How would an individual privacy rights be violated

Assignment Help Management Information Sys
Reference no: EM131195306

For this assignment you will be writing a critical analysis on the topic of the privacy concerns surrounding "Facial Recognition Technology". Your analysis should focus on following:

Identify and summarize what Facial Recognition Technology is currently used for in government and businesses.

Critics of Facial Recognition Technology which includes The American Civil Liberties Union (Links to an external site - https://www.aclu.org/.), ACLU. The ACLU is criticizing state governments such as Ohio who are implementing the system. What is the ACLU concerned about with regards to certain abuses by the government?

How would an individual's privacy rights be violated if Facial Recognition Technology is used by businesses?

How could businesses abuse this technology in advertising campaigns?

Who are the advocates of this technology and what is their argument regarding potential privacy violations?

As a future IT manager, imagine that you are being pressured by your company to implement Facial Recognition Technology. You are aware that the general public is not aware of the potential privacy issues. How would you handle this situation?

You should provide at least three resources for this analysis. You are welcome to use online resources except for Wikipedia or any other open source resource. Be sure to use proper grammar, spelling and APA citation for this assignment. Use 12 point Times New Roman font and double space your paper. You should have approximately 3 - 4 pages for this particular assignment.

Reference no: EM131195306

Questions Cloud

Contingent valuation is used to estimate : Contingent valuation is used to estimate the a. perceived valuation or existence value of environmental goods. b. cost of the closest alternative program for achieving the public goal. c. value of economic losses in an environmental disaster. d. bene..
Highlight the key programming techniques : At a minimum, post at least three notes that highlight the key programming techniques and/or problems or lessons learned that you experienced with this week's lab.
Assigning distributional weights to different social groups : In assigning distributional weights to different social groups
How long would it take to fill up : If the town of Chapel Hill used the Smith Center as a refuse disposal site, how long would it take to fill up? Make all necessary assumptions.
How would an individual privacy rights be violated : As a future IT manager, imagine that you are being pressured by your company to implement Facial Recognition Technology. You are aware that the general public is not aware of the potential privacy issues. How would you handle this situation?
Discuss the deployment services situations : Please briefly discuss the deployment services situations; what initial facts would best determine what situation should be used? If you were deploying on 150 computers, which would you use? Please give a detailed explanation of everything you wou..
Project that incurs costs in early years and yields benefits : A project that incurs costs in early years and yields benefits in later years has been estimated to have costs just equal to benefits, in present value terms and ignoring risk factors. The project would be reevaluated as having greater benefits than ..
Desirability of proposed government programs : It is often difficult to agree on the desirability of proposed government programs because of different perspectives regarding:
What type of expressions should such a function expect : How many and what type of expressions should such a function expect, to be able to return such an area? Decide on a good, descriptive name for this function, and write an appropriate signature comment for this function.

Reviews

Write a Review

Management Information Sys Questions & Answers

  What are the vulnerabilities of remote access

Using your text book and one additional source, write a brief introduction to remote authentication protocols. In the body of the paper, answer these questions: How do you think employees access the essential resources at the office when they are..

  Case study gap fillergap filler is a recruitment and labour

case study gap fillergap filler is a recruitment and labour hire company i.e. lsquostaffing solutions that services the

  Identify the data components of each object

Identify all the (relevant) nouns and verbs. From the list of nouns, select the objects. Identify the data components of each object.

  Describe specific plans and control objectives

Establish an enterprise information security compliance program that addresses the concerns of the board of directors of the  organization in which you: Describe specific plans and control objectives that could be adopted to address the known issue..

  How organisations use information systems

You are required to evaluate the information needs of the different functional areas of Genesis Online - Describe a minimum of six different types of information systems

  Erp framework and open source of erp software

Write a report of 8 to 10 pages on the topic of "Information Technology For Managers"Report must be in proper format along with title page and refrences.

  What changes the system brought to the business world

Identify five different IT systems that have affected business in the past few years. For each system, briefly note the following: The system's name, The area of business it affects and What changes the system brought to the business world

  Different aspects of managementquestions1 define

different aspects of managementquestions1. define sustainability and the triple bottom line and how they relate to

  Primary drivers that friedman says are flattening the world

What are the primary drivers that Friedman says are "flattening" the world? What constitutes the "Right Stuff" that Friedman believes will help individuals to do better in this increasingly "Flattened" world

  Prepare a presentation slides with good looking visual aid

Prepare a presentation slides with good looking visual aid and handouts for the topic project value management with harvard australia reference style.

  Intrinsic and extrinsic reward

Intrinsic and Extrinsic Reward - Provide an example of intrinsic reward and an example of extrinsic reward you have met with recently.

  Conduct an internet search looking for tips

Conduct an Internet search looking for tips for Microsoft Office 2010 (e.g., tutorials, tips, etc.). Which search engine did you use, and why and What specific search terms did you use?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd