University Report: Surveillance and Ethical Implications in AI

Verified

Added on  2022/09/26

|4
|800
|22
Report
AI Summary
This report delves into the ethical considerations surrounding surveillance in the context of artificial intelligence, focusing on the collection and management of personal data by organizations. It highlights the risks associated with data breaches and the importance of privacy policies. The report examines the outsourcing of digital surveillance to private companies, raising concerns about cyber protections and the potential for unethical data analysis. It emphasizes the need for stricter government regulations and penalties to protect public data, while also addressing workplace surveillance and its impact on employee privacy and organizational culture. The report references key concepts such as consumer profiling, e-discovery, and the capabilities of advanced surveillance technologies, offering insights into the ethical challenges and potential solutions within the field of AI and data privacy. The student's work provides a comprehensive overview of the ethical dilemmas posed by surveillance technologies and their implications for individuals and society, with a clear emphasis on the importance of responsible data handling and privacy protection. The report also includes a detailed reference list for further research.
Document Page
RUNNIING HEAD: SURVEILLNANCE AND ETHICS
Name of Student:
Name of University:
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Working in an organisation or accessing any organisation as a customer always leave behind a
risk of the leakage of personal informations that the organisation is gathering. In most of the
cases, the organisations gathers informations about the personal informations like bank account
proofs, residential and proofs, contact details, email ids etc. though it may seem trivial at the
surface levels, people often faces risk and threats in such cases. The informations related to the
past job, the reason of conflict there, etc. all is the examples of Personal informations that needs
to e secured. In present days, various insurance and health organisations, financial companies
and government agencies have the power and legal support of getting hold of various private
informations of their employees as well as of the customers. As a precautionary measure, before
filling up such forms, I generally tend to review once the privacy policies of the company. Only
after being satisfied about the policies, I fill up the forms that require online details. While
communicating with any company online or browsing any stuff, I tend to turn on any kinds of
cookies setting and make use of the advertisement blockers.
2. It has been found out that the modern digital surveillance is actually outsourced to the private
companies. The private companies are thus responsible of acquiring as well as managing tthe
vast data sets and our daily lives are thus recorded for providing analytical software and services
on top of that data (Dwork McSherry Nissim and Smith 2016,). Thus most of the surveillance
we believe to be the government surveillance are actually performed by the private companies.
In this way, often we are exposed to risks of lesser cyber protections and the privacy safeguards.
While it may seem unethical and alarming for common publics like us, this is however don in
order to generate more accurate data and analytics. Moreover, these private companies are bound
by a variety of rules and regulations than the government agencies are. The analytic softwares
that are used by these agencies are built exclusively and have the potential of classifying data in
Document Page
turn helps in a better flagging of any kind of suspicion or problem which often the federal based
agencies cannot figure out (Gertner, Ishai Kushilevitz and Malkin 2020).
3. The handling of data of the public is not only a risky job, but at a same time endows a vast
responsibility upon the company or the convenor. Thus, it is essential that the government
actually enhance the number of rules and regulations for the companies handling such data sets
and also clearly underlines the consequences or the penalties in case of any breach of the laws.
The laws primarily based by based on ethical as well as the security level grounds (Hughes
Dawson and Brookes 2018). The electronically stored informations must be handled with much
expertise and laws regarding the man handling or using them unfairly must be set up and
implemented.
4. People in the federal has been long accustomed with the camera surveillances in the
workplace. While this helps in maintaining and observing the discipline within the company,
many are concerned about the intruding in the personal horizon. Concerns thus must be taken
against the big boss attitude of the company or extreme stalking that leads to a toxic
organisational culture.
Document Page
Reference List;
Dwork, C., McSherry, F., Nissim, K. and Smith, A., 2016, March. Calibrating noise to sensitivity
in private data analysis. In Theory of cryptography conference (pp. 265-284). Springer, Berlin,
Heidelberg.
Gertner, Y., Ishai, Y., Kushilevitz, E. and Malkin, T., 2020. Protecting data privacy in private
information retrieval schemes. Journal of Computer and System Sciences, 60(3), pp.592-629.
He, W., Liu, X., Nguyen, H., Nahrstedt, K. and Abdelzaher, T., 2007, May. Pda: Privacy-
preserving data aggregation in wireless sensor networks. In IEEE INFOCOM 2007-26th IEEE
International Conference on Computer Communications (pp. 2045-2053). IEEE.
Hughes, G., Dawson, S. and Brookes, T., 2018. Considering new privacy laws in Australia. IEEE
Security & Privacy, 6(3), pp.57-59.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]