Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Theories Expert

Case: How Protected Is Your Online Privacy?

"Solitude and privacy have become more essential to the individual; but modern enterprise and invention have, through invasions upon personal privacy, subjected [individuals] to mental pain and distress. In this, as in other branches of commerce, the supply creates demand." This quotation appeared in the Harvard Law Review . Besides the sobering sentiment expressed, the more startling fact is that it was written in 1890, more than 120 years ago! Technology, whether it is in the 1890s or 2010s, can violate our sense of privacy as individuals. Consider these examples:

• Malicious programs launched by hackers spread through Facebook and Twitter accounts in 2009, taking over people's accounts and sending out messages to the users' friends and followers. One user found out five days later that his account had been sending out lingerie ads to all of his professional acquaintances.

• When Google introduced Buzz, its answer to Facebook and Twitter, in 2010, users found themselves with an instant, and in many cases unwelcome, collection of "friends," automatically selected by Google from their e-mail contact lists. The users complained that their e-mail information contained names of personal physicians and illicit lovers, as well as the identities of whistle-blowers and antigovernment activists, most of whom would not want their identities made available to these "friends."

• In 2010, a Wall Street Journal investigation discovered that Facebook regularly transmitted identifying information-providing access to peoples' names and in some cases their friends' names-to dozens of advertising and Internet tracking companies. These firms used the information to build user profiles to market new apps or games. The use of apps was a growing source of revenue for Facebook since it sold virtual currency that could be used to pay for games. This activity affected tens of millions of Facebook users, including people who set their profiles to Facebook's strictest privacy settings.

• The Wall Street Journal probe revealed that MySpace also had been transmitting information to advertising companies that could be used to identify users. Users' information was sent, without their knowledge, once they clicked on ads on the MySpace website. At that time, MySpace had 58 million visitors monthly in the United States. As this epidemic of privacy violations became public, many organizations, including the social network companies and the U.S. government, pledged to correct the situation. Some businesses, such as Microsoft and McAfee, saw this situation as an opportunity to offer online consumers software to protect them from online monitoring. Other companies offered users a commission every time their personal details were shared with marketing companies. "Data is a new form of currency," said a technology executive. The reasoning seemed to be that if the online advertising industry was bringing in $26 billion a year in sales from accessing this information, the consumers should share in the profits. Apple, Facebook, and Google also took the offensive and created plans to better protect their customers. In 2011, Apple announced it would no longer automatically track an iPhone's location, but download a subset, or cache, of the database from each phone.

This limited access to data prohibited Apple from locating the user who was using WiFi or a cell phone. While Apple needed to track its users to provide better service-for example, to identifying WiFi hotspots and cell towers-the new software would reduce the size of the database cached on the phone, cease backing up the cache, and delete the cache entirely when the location tracking feature was turned off. Facebook acknowledged the security vulnerabilities found in the Wall Street Journal investigation and reported that they had addressed the problem in 2011. "We've conducted a thorough investigation, which revealed no evidence of this issue resulting in user's private information being shared with unauthorized third parties," the company stated. "[Facebook has a] strong policy enforcement and technical measures that allow us to quickly catch and take action against suspicious behavior on the platform." Google also was caught up in the Wall Street Journal investigation. It had allegedly used a special computer code that tricked the Safari web-browsing software to allow Google to monitor users' activities. Safari was designed to block such tracking by default. Google reported in 2012 that it had disabled its code after being contacted by the Wall Street Journal, although the company maintained that "The [Wall Street] Journal [investigation] mischaracterize[d] what happened and why."

Finally, legislators also took action. Senators John Kerry and John McCain introduced a "privacy bill of rights," which included a "do not track" provision patterned after the "do not call" law that allowed people to block telemarketing calls to their phone. The proposed law would impose strict rules on companies that gather personal data, including requiring that people be given the right to access data collected about them and to block the information from being used or distributed. Although the Internet industry had resisted legislative controls for more than a year, a coalition of Internet giants joined the White House in support of the Kerry-McCain "do not track" provision. This provision allowed for a button to be embedded in most web browsers to give people greater control over the personal data collected about them. Yet, some experts questioned whether these measures would be enough. They pointed to powerful new methods of tracking, such as ones found on MSN.com and Hulu.com, that were almost impossible for computer users to detect. These new techniques were called "super cookies." These super cookies were similar to a traditional cookie, a small file routinely installed on users' computers to track their activities online, but were capable of recreating users' profiles after people deleted regular cookies.

Discussion Questions

1. How much privacy should people expect when using a social networking site or going online for information, shopping, or other tasks?

2. Who should be responsible for protecting Internet users' personal information? In your response, please address the appropriate role of the government, business, and individuals.

3. Should consumers share in the revenue generated from sales created by accessing the personal information from social networking and other Internet sites?

4. Do you believe there is a conflict between the economic interests of companies such as Facebook, MySpace, or Google, and their obligation to protect the personal information of their users? If you were an executive of one of these companies, how would you resolve that conflict?

Management Theories, Management Studies

  • Category:- Management Theories
  • Reference No.:- M92490803
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question?


Related Questions in Management Theories

Fully answer the assigned questions in narrative third

Fully answer the assigned questions in narrative, third person format. The paper consist of 1200 WORDS. Also, include at least three (3) scholarly sources in your responses. Paper must be completed in APA format. NO PLAG ...

Question - choose a product or technology interview five

Question - Choose a product or technology. Interview five consumers who buy that product and ask them what major problems they have with the product (or what major things they dislike about it). Then ask them to describe ...

Identify a health technology or a specific aspect of a

Identify a health technology or a specific aspect of a payment system that is changing for your health care setting. Work as a team to prepare a PowerPoint presentation to educate and inform your co-workers about the rec ...

Questionassume the role of presenter at a conference on

Question: Assume the role of presenter at a conference on organizational development, and then develop a PowerPoint presentation that addresses the following: Explain the importance of top-level leadership in organizatio ...

Assignment -for this assignment analyze and discuss your

Assignment - For this assignment, analyze and discuss your personal leadership style. Based on your experiences, current readings, work experience, education, and use of self-assessment instruments describe what you thin ...

Suppose a machine has two components that prevent injury

Suppose a machine has two components that prevent injury; component A and component B. If either of the components fail, an employee will be injured.  It is important to note that both A and B cannot fail at the same tim ...

Assignmentlearning outcome recognize the impact of

Assignment Learning Outcome: Recognize the impact of organizational culture on shaping values, attitudes and behavior. Case Study: Foundations of Individual Behavior Differing Perceptions at Clarkston Industries Susan Ha ...

In-depth evaluation of a retailers sustainability impacts

In-Depth Evaluation of a Retailer's Sustainability Impacts and Policies/Initiatives Coursework requirement This coursework requires that you prepare a report based on an in-depth evaluation of the sustainability impacts ...

Each of 30 teams in a league has a demand for generic

Each of 30 teams in a league has a demand for generic advertising of Q = 260 - 4P. Price is measured in thousands of dollars. Ads cost $510,000 each. How many ads will the teams want to purchase as a group?

A survey of us adults found that 69 of those who text on

A survey of U.S. adults found that 69% of those who text on cell phones receive spam or unwanted messages. You randomly select 100 U.S. adults who text on cell phones. A) Determine whether you can use a normal distributi ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As