KEMBAR78
Ethics Digital Data Privacy | PDF | Privacy | Artificial Intelligence
0% found this document useful (0 votes)
31 views12 pages

Ethics Digital Data Privacy

Uploaded by

Geleta Safoyi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views12 pages

Ethics Digital Data Privacy

Uploaded by

Geleta Safoyi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

ABDULLAH GUL UNIVERSITY

FACULTY OF MANAGERIAL SCIENCES

DEPARTMENT OF BUSINESS ADMINISTRATION

BA403 – BUSINESS ETHICS

FINAL REPORT

Ethics & Digital Data Privacy

Prepared by

Hassan Mohamed – 130110174


Outline

Abstract

Introduction

Literature Review

Privacy

Ethical Dilemmas

Why Do Companies Need Users’ Data?

How Do Companies Reach Users’ Data?

Laws & Regulations

Findings & Discussion

Conclusion

References

Abstract

This paper will discuss the ethical and moral dilemmas regarding Data privacy in this digital era.

It will take a qualitative method of gathering the literature previously written in the field by

various academicians from different but relevant backgrounds. This topic is considered to be very

critical especially these days since the world is coming across a new ear, the era of automation,

and artificial intelligence (AI). And, in order to be able to develop to that stage, the bases of data

privacy must be set in both the awareness of the general mass of people as well as to the heads of

organizations and businesses. Moreover, laws should also be set regarding this area in order to
ensure more privacy, justice, and stability regarding this topic. Furthermore, suggestions for

solutions will be given in order to take a step in solving the current ethical dilemma of data

privacy violation and manipulation.

Introduction

Data is the keyword for understanding the technological and industrial era we all live in today.

Data and information, considering the slight difference between them, are the solid base that

machine learning and artificial intelligence (AI) is built upon in the 4th industrial revolution

(industry 4.0). The 4rth industrial revolution basically means automating processes by using

technology and AI which heavily depend on cleaned data. Data could be simply put as the pieces

of facts, numbers, statistics…etc. While information could be explained as structured and

organized data, which puts context to the data. This data could be anything from Facebook’s

user’s ages, genders, locations...etc. to the social security numbers of a whole country. And since

we are at the peak of the era of data and information, many specializations have been found in

order to study, mine for, clean, analyze, and even manipulate data. This is why this is such a

sensitive topic. Data is the only thing any human being can provide that almost all businesses,

organizations, and even governments could buy and put to good or bad use.

After understanding the meaning of the fourth industrial revolution that we live in today, data and

its meaning, and the importance and widespread of data, it is time to briefly introduce the ethical

issues that could arise from the availability and need of data today. Since companies and

organizations could use data for many profitable manners, like tracking customer’s purchasing

behaviors, most visited websites, product preferences, and much more, it became clear that
companies and organizations are willing to do much in order to get their hands on people’s data.

Now, this might not seem like an ethical issue or any issue at all from the first moment, however,

this fact has led to many ethical and moral dilemmas. This is what will be explained in the paper.

What are the ethical and moral dilemmas caused by the rise of the importance of people’s data

and what actions were taken in order to solve these dilemmas both from the official governmental

laws and from the reactions of people to this problem? Moreover, more solutions will be

suggested in order to try to participate in solving this issue that has lasted for a couple of years to

date. Furthermore, this paper is considered as secondary research, which means it will gather

most of, if not all, the literature that was written by the academic community in the field of data,

privacy, and ethical issues regarding digital personal data. Finally, the findings and discussion

section will be presented in order to summarize the efforts of the previously written papers in

order to come up with other practical solutions to take a step at least in solving this dilemma and

long-lasting debate.

Literature Review

Privacy

In order to understand the dimensions of the subject, every part of it must be clearly defined and

explained, leading to a solid understanding of each attached string that is directly related to the

subject. After that comes the matching and integration of these different definitions and concepts

in order to paint the full picture of the subject. Clearly, this will lead to the ability to find

effective and practical solutions much more efficiently.


Parent (1983) claims that privacy is a word that has to be defined clearly in order to be able to

solve anything regarding this dilemma. According to Parent (1983): “Privacy is the condition of

not having undocumented personal knowledge about one possessed by others”. This basically

means that anyone’s personal knowledge should only be under his\her hands and no one else.

Here emerges an issue, in the digital world we all live in today, it is not clear anymore who has

whose data. This is simply because the internet requires much data from all its users, this data can

basically become in the hands of almost anyone if not securely stored and maintained. And since

most transactions and processes are digitalized, it is also hard to know who even has your data

since it could be copied and pasted for an unimaginable amount of time without any cost and with

barley any time or workforce.

Parent (1983) argues that the knowledge of personal data can result that the person might be

power by this person knowing such information. The control might hurt that person especially if

the information is managed by people without morals. However, Hughes (2012) states that as

long as the information demanded by the user to be protected did not reach another party and no

strangers as reached it then there is no any concern about the invasion of privacy. Pavlou (2011)

maintains that the personal willing of the person is the only measure that is effectively considered

in order to share their private information with a consensus of the literatures studied regardless of

any other scales the researchers conducted.

Ethical Dilemmas

After understanding what privacy means, and how it could easily be accessed and spread, a

question could arise which is: what are the harms of making this data public or in the hands of

many people? Violating and/or manipulating people’s privacy could mean putting people’s
mental-wellbeing, financial information, locations, passwords, and even life’s at sometimes at

stake. This is simply because people with bad intentions could use this data, which could seem

very simple and basic sometimes, to blackmail people for money, steal people’s financial

savings, hack into organizations, and even governments in order to acquire their private

information. All of these acts and much more could be done by simply giving access to people’s

data to someone or some organization, that is not trustworthy of it. Moreover, some organizations

even try to keep their consumers’ and stakeholders’ data and information safe and sound,

however, it is not that simple. Since the internet is available for everyone today, it becomes

possible for trained and experienced individuals to hack into systems in order to reach this poorly

secured data.

Why Do Companies Need Users’ Data?

Now, for the famous debate of individual data privacy and information security, it is important to

understand why companies and organizations ask for this data in the first place. The simple and

brief answer for that is that for companies having more data in general (meaning about the

market, suppliers, and generally all stakeholders), and having data for their customers in specific

is crucial to speed up their processes and make them more efficient. Now with a bit more detail.

Companies use customer’s data in order to know which market segment to market to. That way

they can save tons of money, time, and workforce to simply market for random segments of

people, or to gut-guess which type of customers are more likely to like and buy their product or

service. Moreover, having your customer’s data could also generally help to improve the

customer experience. This is because if a company or organization knows it’s customers’

purchasing behaviors, most visited locations & sites, personal preferences & tastes…etc. it

significantly improves the customers’ experience since the business knows where to find the
customer and what he/she will like or dislike as for their products or services. Furthermore,

companies and organizations can use data in order to secure more data. This means that if a

company is providing a service of cloud computing, for example, this company will need a lot of

data from the customer in order to have security questions for him/her in order to make sure no

one else can access this account except him/her. In simple words, simple data is sometimes

needed in order to secure more important or complex data.

Bowie and Jamal (2006) add another example of the importance of the cookies that has been the

concern of users over the previous years. They show that “Double Click” which is a business

acting as a bridge between websites and advertisers trying to elevate their products by reaching

the correct customers. Double click collects all the information of the users by the cookies button

appearing in popular websites and selling this information later to other websites attempting to

expand their businesses. Roger (2000) explains that with a single click on the cookies button

appearing on websites that has a direct contact with you via the email or that has any registration

process. With a unique ID for your information, double click can collect your data available in

Abacus database after a request from the advertisers, all happening automatically online.

How do Companies Reach Users’ Data?

Companies have various ways and methods in order to acquire people’s data. The simplest, most

common, and most ethical method is for the company to simply ask its users for their data.

Therefore, the user chooses either to provide his/her data to this specific company or not.

Moreover, the user could also choose which parts of his/her data are they willing to share and

which they are not willing to share. Another method that companies use to collect data is by

buying users’ data from other companies. This yet another common method of acquiring data,
however, this method could be a bit less straightforward, also some people would like to consider

it a bit unethical. As mentioned previously in this paper, today we live in the era of big data,

digitalization, and even automation. This means that data can be a very important currency or

asset people would like to buy or store for whenever it becomes handy. Also, the more data you

have as a company or organization the more upper hand you have when compared to your

competitors in the market. This is why you can find services such as data providers, or even data

brokers. Simply because data is very important and is sometimes hard to reach, so come

companies prefer buying clean, sorted, and relevant data.

Laws and Regulations

After briefly presenting the importance of data and its privacy, as well as the threats that may

occur if this data falls into the hands of the wrong people. It’s time to understand what kinds of

laws and regulations have been discussed, debated, and implemented in order to prevent any type

of violation or manipulation to peoples’ data. For example, the California Consumer Privacy Act

(CCPA) has been established in the USA in order to set rules, laws, and regulations in order for

data capturing and storage. Moreover, it also develops laws that are separated from the laws of

the companies’ decision-makers. Another example, this time from the European Union, is the

General Data Protection Requirements, also known as the GDPR. This has the same functions as

the California Consumer Privacy Act (CCPA), however, it also fines companies for misusing

consumer’s privacy. This is also a very effective way to implement these laws and rules in order

to prevent unethical dilemmas that might occur to users in these countries.

In addition, Bowie and Jamal (2006) conduct an overview on the privacy law in e-commerce by

comparing USA and the EU. While the EU is constraining usage of private information except

for explicit and legal purposes with a data protection rules placed by the European Directive and
has to be fulfilled by all the EU members generally, the USA is not having any regulations that

control the personal information of the user. The websites are free to use and collect any data

they are searching for without any limits. There are no legal actions that will be taken in case

unless for three exceptions: Financial and health care industries and Children’s Online Privacy

Act. A real example available is EBay website which requires questioning of the age to be able to

collect and process the data they collect from users.

Bowie and Jamal (2006) illustrate the application within the scope of marketing in e-commerce

with the application of two principles. Firstly, having a privacy policy and secondly the easiness

of finding and reading the policy itself. The first principle is considered as a requirement in terms

of morality to attain the awareness of the reader and meet it with criterion. Additionally, the

second principle refers again to the awareness the user as it is crucial for the data collected of the

user to be known and approved from his side with a clear and obvious privacy policy with a

single click away on the main homepage.

Findings & Discussion

It is relatively clear by now that the ethical issues regarding the privacy of digital data is truly

important and worthy of discussion and research. Moreover, to summarize and the findings and

simply state a proposal for what should be done in order to achieve more privacy for users while

not harming organizations or businesses. There are two main factors that take the main role in

solving this digital privacy issue, the people and the government. Both sides play a major role

and the issue cannot be solved by one side on its own. The government is responsible to establish

and implement rules and regulations like the California Consumer Privacy Act (CCPA) and the
General Data Protection Requirements (GDPR). This part is crucial to ensure that a superior force

is monitoring the market. On the other hand, people also have an important role to play in order

to solve this issue. People should be very aware where they share their data and to whom they

give access to. This will prevent a lot of ethical violations to happen in the first place. By

combining both these forces, the governmental regulations, and the awareness of the people, it

will become very difficult for organizations or individuals with bad intentions to penetrate or use

people’s private data in an unethical manner.

Conclusion

After presenting the meaning of data, privacy, ethical dilemmas regarding data manipulation,

violation, and hacking; answers for questions like why do companies need users’ data and how

do companies reach users’ data, the paper finished off by explaining the laws and regulations

regarding digital data privacy while giving practical solutions on how to solve this problem.

Moreover, further research should be done by academicians from the field of law in order to

discuss the optimal set of rules and regulations in order to achieve the best balance of privacy but

while having an acceptable level of customer satisfaction and organizational profit.

References
- Bowie, N., & Jamal, K. (2006). Privacy Rights on the Internet: Self-Regulation or

Government Regulation? Business Ethics Quarterly, 16(3), 323-342. Retrieved August

15, 2020, from www.jstor.org/stable/3857919

- Cohen, J. (2012). Reimagining Privacy. In Configuring the Networked Self (pp. 127-152).

New Haven; London: Yale University Press. Retrieved August 15, 2020, from

www.jstor.org/stable/j.ctt5vm24d.9

- Fried, C. (1968). Privacy. The Yale Law Journal, 77(3), 475-493. doi:10.2307/794941

- Hughes, K. (2012). A Behavioural Understanding of Privacy and its Implications for

Privacy Law. The Modern Law Review, 75(5), 806-836. Retrieved August 15, 2020, from

www.jstor.org/stable/41682872

- Kulhari, S. (2018). Data Protection, Privacy and Identity: A Complex Triad. In Building-

Blocks of a Data Protection Revolution: The Uneasy Case for Block chain Technology to

Secure Privacy and Identity (pp. 23-37). Baden-Baden, Germany: Nomos

Verlagsgesellschaft mbH. Retrieved August 15, 2020, from

www.jstor.org/stable/j.ctv941qz6.7

- Parent, W. (1983). Privacy, Morality, and the Law. Philosophy & Public Affairs, 12(4),

269-288. Retrieved August 15, 2020, from www.jstor.org/stable/2265374

- Pavlou, P. (2011). State of the Information Privacy Literature: Where are We Now And

Where Should We Go? MIS Quarterly, 35(4), 977-988. doi:10.2307/41409969

- Regan, P. (1995). Privacy‚ Technology‚ and Public Policy. In Legislating Privacy:

Technology, Social Values, and Public Policy (pp. 1-23). University of North Carolina
Press. Retrieved August 15, 2020, from

www.jstor.org/stable/10.5149/9780807864050_regan.5

- Richards, N. M., & King, J. H. (2014). Big data ethics. Wake Forest L. Rev., 49, 393.

https://www.rdalliance.org/system/files/documents/Richards%20%26%20King

%20%282014%29%20Big%20data%20ethics.pdf

- Rodger, W. 2000. "Activists Charge DoubleClick Double Cross." USA Today (February

21), available at usatoday.com

- Singh, S. (2011). PRIVACY AND DATA PROTECTION IN INDIA: A CRITICAL

ASSESSMENT. Journal of the Indian Law Institute, 53(4), 663-677. Retrieved August

15, 2020, from www.jstor.org/stable/45148583

You might also like