Sei sulla pagina 1di 4

WORKSHOP UNIT 1 – THE ETHICAL USE OF INFORMATION (25%) INDIVIDUAL

Student name: Leidy Tatiana Alzate Pérez


Id: 1035877981

INSTRUCTIONS:

Each of the next reflection/analytical questions should be answered accordingly.


Make sure to read them all before beginning to answer. Each response must have an
extension of 200 words max and you may include embedded links if necessary. Send
out your responses by Sept 7th before class (6pm) to the email
majimenez@udem.edu.co .

1. Is Big Data and Data Points Analysis a modern version of the "Big Brother"? give an
example and explain how it became a version of this type of structure (support your
answer using the documentary The Great Hack and give an example)
2. How can users survive the social anxiety of being interconnected, to protect their
personal safety online? (Respond according to the assigned reading)
3. What kind of actions from corporations are being hold accountable when it comes to
protecting user data on the network within the logic of Big Data? (Use the assigned
reading to respond).
4. How should the status of human rights be given to information and privacy
protection? how does this affect corporations? (Use the assigned reading to respond
and the documentary The Great Hack to respond).
5. …” Digital information is far different from its paper counterpart and thus ultimately
will require a completely different set of rules”. Layout a list of ideas or arguments in
which you suggest how businesses should deal with this new set of rules when in their
information technologies. (Respond connecting the assigned reading with the
documentary The Great Hack).
ANSWERS:

1. For me, Big Data and Data Points Analysis is a modern version of the "Big Brother"
because this structure has become a tool that not only provides, stores, and reuses
information. It has also become an omnipresent platform that is constantly monitoring
and controlling us through the trust and respect it instills in users.
For example, social networks have had one of the greatest impacts in this regard. Users
accept their terms and conditions without even reading them before, and these
platforms are responsible for providing information about our tastes, emotions, and
actions to third parties to manipulate us, persuade us and control ourselves through
algorithms.

2. Users must be aware of the policies of the companies to which they are linking, which
must guarantee respect for their rights and the security of protecting the personal
information provided. According to the reading, “governments and corporations both
must provide a remedy when human rights abuses do occur”, there must be regulations
or policies that guarantee respect for these rights and in this way, users will feel more
confident when giving their personal information in this interconnected world. For
example, the implementation of The Guiding Principles which are acknowledged as
recommendations to operationalize the protect-respectremedy framework y is focus on
ensuring states enforce their own domestic human rights laws against corporate actors.

3. In the reading is mentioned that if a platform provides information to carry out a


criminal act, it is also responsible for that act. According to this, some examples that the
reading exposes to understand this are: a tweet, whose message stated, “you deserve a
seizure” was sent to a known epileptic with the intent of inducing a seizure in the
recipient, who was a journalist with opposing political views, or when Cisco was
complicit in human rights violations for developing an electronic monitoring system
used by the Chinese government to identify, persecute, and torture members of the
minority Falun Gong religious sect. And many other cases where information is Users'
personal information is supplied to achieve degrading corporate or political objectives.

4. Companies should be concerned with the design of policies that transform their
information process. They should adopt the Guiding Principles in order to transform the
corporate culture around big data by serving as a self-imposed normative and ethical
framework. Also, it can serve as a reference point in corporate decision making with
respect to the generation, analysis, and use of data and the yielding of databased rights
by data subjects. In this sense, they can guarantee control and respect for the
information that users provide and thus prevent it from being used for illegal acts.
Besides, they could have a very positive impact on the confidence of users when using
their platforms.

5. I consider that some of the rules that must be implemented are:


-Companies must respect the information provided by users and not use them in order
to persuade them to guarantee their own profits, act always under ethical principles.
-The non-manipulation of users based on corporate or governmental ideals must be
guaranteed.
-The flow of information must be evaluated and each one of the objectives for which it
is being used must be known.
-The policy and privacy terms must be clearly disclosed, creating a system where it is
recognized that the user has read them clearly and has no facility to omit it.
-Companies must provide a remedy for human rights violations that occur.

Potrebbero piacerti anche