Upload
laura-ileana-stoilescu
View
214
Download
0
Embed Size (px)
Citation preview
8/3/2019 Ethical Analysis of a Travel-tracking Application
1/14
UNIVERSITY OF TWENTE, DEPARTMENT OF ELECTRICAL ENGINEERING, MATHEMATICS AND
COMPUTER SCIENCE
ETHICALANALYSISOFATRAVEL-TRACKINGAPPLICATION
A COMPUTERETHICSPROJECT-201019161280
LAURA ILEANA STOILESCU( S1070053),MIRCEA STOICA (S1033158)
10/12/2011
8/3/2019 Ethical Analysis of a Travel-tracking Application
2/14
TABLE OF CONTENTSAbstract ......................................................................................................................................................... 3
1. Introduction .......................................................................................................................................... 3
1.1. Motivation ......................................................................................................................................... 4
2. Our product Travel-tracking application ............................................................................................ 4
2.1 Data collected ................................................................................................................................... 5
2.2 The reward system ............................................................................................................................ 5
3. Ethical analysis of the system ............................................................................................................... 5
3.1. A perfectly plausible scenario ........................................................................................................... 6
3.2. Violated rules of the ethic code (ACM) ............................................................................................. 6
3.3. Identity theft ..................................................................................................................................... 8
3.4. Privacy ............................................................................................................................................. 10
3.5. Privacy frauds .................................................................................................................................. 11
Datagathering, exchanging, mining, merging, matching .......................................................................... 11
3.6. Embedded values- BIAS .................................................................................................................. 12
4. Technical measures ............................................................................................................................. 12
5. Conclusion ........................................................................................................................................... 13
6. Bibliography ........................................................................................................................................ 14
8/3/2019 Ethical Analysis of a Travel-tracking Application
3/14
ABSTRACTIn this essay are described some of the ethical problems raised with the use of a mobile phone
application that tracks a tourists accommodation at a hotel and keeps a profile for all travels made
in a certain hotel or hotel chain. Our analysis has the purpose of setting a solid design and a clear
set of usage rules for this application so that the ethical conflicts are minimal. We explore eachproblem on the basis of two major ethical theories that attempt to specify and justify moral rules
and principles: I. Kants Deontological ethics and Consequentialism, or Utilitarianism as a more
particular form based by J. Bentham and J. S. Mill. The analysis brings into attention a series of
ethical aspects that can label the application as ineffective considering the user sensitive about his
privacy and data protection.
1.INTRODUCTIONTechnology, from its most rudimentary to its actual form, has the sole purpose of making, using and
understanding tools in order to solve a problem or serve some purpose. Along with thetechnological development, on the evolutions road from the stick and stone to the orbital satellites,
the ethical issues raised have increasingly greater impact for the user, sometimes doubting even the
global utility of a certain product. In this background, information has became more than just an
abstract concept, but a value that needs to be protected and preserved, also referred to as the
intellectual capital from which human beings craft their lives and secure their dignity in (Mason,
1986).
The need for applying the computer ethics in the technological domain, at this level is that
technology in itself, either referring to a computer, a mobile phone, or a piece of software, has a
neutral intrinsic value. The responsibility of using technology therefore lies in the user himself
(Guns dont kill people, people kill people with guns). On a more informal but still true note, the webwisdom pops out another version of this quote: Guns dont kill people, people do and monkeys do
too, if they have a gun(E. Izzard) which balances the responsibility between the user and the tool,
how neutral is the technology actually? Of course, the decision of doing an immoral, wrong,
unethical act lies with the user but the fact that without the proper tool, the act could be avoided is
also true.
Collecting, storing, processing and distributing information in this informational era proves to have
unique challenges while having great advantages over the previous methods. We are mainly
referring to assuring privacy and confidentiality, assuring the data and the system are modified
with proper authorization only, assuring unimpaired service, ensuring data consistency and
controlling access to resources(Martin).When centralization can be identified with control, finding
your way, with being tracked down, a help turns out to be an abuse, some boundaries must be set.
From another point of view, we cannot expect absolute privacy in an environment with all
information at reach based only on the correct ethical behavior of the other users therefore there
isnt always a clear line from which we can conclude the existence of an abuse. Users expect
8/3/2019 Ethical Analysis of a Travel-tracking Application
4/14
freedom from intrusion and surveillance while dealing with computers and giving up personal
information that may make them traceable.
In the following sections, we describe a travel tracking system which refers only to the
accommodation aspect of the journey and the activities performed in its environment. The system
is described in section 2 and analyzed in the following chapters from an ethical perspective,discussing the situations that can lead to misusage of the data collected and the impact on the
customer and hotel respectively.
1.1. MOTIVATIONWe consider that one of the purposes of mobile phone applications is to assure a multi-tasking
attribute to any smart-phone. Our application combines the already- present functions with a
custom made micro-travel agency that will be able to book the perfect room for each occasion. At
each booking, the hotels personnel checks the profiles historic, makes all the necessary
arrangements and is able to suggest other similar products and services.
So why not being able to book a hotel room and know you will find there all the small but effective
details that make your stay a pleasant one through a simple icon touch? Perhaps having a
permanent log of your spending during a stay at the hotel will even help you be wiser with your
own finances. Of course, there are advantages of using this application but so are risks. Is it worth to
jeopardize your privacy for sparing a few minutes of extra effort through the conventional method?
The answers differ, of course, for each customer and background.
2.OUR PRODUCT TRAVEL-TRACKING APPLICATIONThe application we have considered is not built-in but available to all contract-based mobile phone
users. The contract is a condition and a mean to verify the data fed at registration since the
application purposes is to record and edit the users activities and preferences during his stay at a
hotel. This will require extra security for logging on the application as discussed in section 3.4.
Several profiles can be kept at once, each one being associated to a travelling mode. Each profile
will be represented by a quick response code chosen from a pre-set list of codes available at the
hotel and will mark a certain combination of factors such as: room type, TV grid, mini bar selection,
restaurant preferences, etc.
8/3/2019 Ethical Analysis of a Travel-tracking Application
5/14
The code will be also marked on the electronic key card which will be scanned to grant access to the
hotels facilities and to update the profiles state. While the key is placed in the room key slot,
several sensors will monitor the usage of the mini bar, TV, phone, Internet and the data will be
automatically sent to the monitoring application. If the key slot is empty, the functioning of all
equipment will be interrupted.
For other facilities such as automatic vendor machines, hotels spa, gym or any facility that is not
free and belongs to the hotel or to the associated companies, the key will again act as a switch
granting access and monitoring their usage. The costs associated with each recording in the keys
log add up to form the total bill and keep track of all activities. The bill can either be paid at the end
of the stay or it can be sent to the billing address of the telephone contract owner. If this is the case,
editing a profile will be possible only after the payment is registered.
Based on the current choices, the application might suggest similar products or activities which are
available in the hotel and the associated companies. This presumes a previous indexing and
correlation of all the available products and stocking them in a database available online.
2.1 DATA COLLECTEDThe system gets some of its data from the mobile phone contract and the rest is provided by the
customer at each room booking consisting in the details of each stay. As we intuit, the data stored is
generally sensitive data such as:
- name, phone number, address, credit card account;- name, phone number, address of next-of-kin;- usage of mini bar, room service, laundry service, TV-channels watched, Internet traffic,phone calls from the hotel room, presence in the hotel room;- usage of services from taxi companies, bars, clubs, spa, gym and other facilities associatedwith the hotel;
- a complete log will be used to monitor the customers behavior in order to be awarded ornot with a certain type of membership card and to create the detailed bill at the end of the stay
2.2 THE REWARD SYSTEMBased on the amount of money spent, the number of check-ins and the number of rooms booked at
once, each customer can be awarded the platinum, golden, or silver membership card which grants
free accommodation at the hotel for a limited period, access to the hotels facilities or pricereductions for staying at the hotel according to each type of membership. For being able to accord
the memberships correctly, each clients log is being kept for a period of two years, after which the
data is no longer valid. Therefore, the benefits of any type of account can be used within those two
years.
3.ETHICAL ANALYSIS OF THE SYSTEM
8/3/2019 Ethical Analysis of a Travel-tracking Application
6/14
Although at a first glance the application seems to be somewhat harmless, the problems that can
arise are, at least, diverse. From identity theft and privacy loss to robbery, the simple possibility of
these issues can make the application unsafe and unappealing.
Just as any virtual account, provided an unauthorized person gets in possession of the phone, the
data already stored can be modified or , worst case scenario, the account can be used to bookseveral rooms for which the phone owner will pay. Also, the data will not only be available to the
user but also to the hotel personnel which, for a public person, will not be acceptable. We will
discuss also the threats over privacy in section 3.4, over data in section 3.5 and Error! Reference
ource not found. and find the technical solutions for them, if possible.
3.1. A PERFECTLY PLAUSIBLE SCENARIOWe are considering the case when the phone on which our application is running is lost. Since Mr.
Smith, the user, didnt expect to lose his phone, he also didnt log out of the application so the finder
will not have any difficulties in browsing through the data already stored. Therefore, there will beno obstacle if he decides to book a room on Mr. Smiths account, in a hotel he otherwise couldnt
afford and send the bill to the misfortunate Mr. Smith who will pay the bill.
We wont get into detail referring Mr. Smiths social status who might simply be an app-enthusiastic
student who now has to pay for the bill of his lifetime, or he might be a retired CEO whose funds are
barely scratched. The financial aspect of the consequences is not the goal of this essay but can be
used, if willing, to find mitigating circumstances for each situation and to extend the debate on the
acts moral character.
In the next subchapters we will discuss (we hope) all problems that can rise from this scenario and
we will also deviate from the plot to cover other possible application bugs.
3.2. VIOLATED RULES OF THE ETHIC CODE (ACM)It is not our job, as system developers, to prevent the phone from being lost but it is our job to make
it as robust as possible against unauthorized usage. The responsibility aspect will be discussed in
detail in section Error! Reference source not found. but we are taking into account the
ngineers ability to disclose and correct potential problems. Therefore, there is at least a causal and
legal responsibility, if not a moral one, that will lie in the developer segment. Considering the
Association for Computing Machinery Code of Ethics and Professional Conduct several rules wouldbe violated in a scenario such as the one presented.
(1.1) Contribute to society and human well-being:this principleconcerning the quality of life of
all people affirms an obligation to protect fundamental human rights and to respect the diversity of
all cultures. An essential aim of computing professionals is to minimize negative consequences of
computing systems including threats to health and safety and to assure that the system will be used
8/3/2019 Ethical Analysis of a Travel-tracking Application
7/14
in socially responsible ways, will meet social needs, and will avoid harmful effects to health and
welfare.
We cannot refer to the society level in our case but at the individual level, there are strong
evidences that the threats to ones safety are not minimized and no assurances regarding the usage
of the software are given whatsoever.
(1.2) Avoid harm to others: avoid any injury or negative consequence, such as undesirable loss of
information, loss of property, property damage, or unwanted environmental impacts. Well-
intended actions, including those that accomplish assigned duties, may lead to harm unexpectedly.
In such an event the responsible person or persons are obligated to undo or mitigate the negative
consequences as much as possible. One way to avoid unintentional harm is to carefully consider
potential impacts on all those affected by decisions made during design and implementation.
Let us consider the case in which the database consisting of all users data is accessible for the
developer even after selling the application to the hotel chain. The reason could be:
- Simple negligence, if the engineer or team of engineers working on this project didntconsider this possibility;
- They realized that there might be a security breach but did not make the requiredadjustments;
- On purpose they left a way in the database for future usage of the data stored.In the work environment, the computing professional has the obligation to report any signs of
system dangers that might result in serious personal or social damage. If one's superiors do not act
to curtail or mitigate such dangers, it may be necessary to "blow the whistle" to help correct the
problem or at least to reduce the risks. However, whistle blowing is a delicate decision to take andthe professional who decides to follow this course should research intensely the situation and the
background before acting. Whistle blowing should be a last resort after exhausting all internal
options and concluding lack of cooperation from the management and board of directors.
(1.7) Respect the privacy of others:It is the responsibility of professionals to maintain the privacy
and integrity of data describing individuals. This includes taking precautions to ensure the accuracy
of data, as well as protecting it from unauthorized access or accidental disclosure to inappropriate
individuals. Furthermore, procedures must be established to allow individuals to review their
records and correct inaccuracies.
The user is indeed permitted to view and edit their data through the mobile phone interface
therefore the accuracy aspect is respected. The unauthorized access issue is a pressing problem and
extra security measures must be taken to correct it.
(1.8) Honor confidentiality:The principle of honesty extends to issues of confidentiality of
information whenever one has made an explicit promise to honor confidentiality or, implicitly,
when private information not directly related to the performance of one's duties becomes available.
8/3/2019 Ethical Analysis of a Travel-tracking Application
8/14
This rule actually demands that the access should be granted only to a clearly determined group of
people so that the risks are minimal. Monitoring the customer and his activities should not be a task
for any employee of the hotel, but they should be chosen through a strict procedure and even sign a
disclosure agreement with the hotel when granted the access. In any case, the entry level
employees should not have access to this type of information.
(2.1) Strive to achieve the highest quality, effectiveness and dignity in both the process and
products of professional work: Excellence is perhaps the most important obligation of a
professional. The computing professional must strive to achieve quality and to be cognizant of the
serious negative consequences that may result from poor quality in a system.
We acknowledge that excellence is a subjective level depending on each professionals set of values
and cultural background but the result should always be a superior quality product. In our case the
great number of faults and security breaches take the application out of this select class of products.
(2.4) Accept and provide appropriate professional review: Quality professional work, especially
in the computing profession, depends on professional reviewing and critiquing. Whenever
appropriate, individual members should seek and utilize peer review as well as provide critical
review of the work of others.
(2.5) Give comprehensive and thorough evaluations of computer systems and their impacts,
including analysis of possible risks: Computer professionals must strive to be perceptive,
thorough, and objective when evaluating, recommending, and presenting system descriptions and
alternatives. Computer professionals are in a position of special trust, and therefore have a special
responsibility to provide objective, credible evaluations to employers, clients, users, and the public.
(2.8) Access computing and communication resources only when authorized to do so:Trespassing and unauthorized use of a computer or communication system is addressed by this
imperative. Trespassing includes accessing communication networks and computer systems, or
accounts and/or files associated with those systems, without explicit authorization to do so.
Individuals and organizations have the right to restrict access to their systems so long as they do
not violate the discrimination principle. No one should enter or use another's computer system,
software, or data files without permission. One must always have appropriate approval before
using system resources, including communication ports, file space, other system peripherals, and
computer time.(Reynolds, 2010)
3.3. IDENTITY THEFT"But he that filches from me my good name
Robs me of that which not enriches him
And makes me poorindeed
Shakespeare, Othello, act III, scene 3.
8/3/2019 Ethical Analysis of a Travel-tracking Application
9/14
The short definition is that identity theft is a crime. Identity theft and identity fraud are terms used
to refer to all types of crime in which someone wrongfully obtains and uses another person's
personal data in some way that involves fraud or deception, typically for economic gain.
Unlike fingerprints, which are unique and cannot be given to someone else for their use, the
personal data especially Social Security number, bank account or credit card number, telephonecalling card number, and other valuable identifying data can be used, if they fall into the wrong
hands, to personally profit at the victims expense.
In the United States and Canada, for example, many people have reported that unauthorized
persons have taken funds out of their bank or financial accounts, or, in the worst cases, taken over
their identities altogether, running up vast debts and committing crimes while using the victims
names. In many cases, a victim's losses may include not only out-of-pocket financial losses, but
substantial additional financial costs associated with trying to restore his reputation in the
community and correcting erroneous information for which the criminal is responsible.(Identity
theft and Identity Fraud)
The most common ways to commit identity theft or fraud are a lot less elaborate than breaking into
our homes. In public places, criminals may engage in:
- "shoulder surfing" watching you from a nearby location as you punch in your telephonecalling card number or credit card number or listen in on your conversation if you give your
credit-card number over the telephone to a hotel or rental car company.
- "dumpsterdiving" going through your garbage cans or a communal dumpster or trash binto obtain copies of your checks, credit card or bank statements, or other records that typically
bear your name, address, and even your telephone number.
- If you receive applications for "preapproved" credit cards in the mail, but discard themwithout tearing up the enclosed materials, criminals may retrieve them and try to activate the
cards for their use without your knowledge.
- In recent years, the Internethas become an appealing place for criminals to obtainidentifying data, such as passwords or even banking information. In some cases, criminals
reportedly have used computer technology to obtain large amounts of personal data.
With enough identifying information about an individual, a criminal can take over that individual's
identity to conduct a wide range of crimes: for example, false applications for loans and credit cards,
fraudulent withdrawals from bank accounts, fraudulent use of telephone calling cards, or obtaining
other goods or privileges which the criminal might be denied if he were to use his real name. If thecriminal takes steps to ensure that bills for the falsely obtained credit cards, or bank statements
showing the unauthorized withdrawals, are sent to an address other than the victim's, the victim may
not become aware of what is happing until the criminal has already inflicted substantial damage on
the victim's assets, credit, and reputation.(Identity theft and Identity Fraud)
Even from a deontological point of view, when the consequence is not known, a system that wouldnt
meet the security standards needed to prevent identity theft cannot be accepted as suitable. Although
8/3/2019 Ethical Analysis of a Travel-tracking Application
10/14
the intention of the developer is, indeed, to develop a functional system, by breaking the ACM article
2.1, the intentions quality proves to be less than it should. In the identity theft problem, the victims
identity becomes a mean, a toolto an end which possibly is a felony. This contradicts Kants second
categorical imperative.
From the utilitarian perspective, identity theft can be in some extremely special situations lessblamable. If the individual whose identity was stolen is a criminal (of any type) and using this method
the police would be able to capture him/her, there are perhaps sufficient excuses for using identity
theft.
3.4. PRIVACYACCESSIBILITY, DECISIONAL, INFORMATIONAL
[Privacy is] the right to be let alone
Warren and Brandeis (1890)
The lack of privacy is easy to identify when experienced but difficult to define in a clear and simple
manner. L. Introna splits the concept into three subcategories: privacy as no access to the person or
the personal realm, privacy as control over personal information and privacy as freedom from
judgment or scrutiny by others. The notion of control is due to the dynamic environment in which
the concept is defined which varies socially and culturally. This idea of control over personal
information is very powerful in situations where it is important to determine whether or not an
individuals right to privacy has been violated.
Although at a first glimpse, the access over private data cannot do a serious damage to an individual
(If you have nothing to hide), even from a relationship point of view, so not taking into accountthe economic or social aspect, the behavior of an individual can be dramatically changed when
supervised. J.Bentham described the famous Panopticon architecture as a new mode of obtaining
power of mind over mind, in a quantity hitherto without example. Following this path, we can
suspect a behavioral change in the user of our product therefore influence the decisions the client
takes during his stay at the hotel. The more accessible the data is to a third party, the greater the
tendency to take decisions closer to what is socially appropriate.
Also the control over the information transfer consisting of personal data of the user can be object
of privacy threats such as data gathering, data exchanging, data mining, data merging and data
matching. These aspects will be discussed in subchapter 3.5 and further discussions on the
systems embedded value in subchapter3.6.
The developers intention of having easily accessible data cannot be classified with certainty in any
way. It is indeed useful and appealing to have all data through a simple touch of the screen but this
provides so little protection of the actual data. Provided the exact details of the system are correctly
presented in an agreement signed by both parts, the developer will not have to account for any legal
8/3/2019 Ethical Analysis of a Travel-tracking Application
11/14
responsibility. In this matter both theories, deontological ethics and utilitarianism, are equally
unable to determine the moral character of the accessibility, decisional and informational privacy.
3.5. PRIVACY FRAUDSDATAGATHERING, EXCHANGING, MINING, MERGING, MATCHING
The ways in which available data on a certain individual can be exploited and misused are only
limited by the criminal imagination therefore we will not be able to cover all possible scenarios.
- If besides the data mentioned in the signed agreement, any other type of data is storedwithout the users consent, we are talking aboutdatagathering techniques;
- In the case in which existent databases are exchanged to third parties without the consentof the user, the dataexchanging can affect the security, integrity and social image of a certain
individual;
- By tracking the users activity during his stay it can be realized a consumers profile andthis profile can be exchanged with advertising companies that will spam the client with offers
similar to his taste;
- Taking the previous example to a new level, let us consider a large database consistingof all the clients who use our application. In this case we have to be aware ofdata miningthe
process of discovering new patterns from large data sets involving methods
from statistics and artificial intelligence but also database management. The result is a set of
associations that arent obvious and the way this new data is used determines, in the end, the
implicit value of the process. It can be simply a mean to help the hotel stock up with the right
products and run an efficient business.
When the data is fed to an automatic system that takes adverse decisions affection your well-
being, safety, health, rights to certain services etc. we can no longer talk about a neutral value
data. These decisions would previously be regarded as prejudiced and biased can now be
justified by ascribing causal responsibility tocomputer represent an advantage for companieswho want to use these non-transparent techniques.
- Datamerging - A data-exchanging process in which personal data from two or moresources is combined to create a "mosaic" of individuals that would not be discernable from the
individual pieces of data alone ;
- Datamatching - A technique in which two or more unrelated pieces of personalinformation are cross-referenced and compared to generate a match or "hit," that suggests a
person's connection with two or more groups.
In the last two situations we are considering new data obtained by processing the information
available in our database. This new data might result in a piece of information the user isnt willing
to share and is not mentioned in the initial contract. We can consider these case a more particular
case of data gathering.
http://en.wikipedia.org/wiki/Data_sethttp://en.wikipedia.org/wiki/Statisticshttp://en.wikipedia.org/wiki/Artificial_intelligencehttp://en.wikipedia.org/wiki/Database_managementhttp://en.wikipedia.org/wiki/Database_managementhttp://en.wikipedia.org/wiki/Artificial_intelligencehttp://en.wikipedia.org/wiki/Statisticshttp://en.wikipedia.org/wiki/Data_set8/3/2019 Ethical Analysis of a Travel-tracking Application
12/14
3.6. EMBEDDED VALUES-BIASB. Latour argued that technological artifacts issue constraints on the world surrounding them, and
Winner has argued that they can harbor political consequences.
The idea of embedded values is best understood as a claim that technological artifacts, especially in
our case in which we are talking about a software application, have built-in tendencies to promote
or demote the realization of particular values, a built-in consequence. Technological artifacts have
therefore, consequences that tend to manifest themselves in all central uses of the artifact. Also,
technological artifacts have built-in values and built-in norms so that we can reach the conclusion
that technology is notmorally neutral.
4.TECHNICAL MEASURESSince we are discussing about a smart-phone application we afford being a little creative with the
technical measures that can be taken to avoid or, at least, minimize the consequences of application
misusage.
Regarding the security aspect, several improvements can be brought. For instance the user can log
in using an iris recognition function which can be easily implemented in any smart-phone
considering nowadays the characteristics of their incorporated cameras. This method is not as fast
and smooth as the regular login but for gadget enthusiasts can be a reason to enjoy the application
even more.
If this is not the case, we can add an automatic log-off procedure that will be enabled after 5
minutes of inactivity in the applications window. Logging back on will be realized either through
iris recognition or through the input of a complex key. The key will be mandatory formed by
different types of characters: case sensitive letters, numerical and special characters (%,$,*,etc.)
eliminating the risk of having dumb keys such as the users name or obvious character
combinations.
To prevent unauthorized data access, the data can be kept on a local support (namely, the phones
memory) and the hotels actions will be reduced to a minimum: the client will present the already
computed bill at the hotels reception (the data cannot be modified before the payment so there are
no risks in this moment); the bill will not be a detailed one, just the total sum; at a future
reservation the hotel will ask if there are any preferences and if so, the user can decide to grant
access to his database. The membership will not be automatically granted, the client must request it
when he meets the given criteria.
If the client decides to grant access to his data, the hotel personnel must present a rank code which
will allow them to see the data only if they are above a certain level of security. As discussed before,
entry level personnel will not be able to access the database.
8/3/2019 Ethical Analysis of a Travel-tracking Application
13/14
5.CONCLUSIONIn this paper we discussed some of the ethical conflicts that may arise when misusing the
application or the data stored by it. As expected, we did not find a generally valid formula on which
basis we could say precisely which case is ethically correct or not. The true nature of an action can
only be determined in its own conjecture.
In our case, the hotels hospitality and efficient management have to balance out the risks to which
the user is exposed while using this application. The application should be rigorously tested before
being sent on the market since it handles delicate data and can raise great problems for the user.
Following even remotely the ethical rules, many unpleasant situations can be avoided and just as
many can be justified resulting in a useful, appealing experience for all parts involved.
8/3/2019 Ethical Analysis of a Travel-tracking Application
14/14
6.BIBLIOGRAPHYIdentity theft and Identity Fraud. (n.d.). Retrieved october 08, 2011, from The United States
Department of Justice: http://www.justice.gov/criminal/fraud/websites/idtheft.html
Martin, C.A Brief Introduction to Morality. Kansas.
Mason, R. O. (1986). Four Ethical Issues of theIinformation Age. Management Information Systems
Research Center, University of Minessota .
Reynolds, G. W. (2010). Ethics in Information Technology. Cengage Learning Inc.: Boston.