(2) The dispersive theory (on the Internet)
most of secret of privacy is leaked out by cyber-space
(3) The anonymity
personally identifiable information of that person is not know
the freedom
of expression
the cause ofinvasion of
privacy
(1)The solutions of investigative reporting
- The reinforced citizen's role for keeper
The reason of out o
* Privacy
The original mean : personal life
The general mean : rights of men
that someone can lead a free life without interruption.
* invasion of privacy
- Some kinds of information are abused or disclosed to other people by someone.
The invasion of privacy : problems
* In Cyber-space
- it could be easy to infringe on someone's rights , to spread information rapidly and to
2. Invasion of privacy
We are facing the moment that the decision has to be made about the case of Seo and Lee. As students studying journalism, we have been learning what news should be or have to be. Unfortunately, some media have been invading their private life(Seo&Lee's). But, in some points, it seems they(the media) just do what people want if 'Right to know' is thought as a priority. As
We are facing the moment that we have to make a decision about Seo and Lee’s case.
According to the land -mark decision,
If the plaintiff (See & Lee) doesn’t sue the defendant
( Media & puplic), even though they have been damaged their social value, the defamation law doesn’t work.
Moreover, It cannot be concluded as an Invasion of Privacy here on account of that they are de
Regulation of IT Risk
In order to regulate the IT risk, governments work to address threat to computer crime. For example, representatives of 29 countries - including Canada, Japan and the U.S. – signed the Council of Europe Cybercrime convention in 2001. The convention deals with substantive and procedural cybercrime law. The substantive defines the following activities as crimina
CASE Ⅰ.
◆ Is there anything unethical about electronic monitoring?
1. Case 사례에 대하여
그렇다. 전자모니터링 기술은 분명 비윤리적이다. 기본적으로 프라이버시를 침해하기 때문이다.
회사는 크게 두 가지 형태로 종업원들을 모니터링 하였다. 하나씩 그 형태에 따른 문제점을 설명하도록 하
Korean Security Protection Law is getting better -certain laws are getting revised,
Those that are applied in 2012 are as follows
1. Prohibit managers from using users’ private information
expiration time of personal information
2. Activate personal information protection law
Encryption of personal information
OECD Privacy Protection
ISTPA’s identity protection frame
IPC’s 10 f
to a host of technologies that are used to help machines identify objects.
Strenth
Recognition at one go
Recognition regardless
of direction
Fewer damage compared with barcode
storage a lot of information
Data-Rewrite possible
reproduction impossible
minimize stuff
Weakness
Expensive compared with barcode
Come out
Installation cost
Invasion of privacy
domino will have different organizational structure
- Methods for conducting case analysis
Interview
Searching information (internet, book, etc..)
Having a discussion
Facebook marketing
Through this service, they started to promote their brand and implement some event
invasion of privacy
&
No idea how to use Facebook unlike other social media