Privacy and Security on the Internet
Final Project, Part 3: Policy Paper Building on the research you conducted for the annotated bibliography (Final Project Part 2), write a paper of 1000 to 1200 words discussing the ethical issues related to your selected technology that are occurring now or will likely occur in the future. Make sure to include relevant findings from the scholarly sources you used in Part 2 and any other sources you wish to use. You must use at least four relevant sources to support your paper. Consider how the legal issues (freedom of expression, copyright, right to privacy, etc.) we have been discussing relate to your selected technology. Using one or more of the ethical frameworks (utilitarianism, deontology, virtue ethics, social justice and social contract theory), propose a policy for addressing the ethical issues related to the new or emerging technology. Cite your sources using either MLA or APA format. “Privacy and Security Online: Best Practices for Cybersecurity.” Library Technology Reports, vol. 54, no. 3, Apr. 2018, pp. 1–37. EBSCOhost, search.ebscohost.com/login.aspx?direct=true&db=aph&AN=128707555&site=ehost-live. Hennig, Nicole. “Chapter 1: Assessing Your Security and Privacy Needs.” Library Technology Reports, vol. 54, no. 3, Apr. 2018, pp. 5–7. EBSCOhost, search.ebscohost.com/login.aspx?direct=true&db=aph&AN=128707556&site=ehost-live. These articles discuss how to deal with Internet security breach or invasion of privacy. It is said that when it comes to the security of one’s personal and professional data, there are several things he/she can do to reduce the risk of breach. One can create an individualized security plan for the different types of data by understanding the risks. Hahn, Jim. “Chapter 4: Security and Privacy for Location Services and the Internet of Things.” Library Technology Reports, vol. 53, no. 1, Jan. 2017, pp. 23–28. EBSCOhost, search.ebscohost.com/login.aspx?direct=true&db=aph&AN=129347998&site=ehost-live. This article discusses the importance of security and privacy in the use of location services and the Internet of Things. Topics include privacy considerations related to librarianship, hardware security in libraries, and the relation of security and privacy to location services in libraries. Poudel, Swaroop. “Internet of Things: Underlying Technologies, Interoperability, and Threats to Privacy and Security.” Berkeley Technology Law Journal, vol. 31, Jan. 2016, pp. 997–1021. EBSCOhost, doi:10.15779/Z38PK26.
Leave a Reply
Want to join the discussion?Feel free to contribute!