I recommend against funding the proposal to develop and make publicly available the "DDHG-DisHarmony" web database system based on the model of the LPA's "Deadbeats Database" without addressing some minor technical and serious ethical concerns. While the suggested model is technically adequate to achieve its purposes, due to the nature of the information to be presented, I find it to be insufficient in its implementation. Ethically, there is the potential for grave violations of privacy and confidentiality that should be considered. Additionally, the atmosphere of the site can very easily degenerate into antagonism and negativity without proper moderation. I will detail each of these issues and offer suggestions for their mitigation.
From my limited access review of the "Deadbeat Database" example, I agree with the simple form layout of the site. Technically, this is more than adequate to capture and display the desired information about each individual. My concerns arise from the implementation of granting access to the database. There is no evident verification that a paying subscriber is indeed a landlord. Indeed it seems that anyone willing to pay the requisite site subscription fee can access the information contained therein. In the proposed "DisHarmony" site, I would recommend some form of verification of the user's actual "eHarmony" membership, if such could be attained. I foresee that potential users of the "DisHarmony" site would desire such an assurance against potential abuse and misuse. I would also recommend against making the information publicly available, as this can be a violation of an individual's privacy and disclosure of confidential data.
While the exact information to be presented on the "DisHarmony" si...
... middle of paper ...
...commend having the posts on the "DisHarmony" site be read and approved by site moderators before becoming available to the rest of the users of the site. Objectivity can also be maintained by carefully selecting the responses available to the user, and by eliminating an unrestricted "comments" section.
There are a variety of means that could be employed to help ensure the success of the "DisHarmony" proposal and address any technical, ethical and social concerns. These include implementing the design of the site in a professional and secure manner, marketing the site selectively and in a positive light, ensuring the safety and health of members by maintaining privacy and confidential information, and providing an objective and moderated source of information so that each user can make an unbiased decision as to their future interaction with other "eHarmony" members.
The way someone manages a difference can make conflict turn into a sphere of harm or a sphere of value. The sphere of harm is when differences are managed in destructive and damaging ways. Littlejohn states (2014) states, “Conflicts are managed so badly that damage is done to people, relationships, and, indeed, entire social worlds” (p. 188). If a party were to react to an indifference by using physical or verbal violence the conflict would move into the sphere of harm. On the other hand, the sphere of value is when differences are significant, but not controversial. Instead, parties value the difference, appreciate it and view it as a positive asset. The goal of conflict is to move from the sphere of harm to the sphere of
Health records seem to be the one thing people don’t want others to know about. Nobody wants their friends or coworkers to know what kind of health issues they have. These issues are personal. In the editorial in The New York Times, “Give up Your Data to Cure Disease”, David B. Agus, a physician and Professor of Medicine, describes how health problems can be solved with the help of mass data from patients. He conveys his message that the public should allow doctors to use their medical data so they can find cures for diseases through a variety of rhetorical devices.
Throughout the period of Antebellum there were many compromises made regarding slavery: The ⅗ compromise in 1787, the Missouri Compromise in 1820, the Tariff of 1833, and finally the compromise. With so many agreements made between the North and the South, why was america not able to make a compromise in 1861 when the secession crisis was happening? What happened between 1787 to 1861 causing the United States to change from a country of compromising opponents to a country of fighting enemies? The answer answer is not so simple.There are a myriad of factors which resulted in the ultimate failure of compromise, but the most important ones are as follows: The imbalance of power between the North and South made it incapable for the two sides to make a compromise that would be in the southerners own self interest, disillusionment with the nature of compromisation made neither the North nor the South want to work it out, and finally the growing divide between the two regions, along with clashing political beliefs caused an animosity between them that could not be reconciled by mere compromise.
Jeffrey Rosen from The New York Times says “ How best to live our lives in a world where the internet records everything and forgets nothing”(Rosen). A Young woman was so close to graduating for her teaching degree, but when her professor looked back on her old myspace and found a picture of her drinking at a party a few years back, he had told her since she was in fact promoting alcohol and partying she would not be graduating. Larry also states “ And because the data is digital it can be forwarded, archived and searched pretty much forever”(Magid). We all get caught up in the moment, thinking about what's happening now over what could make our future. If everyone thought more carefully about the things they post online they could have more chances and opportunities up the road. So don't let a fight being posted online determine your
Tyler, R. T. (2002). Is the Internet Changing Social Life? Journal of Social Issues, 58 (1), 195-205.
The student chose to evaluate the content of CDC.gov for credibility. The literature identifies five criteria that users should employ in their assessments of the credibility of Internet-based information: accuracy, authority, objectivity, currency, and coverage (Metzger, 2010). For the purpose of this assignment, the approach to provide analysis of this Web-based source will be to use these five criteria: authority, information, objectivity, ease of navigation and privacy and security policies.
Being involved socially online can open many doors to hackers and scammers. Posting too much information online can be a way for scammers to steal information.
When joining a social networking site people create a profile, which displays their age, college, hometown, sexual preference, interests, and relationship status; and based on this information the network provides them with suggestions for connections to individuals already on the site. It seems harmless at first; “how does it matter if my friends see where I work or what my interests are, they probably already...
The first aspect being addressed is the problem with social network sites exposing information. Social networking has created an environment where it is nearly a duty to expose oneself. Profiles on these social websites are updated everyday with personal information such as locations, status, and future plans. Anyone can search another’s name and find information about their history, pictures, and activity. With the help of social networking sites...
Now that we are living in an ever changing world, technology is viewed as the most resourceful tool in keeping up with the pace. Without the use of technology, communication would be limited to using mail for delivery and encyclopedias for research. Although technology has improved the way we communicate and find information for research, the information is not always valid. Unfortunately, for those of us who use the internet for shopping, research, or reading articles of personal interest the information is not treated the same as a your magazine or book. While such literature is reviewed by an editorial staff, internet literature or information can be published by anyone. In order to reap the full benefit of having the use of technology for any purpose, there are five basic criteria’s one must keep in mind as an evaluating tool for deciding whether or not the particular website is a reliable source for information.
... to remember that the Internet is a public place, and you should never assume that something is secure. Leaders should be the moral compass for groups, but... Technology has blurred some distinctions between what's right and wrong. Many institutions have been caught in the discourse about websites such as Napster. Some people seem to want to have two sets of rules, one for the cold reality of the analog world and another for the magical digital world. It may take many years to establish equilibrium. In the meantime, be clear and consistent about expectations, after you've given full consideration to the implications. Choose your battles, but be prepared to say "let's wait and see". Leaders appreciate differences, but technology threatens to marginalize others. As for any program goal, a leader should always ask "who gets excluded by this approach?" There is a misperception among many leaders that technology is naturally bias-free: The research suggests otherwise. Furthermore, individuals from some backgrounds do not "buy into" or choose to participate in the emerging technology culture, as should be their choice. Be careful when a technological solution becomes the only solution.
of multiple types of end users. The data is stored in one location so that they
“Many fear that social networking sites make users vulnerable to identity theft, threaten privacy, and even expose young people to online predators” (Lüsted 9). On many social networking sites, people post information that is not appropriate for the online world. When one is sharing things online, there is always a possibility that it is being shared with people one may not know or trust. For instance, sharing personal information about one 's life, embarrassing photos, and things that could ruin one’s reputation should be kept private as they can all result in dire consequences. One should note that once something is posted, it can not be taken back. By managing information that is posted or keeping personal information private, one can greatly decrease the risks of any of the mentioned hidden dangers from happening. (Social Networking Security and Safety Tips) “limiting the search of a profile could decrease the chances of encountering a hidden danger.” When arranging meetings in person with online acquaintances, caution should be taken as
The best attitude to take in order to enjoy the benefits of social networking, while minimizing the inherent risks, is to remain SKEPTICAL and CAUTIOUS.
...select case, not the majority. Perhaps even more worrying is that mass rejection still can, and does, occur on the Internet. However, it is also remarkably easier to find an accepting community online. This community nurtures positive growth and that growth can be carried over to real life. Therefore, the potential for positive consequences through anonymity on the Internet exists, and the account of Ruth Hall is a prime example that parallels with thousands of people’s experiences every day in present times. Even though Ruth uses a different form of media, the affect is similar to the student. The question then, becomes not how to eradicate anonymity, but how to lessen the negative consequences and nurture the positive ones.