SlideShare a Scribd company logo
1 of 1
Download to read offline
Module 6 Discussion
Introduction
Data ethics is a branch of ethics that evaluates data practicescollecting, generating, analyzing and
disseminating data, both structured and unstructuredthat have the potential to adversely impact
people and society. However, the use of social media data raises several crucial ethical issues
around the areas of informed consent, anonymity and profiling of individuals. Social networking
platforms, mobile phone technology, and ubiquitous data-gathering software have become
enmeshed with daily life for most people in developed, western nations (HASTAC.orgLinks to
an external site., 2013). Because of this, we have seemingly grown comfortable to the point of
sharing our personal identities, habits, and attitudes with companies in exchange for "free" or
customized services and benefits (Carey and Burkell, 2009). However, with recent news events
about the National Security Agency's position on collecting data from Internet companies, along
with the events surrounding NSA whistleblower Edward Snowden (and the subsequent media
frenzy), the problematic nature of "dataveillance," or the surveillance of the aforementioned
archives of data, becomes apparent. Use the Internet to further research the terms data ethics and
dataveillance.
Directions
Answer the following questions:
Why do we need to worry about dataveillance on a personal and professional level?
Is there anything more productive we can do to protect our privacy and still take advantage of all
of the opportunities in today's digital age?

More Related Content

Similar to Module 6 DiscussionIntroductionData ethics is a branch of ethics.pdf

ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONPranav Godse
 
A foundation for breach data analysis
A foundation for breach data analysisA foundation for breach data analysis
A foundation for breach data analysisAlexander Decker
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11DaliaCulbertson719
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docxmayank272369
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docxwrite12
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docxwrite31
 
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
Privacy as identity territoriality  re-conceptualising behaviour in cyberspacePrivacy as identity territoriality  re-conceptualising behaviour in cyberspace
Privacy as identity territoriality re-conceptualising behaviour in cyberspaceFabrice Epelboin
 
‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...eraser Juan José Calderón
 
1Annotated BibliographyTamika S. BouldinLibe
1Annotated BibliographyTamika S. BouldinLibe1Annotated BibliographyTamika S. BouldinLibe
1Annotated BibliographyTamika S. BouldinLibecargillfilberto
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceNANDI AYANA
 
Understand the Idea of Big Data and in Present Scenario
Understand the Idea of Big Data and in Present ScenarioUnderstand the Idea of Big Data and in Present Scenario
Understand the Idea of Big Data and in Present ScenarioAI Publications
 
Online Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study ApproachOnline Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study ApproachIJECEIAES
 
Some ethicists argue that the very conduct that results in resistanc.pdf
Some ethicists argue that the very conduct that results in resistanc.pdfSome ethicists argue that the very conduct that results in resistanc.pdf
Some ethicists argue that the very conduct that results in resistanc.pdflibowskymcinnisell69
 
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Arab Federation for Digital Economy
 
The Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy InvasionThe Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy Invasioniosrjce
 

Similar to Module 6 DiscussionIntroductionData ethics is a branch of ethics.pdf (20)

ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 
Big Data Ethics
Big Data EthicsBig Data Ethics
Big Data Ethics
 
A foundation for breach data analysis
A foundation for breach data analysisA foundation for breach data analysis
A foundation for breach data analysis
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
 
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
Privacy as identity territoriality  re-conceptualising behaviour in cyberspacePrivacy as identity territoriality  re-conceptualising behaviour in cyberspace
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
 
‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...
 
1Annotated BibliographyTamika S. BouldinLibe
1Annotated BibliographyTamika S. BouldinLibe1Annotated BibliographyTamika S. BouldinLibe
1Annotated BibliographyTamika S. BouldinLibe
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillance
 
Understand the Idea of Big Data and in Present Scenario
Understand the Idea of Big Data and in Present ScenarioUnderstand the Idea of Big Data and in Present Scenario
Understand the Idea of Big Data and in Present Scenario
 
Online Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study ApproachOnline Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study Approach
 
Some ethicists argue that the very conduct that results in resistanc.pdf
Some ethicists argue that the very conduct that results in resistanc.pdfSome ethicists argue that the very conduct that results in resistanc.pdf
Some ethicists argue that the very conduct that results in resistanc.pdf
 
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
 
Big Data Paper
Big Data PaperBig Data Paper
Big Data Paper
 
Conference Report Final 11.18
Conference Report Final 11.18Conference Report Final 11.18
Conference Report Final 11.18
 
The Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy InvasionThe Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy Invasion
 

More from saxenaavnish1

Mire el documental Am�rica se convierte en una potencia mundial, lea.pdf
Mire el documental Am�rica se convierte en una potencia mundial, lea.pdfMire el documental Am�rica se convierte en una potencia mundial, lea.pdf
Mire el documental Am�rica se convierte en una potencia mundial, lea.pdfsaxenaavnish1
 
Mini Case identificaci�n de los clientes adecuados para el ka de Fo.pdf
Mini Case identificaci�n de los clientes adecuados para el ka de Fo.pdfMini Case identificaci�n de los clientes adecuados para el ka de Fo.pdf
Mini Case identificaci�n de los clientes adecuados para el ka de Fo.pdfsaxenaavnish1
 
Millie Larsen es una mujer de 84 a�os que vive sola en una casa pequ.pdf
Millie Larsen es una mujer de 84 a�os que vive sola en una casa pequ.pdfMillie Larsen es una mujer de 84 a�os que vive sola en una casa pequ.pdf
Millie Larsen es una mujer de 84 a�os que vive sola en una casa pequ.pdfsaxenaavnish1
 
Miles, a 20 year old male, is seeking counseling because his paterna.pdf
Miles, a 20 year old male, is seeking counseling because his paterna.pdfMiles, a 20 year old male, is seeking counseling because his paterna.pdf
Miles, a 20 year old male, is seeking counseling because his paterna.pdfsaxenaavnish1
 
Mike s 3, p 2Leo s 2 , p 2Don s 1 , p 2April s 3 , p 1.pdf
Mike  s 3, p 2Leo  s 2 , p 2Don s 1 , p 2April  s 3 , p 1.pdfMike  s 3, p 2Leo  s 2 , p 2Don s 1 , p 2April  s 3 , p 1.pdf
Mike s 3, p 2Leo s 2 , p 2Don s 1 , p 2April s 3 , p 1.pdfsaxenaavnish1
 
Miguel is the managing general partner of MAR and owns a 40 interes.pdf
Miguel is the managing general partner of MAR and owns a 40 interes.pdfMiguel is the managing general partner of MAR and owns a 40 interes.pdf
Miguel is the managing general partner of MAR and owns a 40 interes.pdfsaxenaavnish1
 
Michael Porter de Harvard ha propuesto la cadena de valor como una h.pdf
Michael Porter de Harvard ha propuesto la cadena de valor como una h.pdfMichael Porter de Harvard ha propuesto la cadena de valor como una h.pdf
Michael Porter de Harvard ha propuesto la cadena de valor como una h.pdfsaxenaavnish1
 
Microbiology Describe the relationship between DNA and RNA con.pdf
Microbiology Describe the relationship between DNA and RNA con.pdfMicrobiology Describe the relationship between DNA and RNA con.pdf
Microbiology Describe the relationship between DNA and RNA con.pdfsaxenaavnish1
 
Michael leases a Lucerne farm to Boaz for a term of three years. Aft.pdf
Michael leases a Lucerne farm to Boaz for a term of three years. Aft.pdfMichael leases a Lucerne farm to Boaz for a term of three years. Aft.pdf
Michael leases a Lucerne farm to Boaz for a term of three years. Aft.pdfsaxenaavnish1
 
me quedan 35 munites por favor ayudenme Art�culo 1 En el caso .pdf
me quedan 35 munites por favor ayudenme Art�culo 1 En el caso .pdfme quedan 35 munites por favor ayudenme Art�culo 1 En el caso .pdf
me quedan 35 munites por favor ayudenme Art�culo 1 En el caso .pdfsaxenaavnish1
 
Mendel logr� descubrir las leyes b�sicas de la herencia, mientras qu.pdf
Mendel logr� descubrir las leyes b�sicas de la herencia, mientras qu.pdfMendel logr� descubrir las leyes b�sicas de la herencia, mientras qu.pdf
Mendel logr� descubrir las leyes b�sicas de la herencia, mientras qu.pdfsaxenaavnish1
 
MCQ Select the correct answer.1. What does SQL stand fora.pdf
MCQ  Select the correct answer.1. What does SQL stand fora.pdfMCQ  Select the correct answer.1. What does SQL stand fora.pdf
MCQ Select the correct answer.1. What does SQL stand fora.pdfsaxenaavnish1
 
MCQ Pls Help ACC495 Corporate Governance and Risk Management Which .pdf
MCQ Pls Help ACC495 Corporate Governance and Risk Management Which .pdfMCQ Pls Help ACC495 Corporate Governance and Risk Management Which .pdf
MCQ Pls Help ACC495 Corporate Governance and Risk Management Which .pdfsaxenaavnish1
 
Megan se gradu� de la universidad hace tres a�os y ha estado trabaja.pdf
Megan se gradu� de la universidad hace tres a�os y ha estado trabaja.pdfMegan se gradu� de la universidad hace tres a�os y ha estado trabaja.pdf
Megan se gradu� de la universidad hace tres a�os y ha estado trabaja.pdfsaxenaavnish1
 
media luna pura Sarah Ryan, vicepresidenta de marketing de Portlan.pdf
media luna pura Sarah Ryan, vicepresidenta de marketing de Portlan.pdfmedia luna pura Sarah Ryan, vicepresidenta de marketing de Portlan.pdf
media luna pura Sarah Ryan, vicepresidenta de marketing de Portlan.pdfsaxenaavnish1
 
my code doesnt work can you help me please the whole idea of is it i.pdf
my code doesnt work can you help me please the whole idea of is it i.pdfmy code doesnt work can you help me please the whole idea of is it i.pdf
my code doesnt work can you help me please the whole idea of is it i.pdfsaxenaavnish1
 
Must be in C++ programming The main objective of this experiment i.pdf
Must be in C++ programming The main objective of this experiment i.pdfMust be in C++ programming The main objective of this experiment i.pdf
Must be in C++ programming The main objective of this experiment i.pdfsaxenaavnish1
 
MUS monetary unit samplingA) What is the planned sample sizeB).pdf
MUS monetary unit samplingA) What is the planned sample sizeB).pdfMUS monetary unit samplingA) What is the planned sample sizeB).pdf
MUS monetary unit samplingA) What is the planned sample sizeB).pdfsaxenaavnish1
 
Multifactor authentication (MFA) requires users to authenticate thei.pdf
Multifactor authentication (MFA) requires users to authenticate thei.pdfMultifactor authentication (MFA) requires users to authenticate thei.pdf
Multifactor authentication (MFA) requires users to authenticate thei.pdfsaxenaavnish1
 
MTCR es una empresa l�der en el desarrollo y fabricaci�n de una ampl.pdf
MTCR es una empresa l�der en el desarrollo y fabricaci�n de una ampl.pdfMTCR es una empresa l�der en el desarrollo y fabricaci�n de una ampl.pdf
MTCR es una empresa l�der en el desarrollo y fabricaci�n de una ampl.pdfsaxenaavnish1
 

More from saxenaavnish1 (20)

Mire el documental Am�rica se convierte en una potencia mundial, lea.pdf
Mire el documental Am�rica se convierte en una potencia mundial, lea.pdfMire el documental Am�rica se convierte en una potencia mundial, lea.pdf
Mire el documental Am�rica se convierte en una potencia mundial, lea.pdf
 
Mini Case identificaci�n de los clientes adecuados para el ka de Fo.pdf
Mini Case identificaci�n de los clientes adecuados para el ka de Fo.pdfMini Case identificaci�n de los clientes adecuados para el ka de Fo.pdf
Mini Case identificaci�n de los clientes adecuados para el ka de Fo.pdf
 
Millie Larsen es una mujer de 84 a�os que vive sola en una casa pequ.pdf
Millie Larsen es una mujer de 84 a�os que vive sola en una casa pequ.pdfMillie Larsen es una mujer de 84 a�os que vive sola en una casa pequ.pdf
Millie Larsen es una mujer de 84 a�os que vive sola en una casa pequ.pdf
 
Miles, a 20 year old male, is seeking counseling because his paterna.pdf
Miles, a 20 year old male, is seeking counseling because his paterna.pdfMiles, a 20 year old male, is seeking counseling because his paterna.pdf
Miles, a 20 year old male, is seeking counseling because his paterna.pdf
 
Mike s 3, p 2Leo s 2 , p 2Don s 1 , p 2April s 3 , p 1.pdf
Mike  s 3, p 2Leo  s 2 , p 2Don s 1 , p 2April  s 3 , p 1.pdfMike  s 3, p 2Leo  s 2 , p 2Don s 1 , p 2April  s 3 , p 1.pdf
Mike s 3, p 2Leo s 2 , p 2Don s 1 , p 2April s 3 , p 1.pdf
 
Miguel is the managing general partner of MAR and owns a 40 interes.pdf
Miguel is the managing general partner of MAR and owns a 40 interes.pdfMiguel is the managing general partner of MAR and owns a 40 interes.pdf
Miguel is the managing general partner of MAR and owns a 40 interes.pdf
 
Michael Porter de Harvard ha propuesto la cadena de valor como una h.pdf
Michael Porter de Harvard ha propuesto la cadena de valor como una h.pdfMichael Porter de Harvard ha propuesto la cadena de valor como una h.pdf
Michael Porter de Harvard ha propuesto la cadena de valor como una h.pdf
 
Microbiology Describe the relationship between DNA and RNA con.pdf
Microbiology Describe the relationship between DNA and RNA con.pdfMicrobiology Describe the relationship between DNA and RNA con.pdf
Microbiology Describe the relationship between DNA and RNA con.pdf
 
Michael leases a Lucerne farm to Boaz for a term of three years. Aft.pdf
Michael leases a Lucerne farm to Boaz for a term of three years. Aft.pdfMichael leases a Lucerne farm to Boaz for a term of three years. Aft.pdf
Michael leases a Lucerne farm to Boaz for a term of three years. Aft.pdf
 
me quedan 35 munites por favor ayudenme Art�culo 1 En el caso .pdf
me quedan 35 munites por favor ayudenme Art�culo 1 En el caso .pdfme quedan 35 munites por favor ayudenme Art�culo 1 En el caso .pdf
me quedan 35 munites por favor ayudenme Art�culo 1 En el caso .pdf
 
Mendel logr� descubrir las leyes b�sicas de la herencia, mientras qu.pdf
Mendel logr� descubrir las leyes b�sicas de la herencia, mientras qu.pdfMendel logr� descubrir las leyes b�sicas de la herencia, mientras qu.pdf
Mendel logr� descubrir las leyes b�sicas de la herencia, mientras qu.pdf
 
MCQ Select the correct answer.1. What does SQL stand fora.pdf
MCQ  Select the correct answer.1. What does SQL stand fora.pdfMCQ  Select the correct answer.1. What does SQL stand fora.pdf
MCQ Select the correct answer.1. What does SQL stand fora.pdf
 
MCQ Pls Help ACC495 Corporate Governance and Risk Management Which .pdf
MCQ Pls Help ACC495 Corporate Governance and Risk Management Which .pdfMCQ Pls Help ACC495 Corporate Governance and Risk Management Which .pdf
MCQ Pls Help ACC495 Corporate Governance and Risk Management Which .pdf
 
Megan se gradu� de la universidad hace tres a�os y ha estado trabaja.pdf
Megan se gradu� de la universidad hace tres a�os y ha estado trabaja.pdfMegan se gradu� de la universidad hace tres a�os y ha estado trabaja.pdf
Megan se gradu� de la universidad hace tres a�os y ha estado trabaja.pdf
 
media luna pura Sarah Ryan, vicepresidenta de marketing de Portlan.pdf
media luna pura Sarah Ryan, vicepresidenta de marketing de Portlan.pdfmedia luna pura Sarah Ryan, vicepresidenta de marketing de Portlan.pdf
media luna pura Sarah Ryan, vicepresidenta de marketing de Portlan.pdf
 
my code doesnt work can you help me please the whole idea of is it i.pdf
my code doesnt work can you help me please the whole idea of is it i.pdfmy code doesnt work can you help me please the whole idea of is it i.pdf
my code doesnt work can you help me please the whole idea of is it i.pdf
 
Must be in C++ programming The main objective of this experiment i.pdf
Must be in C++ programming The main objective of this experiment i.pdfMust be in C++ programming The main objective of this experiment i.pdf
Must be in C++ programming The main objective of this experiment i.pdf
 
MUS monetary unit samplingA) What is the planned sample sizeB).pdf
MUS monetary unit samplingA) What is the planned sample sizeB).pdfMUS monetary unit samplingA) What is the planned sample sizeB).pdf
MUS monetary unit samplingA) What is the planned sample sizeB).pdf
 
Multifactor authentication (MFA) requires users to authenticate thei.pdf
Multifactor authentication (MFA) requires users to authenticate thei.pdfMultifactor authentication (MFA) requires users to authenticate thei.pdf
Multifactor authentication (MFA) requires users to authenticate thei.pdf
 
MTCR es una empresa l�der en el desarrollo y fabricaci�n de una ampl.pdf
MTCR es una empresa l�der en el desarrollo y fabricaci�n de una ampl.pdfMTCR es una empresa l�der en el desarrollo y fabricaci�n de una ampl.pdf
MTCR es una empresa l�der en el desarrollo y fabricaci�n de una ampl.pdf
 

Recently uploaded

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Module 6 DiscussionIntroductionData ethics is a branch of ethics.pdf

  • 1. Module 6 Discussion Introduction Data ethics is a branch of ethics that evaluates data practicescollecting, generating, analyzing and disseminating data, both structured and unstructuredthat have the potential to adversely impact people and society. However, the use of social media data raises several crucial ethical issues around the areas of informed consent, anonymity and profiling of individuals. Social networking platforms, mobile phone technology, and ubiquitous data-gathering software have become enmeshed with daily life for most people in developed, western nations (HASTAC.orgLinks to an external site., 2013). Because of this, we have seemingly grown comfortable to the point of sharing our personal identities, habits, and attitudes with companies in exchange for "free" or customized services and benefits (Carey and Burkell, 2009). However, with recent news events about the National Security Agency's position on collecting data from Internet companies, along with the events surrounding NSA whistleblower Edward Snowden (and the subsequent media frenzy), the problematic nature of "dataveillance," or the surveillance of the aforementioned archives of data, becomes apparent. Use the Internet to further research the terms data ethics and dataveillance. Directions Answer the following questions: Why do we need to worry about dataveillance on a personal and professional level? Is there anything more productive we can do to protect our privacy and still take advantage of all of the opportunities in today's digital age?