SlideShare a Scribd company logo
   Ethical relates to moral principles of right and wrong.
    Diverse individuals have different perspectives on
    topics, situations and life therefore they use their own
    knowledge, experience and value to judge whether it
    is ethical or unethical. Ethics is involved in majority
    of disciples of study e.g.
    medical, business, engineering, etc. Although, there
    are not ethical issues involving specifically in Digital
    Identity, it would be similar to computing ethics.
   Anonymity
   Monitoring
   Invading user's privacy
   Users consent
   Copyright information
   Misusing data
   Difference between real and Digital Identity
   Unable to control our own data
   Monitoring people does have some significance
    advantages i.e. public safety, national
    security, searchable databases, law enforcement and
    prevent crimes. However, it is still invading on
    someone’s privacy, violating individual
    rights, misusing the information, committing an
    immoral act and also used for cynical reasons i.e. for
    personal gain, business advantage and committing
    crimes. It means individual’s privacy is not
    respected, private, confidential, secure and
    controlled. Hence, ethical issues arises.
Anonymity can be a blessing to protect, secure privacy
and freedom of expression. Nevertheless, anonymity also
has benefits to cybercriminals; as it is easier to monitor,
hack, track and store data of an individual without their
permission. One should respect other’s privacy but to
what extent should this be taken in account for? How
should one know, if a person’s decision to remain
anonymous is justifiable? It is not ethically acceptable for
a person to hide their true identity, surf the internet
possibly to commit crimes or deceive people to gain
access to the required information.
   How our digital avatar varies comparing to our real
    life can be considered unethical. i.e. using our own
    photos, information, etc but behaving in certain ways
    that we would not in real life. It can be measured as
    deceiving other people and somehow relates to
    anonymity. while some people may have suitable
    reason, someone might take advantage of it to
    mislead other individuals. However, it varies on each
    individuals opinion.
   Cookies, web bugs, spyware, internet protocol
    (IP), loyalty cards and CCTV are being used to
    monitor, track and store personal
    information, activities and users behaviour online.
    The collected data is mainly utilized for market
    analysis, direct marketing or advertisement. What’s
    ethical and unethical about monitoring depends on
    the situation. I.e. hacking criminals account or
    monitoring criminals can be understandable but
    invading users privacy for business is not ethical.
   Using cookies to monitor users is common usually
    for a person’s convenience. Although, it is now illegal
    to use cookies without visitors permission, there are
    still thousands of website who uses cookies without
    visitors authorization. Not only it is illegal, it is also
    morally wrong to track people without their
    permission. Every website should follow the rule as
    part of legal requirement, which would also be more
    ethical as users would be aware of cookies procedure
    in the website.
People collect, store and process our data for various purpose, misusing
data involves breaching the law “Data Protection Act” and the
principles are as follow:
 Data should be used fairly and lawfully
 Data should be used for limited, specifically stated purposes
 Data should be used in a way that is adequate, relevant and not
  excessive
 Data should be accurate
 Data should not be kept longer than is absolutely necessary
 Data should be handled according to people’s data protection rights
 Data should be kept safe and secure
 Data should not be transferred outside the UK without adequate
  protection
No one should misuse our data legally and ethically i.e. selling the data
  without our knowledge, using it for other reasons than specified, etc.
 Copyright is about the exclusive legal right given to the
  authors or creators for their work, “original works of
  authorship,”. Only the author can:
• Reproduce the work in copies or sound recordings.
• Make derivative works based upon the original.
• Distribute copies or sound recordings of the original to the
  public by sales, rentals, leasing, lending or licensing.
• Perform the original publicly; and that would include the use
  of digital audio.
• Display the original publicly.
This is also illegal and not morally right to use copyrighted
information without their permission.
   Once we have posted any information about
    ourselves i.e. status
    updates, messages, pictures, videos or any other
    sensitive data. We do not have control over it i.e.
    unless these information is kept private, other may
    access the information easily and use it accordingly.
    Not only that, we don’t have control over what other
    publish about us, for various reasons i.e. for safety
    and security reasons this is not right.
   http://www.aveksa.com/Portals/176226/images/data-cloud-370x229.jpg
   http://hollandlawfirm.com/images/invasion-of-privacy-thumb4332469.jpg
   http://mtaram.com/blog/wp-content/uploads/2012/10/anonymous.jpg
   http://scm-l3.technorati.com/13/02/16/75069/social-media-
    monitoring.jpg?t=20130216010535
   http://i1-scripts.softpedia-static.com/screenshots/Cookie-Consent_1.png
   http://www.lakeside-
    storage.co.uk/files/Data%20protection%20act%20%201998_%20Secure%20docume
    nt%20storage_.JPG
   http://www.ico.gov.uk/for_organisations/data_protection/the_guide/the_principle
    s.aspx
   http://www.copyrightkids.org/whatcopyframes.htm
   http://inventors.about.com/od/copyrights101basicsfaq/f/copyrights.htm
   http://2.bp.blogspot.com/_X27b1eNr_Fk/TLxQzcHCjOI/AAAAAAAAAB8/tOJfTI9VT
    7E/s1600/copyright.gif

More Related Content

What's hot

Cybercrime
CybercrimeCybercrime
Cybercrime
promit
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
Alisha Korpal
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
Sonu Sunaliya
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
Kodok Ngorex
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
sp_krishna
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
Skippedltd
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
yazad dumasia
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
Poonam Bhasin
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
himanshu jain
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
Mukesh Tekwani
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber Attacks
Resilient Systems
 
Ediscovery 101
Ediscovery 101Ediscovery 101
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
Arab Federation for Digital Economy
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
Kristin Briney
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Harendra Singh
 

What's hot (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber Attacks
 
Ediscovery 101
Ediscovery 101Ediscovery 101
Ediscovery 101
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Viewers also liked

Ethics in marketing
Ethics in marketingEthics in marketing
Ethics in marketing
SUPRIYA SINGH
 
Professional
ProfessionalProfessional
Professional
Digital-identity
 
Safety
SafetySafety
Counterfeit Drugs in America: 2017 Overview
Counterfeit Drugs in America: 2017 OverviewCounterfeit Drugs in America: 2017 Overview
Counterfeit Drugs in America: 2017 Overview
The Partnership For Safe Medicines
 
Using Text (SMS) Message Marketing
Using Text (SMS) Message MarketingUsing Text (SMS) Message Marketing
Using Text (SMS) Message Marketing
Judd Wheeler
 
Viral Marketing 101
Viral Marketing 101Viral Marketing 101
Viral Marketing 101
Venchito Tampon
 
Text Message Marketing Basics
Text Message Marketing BasicsText Message Marketing Basics
Text Message Marketing Basics
ARMS
 
digital marketing advertising campaign ethics
digital marketing advertising campaign ethicsdigital marketing advertising campaign ethics
digital marketing advertising campaign ethics
Leigh Roessler
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
Digital-identity
 
The 4 Faces of a Bad Strategy: Why People, Startups, and Established Organiza...
The 4 Faces of a Bad Strategy: Why People, Startups, and Established Organiza...The 4 Faces of a Bad Strategy: Why People, Startups, and Established Organiza...
The 4 Faces of a Bad Strategy: Why People, Startups, and Established Organiza...
Rod King, Ph.D.
 
VIRAL MARKETING
VIRAL MARKETINGVIRAL MARKETING
VIRAL MARKETING
Devesh Verma
 
Ethical e-Marketing
Ethical e-MarketingEthical e-Marketing
Ethical e-Marketing
Thom. Poole
 
Ethics of Digital Marketing for North Carolina Attorneys
Ethics of Digital Marketing for North Carolina AttorneysEthics of Digital Marketing for North Carolina Attorneys
Ethics of Digital Marketing for North Carolina Attorneys
Ginny Allen
 
SMS Marketing Seminar
SMS Marketing SeminarSMS Marketing Seminar
SMS Marketing Seminar
Tatango
 
The good, bad, and ugly of digital marketing
The good, bad, and ugly of digital marketingThe good, bad, and ugly of digital marketing
The good, bad, and ugly of digital marketing
Tech in Asia
 
Viral marketing
Viral marketingViral marketing
Viral marketing
Pritam Mahajan
 
Ethical issues in direct marketing
Ethical issues in direct marketingEthical issues in direct marketing
Ethical issues in direct marketing
ANJITH JOHN
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
Largest Catholic University
 
Viral marketing with an example
Viral marketing with an exampleViral marketing with an example
Viral marketing with an example
Tapas Kumar Das
 
Ethics in emarketing
Ethics in emarketingEthics in emarketing
Ethics in emarketing
Raveena Kaushal
 

Viewers also liked (20)

Ethics in marketing
Ethics in marketingEthics in marketing
Ethics in marketing
 
Professional
ProfessionalProfessional
Professional
 
Safety
SafetySafety
Safety
 
Counterfeit Drugs in America: 2017 Overview
Counterfeit Drugs in America: 2017 OverviewCounterfeit Drugs in America: 2017 Overview
Counterfeit Drugs in America: 2017 Overview
 
Using Text (SMS) Message Marketing
Using Text (SMS) Message MarketingUsing Text (SMS) Message Marketing
Using Text (SMS) Message Marketing
 
Viral Marketing 101
Viral Marketing 101Viral Marketing 101
Viral Marketing 101
 
Text Message Marketing Basics
Text Message Marketing BasicsText Message Marketing Basics
Text Message Marketing Basics
 
digital marketing advertising campaign ethics
digital marketing advertising campaign ethicsdigital marketing advertising campaign ethics
digital marketing advertising campaign ethics
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
 
The 4 Faces of a Bad Strategy: Why People, Startups, and Established Organiza...
The 4 Faces of a Bad Strategy: Why People, Startups, and Established Organiza...The 4 Faces of a Bad Strategy: Why People, Startups, and Established Organiza...
The 4 Faces of a Bad Strategy: Why People, Startups, and Established Organiza...
 
VIRAL MARKETING
VIRAL MARKETINGVIRAL MARKETING
VIRAL MARKETING
 
Ethical e-Marketing
Ethical e-MarketingEthical e-Marketing
Ethical e-Marketing
 
Ethics of Digital Marketing for North Carolina Attorneys
Ethics of Digital Marketing for North Carolina AttorneysEthics of Digital Marketing for North Carolina Attorneys
Ethics of Digital Marketing for North Carolina Attorneys
 
SMS Marketing Seminar
SMS Marketing SeminarSMS Marketing Seminar
SMS Marketing Seminar
 
The good, bad, and ugly of digital marketing
The good, bad, and ugly of digital marketingThe good, bad, and ugly of digital marketing
The good, bad, and ugly of digital marketing
 
Viral marketing
Viral marketingViral marketing
Viral marketing
 
Ethical issues in direct marketing
Ethical issues in direct marketingEthical issues in direct marketing
Ethical issues in direct marketing
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
Viral marketing with an example
Viral marketing with an exampleViral marketing with an example
Viral marketing with an example
 
Ethics in emarketing
Ethics in emarketingEthics in emarketing
Ethics in emarketing
 

Similar to Ethical issues in Digital Identity

Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
fatimagull32
 
E commerce
E commerce E commerce
E commerce
DrSelvamohanaK
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
SheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
Abdah Munirah
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
Ravindra Babu
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
Data-Set
 
Information-Control-and-Privacy.powerpoint
Information-Control-and-Privacy.powerpointInformation-Control-and-Privacy.powerpoint
Information-Control-and-Privacy.powerpoint
kathymolina568
 
Information-Control-and-Privacy.Powerpoint
Information-Control-and-Privacy.PowerpointInformation-Control-and-Privacy.Powerpoint
Information-Control-and-Privacy.Powerpoint
kathymolina568
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
sadia456189
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
Data-Set
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
Data-Set
 
Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Information Privacy?! (GDPR)
Information Privacy?! (GDPR)
Michel Bitter
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
Data-Set
 
Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin Nevias
Kevin Nevias
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension Inc.
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
Christopher Lisasi
 
Ss
SsSs
Unit 14 lo2
Unit 14 lo2Unit 14 lo2
Unit 14 lo2
harrymyerswest
 
9626 chapter 5 e security
9626 chapter 5 e security9626 chapter 5 e security
9626 chapter 5 e security
Sixth-form
 

Similar to Ethical issues in Digital Identity (20)

Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
E commerce
E commerce E commerce
E commerce
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
Information-Control-and-Privacy.powerpoint
Information-Control-and-Privacy.powerpointInformation-Control-and-Privacy.powerpoint
Information-Control-and-Privacy.powerpoint
 
Information-Control-and-Privacy.Powerpoint
Information-Control-and-Privacy.PowerpointInformation-Control-and-Privacy.Powerpoint
Information-Control-and-Privacy.Powerpoint
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Information Privacy?! (GDPR)
Information Privacy?! (GDPR)
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
 
Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin Nevias
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
 
Ss
SsSs
Ss
 
Unit 14 lo2
Unit 14 lo2Unit 14 lo2
Unit 14 lo2
 
9626 chapter 5 e security
9626 chapter 5 e security9626 chapter 5 e security
9626 chapter 5 e security
 

Recently uploaded

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 

Recently uploaded (20)

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 

Ethical issues in Digital Identity

  • 1.
  • 2.
  • 3. Ethical relates to moral principles of right and wrong. Diverse individuals have different perspectives on topics, situations and life therefore they use their own knowledge, experience and value to judge whether it is ethical or unethical. Ethics is involved in majority of disciples of study e.g. medical, business, engineering, etc. Although, there are not ethical issues involving specifically in Digital Identity, it would be similar to computing ethics.
  • 4. Anonymity  Monitoring  Invading user's privacy  Users consent  Copyright information  Misusing data  Difference between real and Digital Identity  Unable to control our own data
  • 5.
  • 6. Monitoring people does have some significance advantages i.e. public safety, national security, searchable databases, law enforcement and prevent crimes. However, it is still invading on someone’s privacy, violating individual rights, misusing the information, committing an immoral act and also used for cynical reasons i.e. for personal gain, business advantage and committing crimes. It means individual’s privacy is not respected, private, confidential, secure and controlled. Hence, ethical issues arises.
  • 7.
  • 8. Anonymity can be a blessing to protect, secure privacy and freedom of expression. Nevertheless, anonymity also has benefits to cybercriminals; as it is easier to monitor, hack, track and store data of an individual without their permission. One should respect other’s privacy but to what extent should this be taken in account for? How should one know, if a person’s decision to remain anonymous is justifiable? It is not ethically acceptable for a person to hide their true identity, surf the internet possibly to commit crimes or deceive people to gain access to the required information.
  • 9. How our digital avatar varies comparing to our real life can be considered unethical. i.e. using our own photos, information, etc but behaving in certain ways that we would not in real life. It can be measured as deceiving other people and somehow relates to anonymity. while some people may have suitable reason, someone might take advantage of it to mislead other individuals. However, it varies on each individuals opinion.
  • 10.
  • 11. Cookies, web bugs, spyware, internet protocol (IP), loyalty cards and CCTV are being used to monitor, track and store personal information, activities and users behaviour online. The collected data is mainly utilized for market analysis, direct marketing or advertisement. What’s ethical and unethical about monitoring depends on the situation. I.e. hacking criminals account or monitoring criminals can be understandable but invading users privacy for business is not ethical.
  • 12.
  • 13. Using cookies to monitor users is common usually for a person’s convenience. Although, it is now illegal to use cookies without visitors permission, there are still thousands of website who uses cookies without visitors authorization. Not only it is illegal, it is also morally wrong to track people without their permission. Every website should follow the rule as part of legal requirement, which would also be more ethical as users would be aware of cookies procedure in the website.
  • 14.
  • 15. People collect, store and process our data for various purpose, misusing data involves breaching the law “Data Protection Act” and the principles are as follow:  Data should be used fairly and lawfully  Data should be used for limited, specifically stated purposes  Data should be used in a way that is adequate, relevant and not excessive  Data should be accurate  Data should not be kept longer than is absolutely necessary  Data should be handled according to people’s data protection rights  Data should be kept safe and secure  Data should not be transferred outside the UK without adequate protection No one should misuse our data legally and ethically i.e. selling the data without our knowledge, using it for other reasons than specified, etc.
  • 16.
  • 17.  Copyright is about the exclusive legal right given to the authors or creators for their work, “original works of authorship,”. Only the author can: • Reproduce the work in copies or sound recordings. • Make derivative works based upon the original. • Distribute copies or sound recordings of the original to the public by sales, rentals, leasing, lending or licensing. • Perform the original publicly; and that would include the use of digital audio. • Display the original publicly. This is also illegal and not morally right to use copyrighted information without their permission.
  • 18.
  • 19. Once we have posted any information about ourselves i.e. status updates, messages, pictures, videos or any other sensitive data. We do not have control over it i.e. unless these information is kept private, other may access the information easily and use it accordingly. Not only that, we don’t have control over what other publish about us, for various reasons i.e. for safety and security reasons this is not right.
  • 20. http://www.aveksa.com/Portals/176226/images/data-cloud-370x229.jpg  http://hollandlawfirm.com/images/invasion-of-privacy-thumb4332469.jpg  http://mtaram.com/blog/wp-content/uploads/2012/10/anonymous.jpg  http://scm-l3.technorati.com/13/02/16/75069/social-media- monitoring.jpg?t=20130216010535  http://i1-scripts.softpedia-static.com/screenshots/Cookie-Consent_1.png  http://www.lakeside- storage.co.uk/files/Data%20protection%20act%20%201998_%20Secure%20docume nt%20storage_.JPG  http://www.ico.gov.uk/for_organisations/data_protection/the_guide/the_principle s.aspx  http://www.copyrightkids.org/whatcopyframes.htm  http://inventors.about.com/od/copyrights101basicsfaq/f/copyrights.htm  http://2.bp.blogspot.com/_X27b1eNr_Fk/TLxQzcHCjOI/AAAAAAAAAB8/tOJfTI9VT 7E/s1600/copyright.gif

Editor's Notes

  1. http://www.niehs.nih.gov/research/resources/bioethics/whatis/http://www.bbc.co.uk/ethics/introduction/intro_1.shtml
  2. http://ruebentaylorblog.com/wp-content/uploads/2012/09/Ethical-Issues-in-Business-300x291.jpg
  3. http://hollandlawfirm.com/images/invasion-of-privacy-thumb4332469.jpg
  4. http://mtaram.com/blog/wp-content/uploads/2012/10/anonymous.jpg
  5. http://scm-l3.technorati.com/13/02/16/75069/social-media-monitoring.jpg?t=20130216010535
  6. http://i1-scripts.softpedia-static.com/screenshots/Cookie-Consent_1.png
  7. http://www.lakeside-storage.co.uk/files/Data%20protection%20act%20%201998_%20Secure%20document%20storage_.JPG
  8. http://www.ico.gov.uk/for_organisations/data_protection/the_guide/the_principles.aspx
  9. http://www.copyrightkids.org/whatcopyframes.htmhttp://inventors.about.com/od/copyrights101basicsfaq/f/copyrights.htm
  10. http://www.aveksa.com/Portals/176226/images/data-cloud-370x229.jpg