Bda's Role In The Pregnant Shopper Case

Decent Essays
For example, retailer can predict whether a shopper is a pregnant through analyzing her recent shopping records with other personal information. It is even possible for BDA to predict the due dates of the pregnant shopper. Then the following marketing activities for her will tend to recommend a series of maternity products. Other people, especially family members and close colleagues, are likely to learn she was pregnant before she had made this private information public, thereby leading to an embarrassing situation. In this case, the BDA played a role in breaching individual privacy, although the user of BDA didn’t mean to do

Related Documents

  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Question 1 -Legal Issue In this discussion, the legal issue is in regards to privacy rights. Currently, policies allow researchers to input information in a database that all organizations and/or researchers can gain access. Therefore, the privacy of the original donors becomes jeopardized because his/ her permission to release his/her information goes beyond the scope of the permission granted by the donors. By having a database that other researchers have entree to violate the donors’ right of privacy.…

    • 1480 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Why HIPAA Was Created

    • 946 Words
    • 4 Pages

    Every individual in an independent state or democratic practising state has the right to know and be assured that his/her medical reports/records are not going to be released to just anybody. Numerous examples and situations where HIPAA act of 1996 has been violated shows, exactly, what can happen when people’s personal information gets into the hands of a third party in an unauthorized manner. That is exactly one of the reasons medical institutions demands for official letter of recommendation from students who claims to be taking research or projects on a topic that might require that one or two patients’ medical reports be open to them, this is as a result of the fact that no one would love to walk on the street one day and be ridiculed or laughed at because of ailment that was supposed to remain unknown to anyone except the medical professional who diagnosed such patient and the patient. Also, apart from the traumatic effect that it might cause on the individual or the shame of being shamed by the public, organizations who fail to make a patient’s medical records confidential might suffer being sued and lost of public-trust once the issue becomes…

    • 946 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    Post 9/11 Privacy Prior the terrorist events that took place on September 11 (9/11), privacy was of minimal concern to most people. Of course they were concerned about identity theft and credit scores, but that paled in comparison to the fear that was generated by events on 9/11, which opened the gateway for new levels of privacy encroachments and examination that many are not comfortable with in their day-to-day lives. Ultimately, the argument comes down to whether people are for or against privacy loss in the wake of an ever-increasing terror threat. As Solove (2008) describes it in his article many individuals have chosen to accept an infringement on their privacy rights in order to be secure in the threat to terrorist activities.…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The communication privacy theory focuses on privacy boundaries and what information one chooses to withhold from another person. This privacy management system is focused on three parts: privacy ownership, privacy control, and privacy turbulence. Privacy ownership is our private information that only we know and others do not. This also encompasses our personal privacy boundaries. Depending on the person, our privacy boundaries could either be thin and porous, or thick and hard to break through (Griffin p. 151).…

    • 1200 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In this paper the topics about ethics and privacy are going to be the main topics of discussion. Two businesses are going to be used in order to give examples about ethics and privacy. The bank Wells Fargo is going to be used to explained bad ethics and bad privacy. Wells Fargo has failed the code of ethics, and also violated their costumer’s privacy, because they used information that should have been used without the customer’s consent. The company Nike is going to be used to represent good ethics and good privacy, and what they do in order to be the amazing company they are today.…

    • 1272 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Baby Designer Ethics

    • 526 Words
    • 3 Pages

    Choosing to play baby designer and increasing a baby's chances of being born without the luxury of one his/her five senses is cruel and unethical. It's only natural that you want your child to resemble you so that you can compare baby pictures but allowing your child to forgo one of his/her five senses putting limits of their ability to communicate to the outside world is not a choice that anyone should have when designing their children. Communication is essential to any healthy working relationship and essential to day to day living. Giving your child a medical disability as well as a cultural disability isn't the same as choosing their outfit for family photos. Is it right to determine a baby's qualities and impose medical…

    • 526 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    On June 6th, 2013 The Guardian and the Washington Post revealed the fact that the NSA had access to customer information on Apple, Microsoft, and Google computer products. The information obtained by the NSA was allegedly used to prevent any terrorist actions. However, the NSA has “[built] up a store of information on millions of US citizens, regardless of whether or not they are ‘persons of interest’ to the agency” (Brown). Although terrorist plots are a legitimate threat to America, the U.S government has overstepped its boundaries by violating the citizen’s of America’s fourth amendment right to privacy.…

    • 544 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    Social Media Data Analysis

    • 1277 Words
    • 5 Pages

    Having the necessary information is crucial in almost any area, especially for research and development. The purpose of collecting data is primarily for knowledge discovery, then for further consideration. In other words, all websites gather people’s information and base on them to explore their behaviours and trends. From there, they will shape the browsing experience that match each person’s preference in the future. As mentioned above, social media, especially Facebook and Google, track all users’ activities online.…

    • 1277 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Aristotle stated that “privacy is a basic human desire” (Gayton 2006, 378). Information privacy can be basically divided in three aspects: the confidentiality regarding access, storage and destruction of the information; the consent for the use and disclosure of the information provided and; trust that the information will be accessed, stored, used and disclosed within the conditions agreed upon when the information was provided (Cox 2014, 123-124; Gayton 2006, 384-388). The Australian Human Rights Commission Act 1986 together with the Data Protection Laws/Privacy acts in Australia, provides individuals the legal right of privacy and requires organizations to consider the information they need to capture about an individual. This relates to…

    • 281 Words
    • 2 Pages
    Improved Essays
  • Brilliant Essays

    . Reference list Allen, A. 2009. Privacy and medicine [Online]. Available from: http://plato.stanford.edu/entries/privacy-medicine/ [Accessed 04 November 2010].…

    • 1344 Words
    • 6 Pages
    Brilliant Essays
  • Improved Essays

    In an attempt to inform and persuade the audience ethically, they successfully use a well-balanced proportion of pathos, ethos, and logos. While the appeal to pathos is the least evident, the presentation as a whole forces the audience to bring questions to unethical problems allowing for an appeal to fear. When explaining how researches must reiterate on the prominence of responsibility in using Big Data, they explain that “academic researchers are held to specific professional standards when working with human participants in order to protect their rights and well-being” (759). However, they go on to explain how researches fail to understand this purpose. This creates apprehension when researching topics, issues, and current events happening within the world of Big Data.…

    • 846 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    “If the police officer who shot and killed Michael Brown had been wearing a camera, the nation might already know who’s telling the truth about what happened that tragic day in Ferguson” ( “When Cops Wear Cameras” A.6 ). These are cases where technology should be regulated because it ensures people 's safety, and their justice. Research shows that technology is not being regulated. Since it hasn’t been regulated, people have lost their lives during tragic events. Therefore technology should be regulated to ensure our nation 's safety and privacy.…

    • 1264 Words
    • 6 Pages
    Superior Essays