How protected is your online privacy

Assignment Help Management Theories
Reference no: EM131682103

Case: How Protected Is Your Online Privacy?

"Solitude and privacy have become more essential to the individual; but modern enterprise and invention have, through invasions upon personal privacy, subjected [individuals] to mental pain and distress. In this, as in other branches of commerce, the supply creates demand." This quotation appeared in the Harvard Law Review . Besides the sobering sentiment expressed, the more startling fact is that it was written in 1890, more than 120 years ago! Technology, whether it is in the 1890s or 2010s, can violate our sense of privacy as individuals. Consider these examples:

• Malicious programs launched by hackers spread through Facebook and Twitter accounts in 2009, taking over people's accounts and sending out messages to the users' friends and followers. One user found out five days later that his account had been sending out lingerie ads to all of his professional acquaintances.

• When Google introduced Buzz, its answer to Facebook and Twitter, in 2010, users found themselves with an instant, and in many cases unwelcome, collection of "friends," automatically selected by Google from their e-mail contact lists. The users complained that their e-mail information contained names of personal physicians and illicit lovers, as well as the identities of whistle-blowers and antigovernment activists, most of whom would not want their identities made available to these "friends."

• In 2010, a Wall Street Journal investigation discovered that Facebook regularly transmitted identifying information-providing access to peoples' names and in some cases their friends' names-to dozens of advertising and Internet tracking companies. These firms used the information to build user profiles to market new apps or games. The use of apps was a growing source of revenue for Facebook since it sold virtual currency that could be used to pay for games. This activity affected tens of millions of Facebook users, including people who set their profiles to Facebook's strictest privacy settings.

• The Wall Street Journal probe revealed that MySpace also had been transmitting information to advertising companies that could be used to identify users. Users' information was sent, without their knowledge, once they clicked on ads on the MySpace website. At that time, MySpace had 58 million visitors monthly in the United States. As this epidemic of privacy violations became public, many organizations, including the social network companies and the U.S. government, pledged to correct the situation. Some businesses, such as Microsoft and McAfee, saw this situation as an opportunity to offer online consumers software to protect them from online monitoring. Other companies offered users a commission every time their personal details were shared with marketing companies. "Data is a new form of currency," said a technology executive. The reasoning seemed to be that if the online advertising industry was bringing in $26 billion a year in sales from accessing this information, the consumers should share in the profits. Apple, Facebook, and Google also took the offensive and created plans to better protect their customers. In 2011, Apple announced it would no longer automatically track an iPhone's location, but download a subset, or cache, of the database from each phone.

This limited access to data prohibited Apple from locating the user who was using WiFi or a cell phone. While Apple needed to track its users to provide better service-for example, to identifying WiFi hotspots and cell towers-the new software would reduce the size of the database cached on the phone, cease backing up the cache, and delete the cache entirely when the location tracking feature was turned off. Facebook acknowledged the security vulnerabilities found in the Wall Street Journal investigation and reported that they had addressed the problem in 2011. "We've conducted a thorough investigation, which revealed no evidence of this issue resulting in user's private information being shared with unauthorized third parties," the company stated. "[Facebook has a] strong policy enforcement and technical measures that allow us to quickly catch and take action against suspicious behavior on the platform." Google also was caught up in the Wall Street Journal investigation. It had allegedly used a special computer code that tricked the Safari web-browsing software to allow Google to monitor users' activities. Safari was designed to block such tracking by default. Google reported in 2012 that it had disabled its code after being contacted by the Wall Street Journal, although the company maintained that "The [Wall Street] Journal [investigation] mischaracterize[d] what happened and why."

Finally, legislators also took action. Senators John Kerry and John McCain introduced a "privacy bill of rights," which included a "do not track" provision patterned after the "do not call" law that allowed people to block telemarketing calls to their phone. The proposed law would impose strict rules on companies that gather personal data, including requiring that people be given the right to access data collected about them and to block the information from being used or distributed. Although the Internet industry had resisted legislative controls for more than a year, a coalition of Internet giants joined the White House in support of the Kerry-McCain "do not track" provision. This provision allowed for a button to be embedded in most web browsers to give people greater control over the personal data collected about them. Yet, some experts questioned whether these measures would be enough. They pointed to powerful new methods of tracking, such as ones found on MSN.com and Hulu.com, that were almost impossible for computer users to detect. These new techniques were called "super cookies." These super cookies were similar to a traditional cookie, a small file routinely installed on users' computers to track their activities online, but were capable of recreating users' profiles after people deleted regular cookies.

Discussion Questions

1. How much privacy should people expect when using a social networking site or going online for information, shopping, or other tasks?

2. Who should be responsible for protecting Internet users' personal information? In your response, please address the appropriate role of the government, business, and individuals.

3. Should consumers share in the revenue generated from sales created by accessing the personal information from social networking and other Internet sites?

4. Do you believe there is a conflict between the economic interests of companies such as Facebook, MySpace, or Google, and their obligation to protect the personal information of their users? If you were an executive of one of these companies, how would you resolve that conflict?

Reference no: EM131682103

Questions Cloud

Identify sources and locations of groundwater : the hydrologic cycle, identify sources and locations of groundwater
Bankrupt home builder paid off the builder debts : The trustee for a bankrupt home builder paid off the builder's debts at the rate of 42 cents on the dollar.
Calculate the excess burden of the tax : Calculate the excess burden of the tax, assuming that automobiles are sold in perfectly competitive markets.
Make recommendations on how to improve its operations : As a management consultant to a public organization you have been requested to make recommendations on how to improve its operations.
How protected is your online privacy : "Solitude and privacy have become more essential to the individual; but modern enterprise and invention have, through invasions upon personal privacy.
Determine the cost of water per thousand gallons of water : Determine the cost of water per thousand gallons of water. Calculate the cost of the drip per year from the information you have
Happening with convenience products : Would you see this happening with convenience products?
Normative and descriptive ethics : Discuss the differences between normative and descriptive ethics
Making reference to the amended hague visby rules : Advise the carrier of its liability to the various shippers, making reference to the amended Hague Visby Rules.

Reviews

Write a Review

Management Theories Questions & Answers

  What are major forces in the change process

Trace the life cycle of change in an organization or government.

  Rowe program at best buy

Jennifer Janssen works in the finance department at the headquarters of Best Buy, located in Minneapolis, Minnesota. One of Best Buy's electronics suppliers is furious because he claims he has not been paid. Janssen states: "He told me, 'I'm not g..

  Why you feel it is important to have historical perspective

Explain why you feel it is or is not important to have a historical perspective of management, Can you think of ways it may help or hinder us today?

  In the beginning railroads were highly regulated

In the beginning railroads were highly regulated and then in the 20th century they were deregulated.  Explain what caused the change in philosophy and do you agree or disagree and why?

  Feedback on the writing process

Think about how the online world affects the process of feedback on written documents. Are traditional print publications still viable with daily, weekly, or monthly publication cycles. Why or why not?

  Create a plan that the crunch factory can implement

Create a plan that The Crunch Factory can implement that details the Challenges associated with low-quality information.

  Review the case of building team skills

An organization chart is a diagram showing how employees and tasks are grouped and how the lines of communication and authority flow within an organization.

  What are three key points of argument

You will need to draft a memorandum to your chief executive identifying the value of a triple bottom line approach, which would represent an enormous shift.

  The workforce''s transportation habits

She is willing to consider anything from subsidized bus passes to company-owned shuttle buses to telecommuting, but the decision requires a thorough understanding of employee transportation needs.

  The methods of proving customary law

State any TWO of the methods of proving customary law.

  Is lynn a partner of jack

Samuel sues Lynn and Jack for his personal injuries, joining Lynn as defendant on the theory that Lynn was Jack's partner. Is Lynn a partner of Jack?

  Determining whether an action is right or wrong

Which is more important in determining whether an action is right or wrong? A. Whether anyone actually gets hurt.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd