Question

In: Finance

Explain briefly the 4 main threats to information privacy. What are cookies and what should individuals...

Explain briefly the 4 main threats to information privacy. What are cookies and what should individuals do about them. Describe the PLUS approach to ethical decision making.

Solutions

Expert Solution

The four main threats to information privacy:

1) Theft of personal information through websites by leakage of information from database.

2) Use of cookies to track online behaviour.

3) Keyboard tracker virus or software which can be installed on the computer and can steal keystrokes to make meaningful information.

4) Another threat is that webcam or computer microphone could be hacked to track personal activity.

Cookies are elements which are used by websites to store certain things in the browser that can track user activity. Individuals should not store cookies of all websites as that can compromise security of the user. They should verify the authenticity and nature of cookies before allowing them to get stored in the computer.

The PLUS approach tells us that all decisions should be filtered on the parameters of Policies, Legal, Universal and Self.

So a decision should satisfy the organizational policy, be legal and should be aligned with universally accepted rules. Also it should be accepted to the self as being a righteous decision


Related Solutions

What is Privacy? Is there any Privacy for an individual? What issues can occur to an individual if there is lack of Privacy in the information age? Explain.
What is Privacy? Is there any Privacy for an individual? What issues can occur to an individual if there is lack of Privacy in the information age? Explain.
Briefly explain the 4 main purposes for nation's balance of payments
Briefly explain the 4 main purposes for nation's balance of payments
What are the main tasks of the financial manager (CFO)? Explain briefly.
What are the main tasks of the financial manager (CFO)? Explain briefly.
List and briefly explain the 4 main elements we use in Marketing to carry out a...
List and briefly explain the 4 main elements we use in Marketing to carry out a Market Segmentation
What are the 3 main purposes of a Business Plan? Briefly explain each.
What are the 3 main purposes of a Business Plan? Briefly explain each.
Briefly explain:        (a) What are the main shortcomings of the forward contracts?         (b) How...
Briefly explain:        (a) What are the main shortcomings of the forward contracts?         (b) How are futures contracts designed to overcome these shortcomings?
List and briefly explain the main types of unemployment..
List and briefly explain the main types of unemployment..
4. Data Privacy and Security Things to know: What legal requirements apply to protected health information?...
4. Data Privacy and Security Things to know: What legal requirements apply to protected health information? What methods and technologies are used to protect data? Find one example from the news where the privacy and security of protected health information was violated. Be ready to discuss this incident in your answer.
Explain how the Keynesian sticky wage model is built. What are the main relationships? Explain briefly...
Explain how the Keynesian sticky wage model is built. What are the main relationships? Explain briefly what each curve depicts.
4. Bank regulators impose minimum capital adequacy standards on commercial banks. (a) Briefly explain the main...
4. Bank regulators impose minimum capital adequacy standards on commercial banks. (a) Briefly explain the main functions of capital. (b) Identify and define the different types of acceptable capital under the Basel II.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT