Computer Ethics: Web Privacy
VerifiedAdded on 2019/09/27
|6
|866
|121
Report
AI Summary
This report examines the ethical dilemmas surrounding online privacy, focusing on the risks of data breaches and the responsibilities of various stakeholders. It analyzes the viewpoints of governments, companies, retailers, and educational institutions regarding the protection of personal information online. The report highlights the vulnerabilities of credit card information in online transactions, detailing methods used by criminals to steal data. It concludes by emphasizing the need for robust security measures to protect sensitive information and the ethical obligations of professionals in the field to safeguard user data.

Running head: PRIVACY ON THE WEB
COMPUTER ETHICS
COMPUTER ETHICS
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
PRIVACY ON THE WEB
Table of Contents
Introduction......................................................................................................................................2
Objective of Report..........................................................................................................................2
Analysis of Ethical dilemmas..........................................................................................................2
Stakeholders Involved in Privacy Leak...........................................................................................3
Viewpoint of Stakeholders..............................................................................................................3
Conclusion.......................................................................................................................................3
PRIVACY ON THE WEB
Table of Contents
Introduction......................................................................................................................................2
Objective of Report..........................................................................................................................2
Analysis of Ethical dilemmas..........................................................................................................2
Stakeholders Involved in Privacy Leak...........................................................................................3
Viewpoint of Stakeholders..............................................................................................................3
Conclusion.......................................................................................................................................3

2
PRIVACY ON THE WEB
Introduction
Issues of internet privacy have become very dangerous nowadays as it can lead to ruining of
credit cards, expose of personal and private information, allow anyone to steal the credit card
information. Thus, leakage of information can lead to huge loss to the stakeholders involved and
they may lose their trust on internet.
Objective of Report
To identify the ethical dilemma faced by stakeholders who are involved in the leakage of
privacy in the internet
To assess the viewpoint of Stakeholders
To recommend various measures to handle the leakage of information on internet
Analysis of Ethical dilemmas
Ethics analysis regarding privacy and security issues in the primarily information technology
takes place in the ethics of computer which got emerged in 1980. Analysis of computer ethics
describes moral responsibilities and duties of users of computers and the ethical issues for use
and development of information technology (Web privacy 2017). The aim of professionals of
computer security is to achieve the protection of system resources and valuable information.
Economic Harm may come into place by undermining the system security which may cause
damage of valuable software and hardware resulting in loss of resources, money and time.
Furthermore, the dilemma involves establishment of accountability and responsibility for the
outcomes of information system and setting the standard to protect the quality of system which
safeguard the society and individual’s safety, preserve the values as well as the institutions which
consider the quality of duration in the information society (O'Brien, et al., 2005).
PRIVACY ON THE WEB
Introduction
Issues of internet privacy have become very dangerous nowadays as it can lead to ruining of
credit cards, expose of personal and private information, allow anyone to steal the credit card
information. Thus, leakage of information can lead to huge loss to the stakeholders involved and
they may lose their trust on internet.
Objective of Report
To identify the ethical dilemma faced by stakeholders who are involved in the leakage of
privacy in the internet
To assess the viewpoint of Stakeholders
To recommend various measures to handle the leakage of information on internet
Analysis of Ethical dilemmas
Ethics analysis regarding privacy and security issues in the primarily information technology
takes place in the ethics of computer which got emerged in 1980. Analysis of computer ethics
describes moral responsibilities and duties of users of computers and the ethical issues for use
and development of information technology (Web privacy 2017). The aim of professionals of
computer security is to achieve the protection of system resources and valuable information.
Economic Harm may come into place by undermining the system security which may cause
damage of valuable software and hardware resulting in loss of resources, money and time.
Furthermore, the dilemma involves establishment of accountability and responsibility for the
outcomes of information system and setting the standard to protect the quality of system which
safeguard the society and individual’s safety, preserve the values as well as the institutions which
consider the quality of duration in the information society (O'Brien, et al., 2005).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
PRIVACY ON THE WEB
Stakeholders Involved in Privacy Leak
The stakeholders involved in leakage of privacy include
Government
Companies
Retailers of web privacy
School authority
Viewpoint of Stakeholders
Government is involved in issues regarding web privacy. Because of lack of security measures,
many websites of federal agencies have failed the benchmark for the privacy of internet which
can be a delicate issue which considers the information amount which the government consists
of. For companies and retailers, they protect the data of customers (Springer, et al., 2017).
Toysmart was blocked by the privacy organization for stealing of personal information of credit
card of the customers. The information may also go to external parties or to the wrong hands as
well as this is when the issue starts. In present days, many students are not able to understand
what the database regarding the school are attended by carrying the personal information.
PRIVACY ON THE WEB
Stakeholders Involved in Privacy Leak
The stakeholders involved in leakage of privacy include
Government
Companies
Retailers of web privacy
School authority
Viewpoint of Stakeholders
Government is involved in issues regarding web privacy. Because of lack of security measures,
many websites of federal agencies have failed the benchmark for the privacy of internet which
can be a delicate issue which considers the information amount which the government consists
of. For companies and retailers, they protect the data of customers (Springer, et al., 2017).
Toysmart was blocked by the privacy organization for stealing of personal information of credit
card of the customers. The information may also go to external parties or to the wrong hands as
well as this is when the issue starts. In present days, many students are not able to understand
what the database regarding the school are attended by carrying the personal information.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
PRIVACY ON THE WEB
How the Information of Credit Card is Leaked Online
The card is the most vulnerable target for the thieves as due to high number of payment through
contact less credit cards, the scanners for radio frequency identification has now become very
popular mean to steal the information of credit card. What s thief may require is to get the device
for scanning in nearby range of the card so that they may have information which they require.
Also, the same strategy may be applied if the phone which a person is using has near field
communication in order to communicate the points of sale in order to share the information of
credit card through Visa Pay Wave, Google Wallet and Apple Pay and various other apps also
use the same technology if any amount of money is paid to them. If the reader of NFC is
compromised as well as tempered with, thus may give the information of credit card to the
criminal. The same method known as skimming needs a thief to possess a scanner in physical
form which reads this information from the credit card as these instruments easy to get and the
thieves may be creative to use them in order to tamper the machines of ATMs, business card
readers as well as various other locations where the card may be swiped over regular basis. The
fraud of ATM is very common nowadays.
Conclusion
Thus, the professionals and expert in this field must provide high security in all the internet
based transactions. Since it involves huge database of people which are crucial to their
professional as well as personal life, it is significant to be cautious while keeping any
confidential information on internet as nowadays many hackers in cyber world misconduct with
the information of people irrespective of the ethical aspect of behavior and attitude which is
required in the cyber world.
PRIVACY ON THE WEB
How the Information of Credit Card is Leaked Online
The card is the most vulnerable target for the thieves as due to high number of payment through
contact less credit cards, the scanners for radio frequency identification has now become very
popular mean to steal the information of credit card. What s thief may require is to get the device
for scanning in nearby range of the card so that they may have information which they require.
Also, the same strategy may be applied if the phone which a person is using has near field
communication in order to communicate the points of sale in order to share the information of
credit card through Visa Pay Wave, Google Wallet and Apple Pay and various other apps also
use the same technology if any amount of money is paid to them. If the reader of NFC is
compromised as well as tempered with, thus may give the information of credit card to the
criminal. The same method known as skimming needs a thief to possess a scanner in physical
form which reads this information from the credit card as these instruments easy to get and the
thieves may be creative to use them in order to tamper the machines of ATMs, business card
readers as well as various other locations where the card may be swiped over regular basis. The
fraud of ATM is very common nowadays.
Conclusion
Thus, the professionals and expert in this field must provide high security in all the internet
based transactions. Since it involves huge database of people which are crucial to their
professional as well as personal life, it is significant to be cautious while keeping any
confidential information on internet as nowadays many hackers in cyber world misconduct with
the information of people irrespective of the ethical aspect of behavior and attitude which is
required in the cyber world.

5
PRIVACY ON THE WEB
REFERENCES
Web privacy. (2017). Ethics.csc.ncsu.edu. Retrieved 13 April 2017, from
https://ethics.csc.ncsu.edu/privacy/web/study.php
Springer, R. (2017). The Reality of Privacy on the Web. EContent Magazine. Retrieved 13 April
2017, from http://www.econtentmag.com/Articles/Editorial/Feature/The-Reality-of-Privacy-on-
the-Web-106451.htm
O'Brien, J. A., & Marakas, G. (2005). Introduction to information systems. McGraw-Hill, Inc..
PRIVACY ON THE WEB
REFERENCES
Web privacy. (2017). Ethics.csc.ncsu.edu. Retrieved 13 April 2017, from
https://ethics.csc.ncsu.edu/privacy/web/study.php
Springer, R. (2017). The Reality of Privacy on the Web. EContent Magazine. Retrieved 13 April
2017, from http://www.econtentmag.com/Articles/Editorial/Feature/The-Reality-of-Privacy-on-
the-Web-106451.htm
O'Brien, J. A., & Marakas, G. (2005). Introduction to information systems. McGraw-Hill, Inc..
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.