professionals,who handle the maintenance of the privacy ad anonymity of the online data and 10 managers ofthe IT professional. Keywords:Privacy, Anonymity, Online data, Cloud computing, confidentiality
Research, Ethics, and Professionalism in Computing_2

3RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTINGTable of Contents1.0 Background......................................................................................................................................52.0 Research questions...........................................................................................................................63.0 Literature Review............................................................................................................................63.1 Overview of Privacy....................................................................................................................63.2 Overview of Anonymity..............................................................................................................73.3 Technique to maintain privacy and anonymity...........................................................................83.3.1 Technique to maintain privacy.............................................................................................83.3.2 Technique to maintain anonymity........................................................................................94.0 Methodology Review.....................................................................................................................104.1 Survey and Questionnaire..........................................................................................................114.2 Interviews..................................................................................................................................114.3 Focus Group...............................................................................................................................124.4 Case study analysis....................................................................................................................134.5 Considered Methodologies Technique......................................................................................134.5.1 Survey and Questionnaires.................................................................................................134.5.2 Interview.............................................................................................................................145.0 Conclusion.....................................................................................................................................146.0 Ethical Review Form.....................................................................................................................15
Research, Ethics, and Professionalism in Computing_3

4RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING7.0 Consent Form.................................................................................................................................158.0 Pilot study......................................................................................................................................169.0 Reference List................................................................................................................................1710.0 Appendix......................................................................................................................................2110.1 Grant approval form................................................................................................................2110.2 Ethics form...............................................................................................................................2210.3 Consent Form...........................................................................................................................2310.4 Research questions...................................................................................................................2510.4.1 Questionnaire question.....................................................................................................2510.4.2 Interview question............................................................................................................27
Research, Ethics, and Professionalism in Computing_4

5RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING1.0 Background In recent time, most of the business opted for online mode in order to accomplish theirbusiness goals and objectives. Barocas and Nissenbaum (2014) stated that online business offersscalability to the users, ease of findings their desired items and also allow them to make theselection and purchasing process efficiently. User makes purchases of some products by givingpayments details. In some other services like admission in academic institutions and patientsdetails on booking for counselling regarding some unseals diseases, users share details like theirname, address, contact number, e-mail address (Davis 2012). In all these cases, the organizationneeds to safeguard the details of the users and keep the data anonymous from other users. Spiekermann et al. (2015) highlighted that privacy refers to the situation whenorganization keep data to themselves and never broadcast the details to any other person.Wilkowska and Ziefle (2012) on the other hand stated that anonymityis different than privacyand organization can broadcast the action of the users but hide the details, who have done byhiding the details of the users. Organization like hospitals, government agencies and consultancyservices adopts the methods of keeping the user data private so that no other person knows aboutother people’s activity (Pardo and Siemens 2014). Dawson (2014) moreover stated that onlinemarketers and academic organizations utilizes the concept of anonymity in case of sharing userscomments on the products review sections, details of the experience of the students regarding thecourse, facilities offered and faculties. Thus, it can be sad that IT professionals need to maintainthe computing ethics of maintaining privacy and anonymityfor protecting the user’s details andactivity information. Thus, this proposal highlights the ethics of privacy and anonymity forhandling online data by the IT professionals.
Research, Ethics, and Professionalism in Computing_5

6RESEARCH, ETHICS, AND PROFESSIONALISM IN COMPUTING2.0 Research questions How the IT professional maintain privacy and anonymity of the online data?What are the issues faced by these professional while maintaining privacy and anonymityof user data? 3.0 Literature Review 3.1 Overview of Privacy Chen and Zhao (2012) stated that privacy is protection of user details against discoveryand misuse of identity. However, in order to maintain proper privacy, some requirements arenecessary to follow among which anonymity, pseudonymity, unobservability and unlinkability.Moreover, the process of prevention of the discovery of a user by other users is referred asprivacy. In mid-1960s, American government formulated databases that contain data of theprivate citizens in order to built tax records, census data, welfare records and military servicerecords (Hashem et al. 2015). The final outcome or statistics of the collected data is broadcastedand the individual perception shared by users is kept in private. The US congress had also takenthe initiative to assign a personal identification number, which should be used for gathering allthe government's data (di Vimercati et al. 2014). The problem arises when cyber criminals andintruders aims to gather, store, search, compare, retrieve different kinds of sensitive information.Moreover, in recent times, the risk like data-mining, data matching and recording of the clicktrails on the webpages have developed as the use of internet, world-wide-web, user-friendlinessof the sources make immense growth.
Research, Ethics, and Professionalism in Computing_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ethical Issues with Privacy on Social Media
|24
|5122
|50

Title of Research Project on Company Executives
|2
|397
|401

Role of Quantitative and Qualitative Research in Marketing Research
|20
|2970
|230

Plain Language Information Statement for Functional Analyzes of Campaign Management in Saralrozgar
|4
|1569
|493

The greater part of the current security
|28
|6341
|11

Application for Ethics Approval - Impact of Forensic Accounting on Organisation
|3
|506
|180