Ethical Dilemmas In The Automotive Industry

Great Essays
Introduction (Group)

Data mining is discovering the methods and patterns in large databases to guide decisions about future activities and the use of automated data analysis techniques to uncover previously undetected relationships among data items (Witten & Frank, 2005). Many suggest that the intentional acquisition of the data is an invasion of privacy. Data mining and collection, like many technologies, is a constantly evolving practice, as are the laws and regulations that govern it. Currently, there is vague and sometimes non-existent disclosure about what happens to data once it is collected such as how it is used and how (and to whom) it is distributed. Data collected from car computers, GPS information, browsing history and web activity - among others - are increasingly being used to build customer profiles and analyze data for predictive analysis, business decision-making, increasing market intelligence, and of course the growing industry of marketing and advertising. However, as the trend of collecting data grows, research suggests that the accuracy and integrity of the data may be questionable, raising concerns about whether the perceived benefits of the practice outweigh the privacy concerns.
…show more content…
There are many privacy concerns that are being addressed as cars become more sophisticated to include features such as in-dash navigation and even wireless routers embedded to provide a mobile wireless hotspot. Manufacturers are increasingly collecting data in the name of "improving the customer experience", and insurance companies are offering usage-based insurance that offers discounts for allowing a device to monitor daily driving habits. As technology and the collection of data become larger influences in business decision-making, where is the appropriate balance between improving the customer experience and protecting customer

Related Documents

  • Improved Essays

    Information privacy is the major issue in the current generation. People are more concerned about their convenience along with security. For example if the car breaks downs, one can push a button and the On-star operator will provide help by tracking the location of the car. This situation explains how conveniently one get the service immediately. On the other hand, we are not sure who is tracking our car location and is there any harm caused by that person.…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    In Rebecca Solnit’s article, “Easy Chair” I realized that we do not have privacy at all if we use the technology and take care of our things online on the Internet. The article Poison Apple made me realize that we do not have privacy at all if we use technology. For example, Rebecca Solnit mentioned, “Google is the world’s biggest advertising company, watching you on nearly every website you visit’’ (Solnit 5). This passage demonstrates how technology has been part of everyday human's life. Google knows everything about everyone’s interests and it can share this information with its partnerships and use it for their benefits.…

    • 166 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    These services look into our habits and actions to attempt to assemble a profile about their users. Primarily, this information is provided to advertising firms to learn best how to increase consumerism and ensure that the populace purchases products. Furthermore, it has influenced the populace to follow their conditioning by always presenting them with the concern that they are being watched. This is especially accurate following the revelations by whistleblowers, such as Edward Snowden, which have been able to prove that national agencies often partner with these services through sharing of information to track citizens.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Massive amounts of data being collected are causing extremely high risks of identity theft. When…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    NSA’s Mass Surveillance. Is it worth it? NSA’s Mass Surveillance. Is it worth it?. - 1 Annotated Bibliography Barnhizer, D. (2013)…

    • 3666 Words
    • 15 Pages
    Improved Essays
  • Improved Essays

    Tracking One's Privacy

    • 985 Words
    • 4 Pages

    For the collection of data, products are tracked from the beginning to the end. For example, in the article, "Where Will Consumers Find Privacy Protection from RFIDs? A Case for Federal Legislation", it stated that "between the birth and death of a customer's Coke can, the RFID tags would tell the Coca-Cola Company where and when the Coke was purchased". One may believe that this is an invasion of one's privacy because they are being tracked with the Coke. The opposition, however, is weak because although this is an invasion of one's privacy, the companies are not doing it so that they can track down what the people are doing, but they do this so that they can receive data about their own product and there is no problem in that.…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Social Media Data Analysis

    • 1277 Words
    • 5 Pages

    Having the necessary information is crucial in almost any area, especially for research and development. The purpose of collecting data is primarily for knowledge discovery, then for further consideration. In other words, all websites gather people’s information and base on them to explore their behaviours and trends. From there, they will shape the browsing experience that match each person’s preference in the future. As mentioned above, social media, especially Facebook and Google, track all users’ activities online.…

    • 1277 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    With the continuing development of the Internet, the center stage of individual, business, and government discussions became a new globally sought after resource, data. Since its origin, Internet users have been warned about the dangers of posting personal, intimate information publicly; however, recent events have shifted privacy discussions away from discouraging posting ill-advised information to bringing awareness to under the radar data collection. Data is a very broad term that encompasses almost all Internet activity. What users search, click, view, and type is all collected and processed by either the website, Internet browser, or even the device itself. The demand for this personal data is enormous.…

    • 1224 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    1. My main dilemma is whether or not to take the Judge’s suggestion and pose as Alex’s father. 2. It is unethical and against the law for me to pose as Alex’s parent for the express purpose of obtaining medical records that both myself and the judge have no legal right to possess. Even if I were to act upon the judge’s suggestion and find out that Alex had HIV, the evidence could not be used in court against the mother due to the manner in which it was obtained.…

    • 754 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Ethical Drivers Analysis

    • 760 Words
    • 4 Pages

    Ethical Drivers JaQuita J. Jackson Ohio Christian University Ethical Drivers Moral drivers are elements that assume an especially huge part in advancing or driving methodical moral change. Without them, any change exertion is liable to come up short. These drivers incorporate moral analysis, connected with initiative, focused on socialization forms, morals preparing and constant moral change. Engaged Leadership Leadership is the capacity to impact individuals to accomplish foreordained objectives.…

    • 760 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    There’s A Reason Why Mama Wouldn’t Let You Take a Cookie from the Jar: A Rhetorical Analysis of “Six Provocations for Big Data” In their essay “Six Provocations for Big Data”, danah boyd and Kate Crawford argue if the use of Big Data is ethical based upon the fact that is easily accessible to all, especially in today’s society. boyd, a researcher “and [the] founder of Data & Society Research Institute”, and Kate Crawford, also a researcher and professor, attempt to reach an uninformed, nonbiased audience (754). Through their writings, they bring to light the definition of Big Data, where it comes from, how it is used, and how it will affect the future of technology and privacy. Respectively, boyd and Crawford’s effort to persuade the audience…

    • 846 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Based on the case of Ford Pinto, Ford Motor Company is totally major in designing their own style of products but the safety standards was not taken seriously. This is because, the Ford Pinto already has made their own strategy in managing the finances to produce a product. Therefore, due to its style or design, and cost constraints of products, using a suitable and safe fuel tank that prevent the fire in a rear crash, was undesirable. Referring to the cost benefit approach in utilitarian principle, there are three steps of analysis that involved. First, assess each available option.…

    • 1009 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Mapping, and Sharing the Consumer Genome What if there was a way to know everything possible about a total stranger one never met before. Are people privacy now at risk, who can be trusted, or even more important, is this true. In the article “Mapping, and Sharing the Consumer Genome”, author Natasha Singer answers the questions and tells who and why someone would want to know so much about people in a few negative and strong tones. Author Singer’s meaningful purpose to make people aware was very informative in her article.…

    • 786 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Data Privacy Essay

    • 816 Words
    • 4 Pages

    This quote will be helpful in providing a supportive example on how one can protect themselves from the coercive nature of data mining. It suggests a process that will serve as a check on the government if it oversteps its boundaries on individual liberties, which adds information to my research and determining what can be done to keep individuals’ privacy rights…

    • 816 Words
    • 4 Pages
    Improved Essays

Related Topics