Does 'Public Access' Imply 'Ubiquitous' or 'Immediate'? Issues Surrounding Public Documents Online

Does 'Public Access' Imply 'Ubiquitous' or 'Immediate'? Issues Surrounding Public Documents Online

David W. Miller (California State University, Northridge, USA), Andrew Urbaczewski (University of Michigan - Dearborn, USA) and Wm. David Salisburg (University of Dayton, USA)
Copyright: © 2005 |Pages: 20
DOI: 10.4018/978-1-59140-491-0.ch007
OnDemand PDF Download:


In the information age, various entities (e.g., citizens or business concerns) are now able to access and gather large amounts of publicly available information online, which has obvious benefits. However, there are perhaps unfavorable consequences to this information gathering, and little attention has been paid to these. This chapter highlights the various issues that are created by having unfettered access to documents online, as well as the ability of citizens and investigators to compile databases of personal information on individuals. We cite existing laws to support the position of having limits on the freedom of access, and we propose several strategies for consideration in balancing the rights of the public to access public information while yet protecting and celebrating individual privacy. While the majority of this paper deals with American laws and history, international examples are also noted. In the post-9/11 world, a great deal of reasonable concern has been raised by governmental information gathering. We suggest that equal attention should be paid to ubiquitous access to public records, even by individuals and non-government agencies, and potential concerns for individual privacy that this access might raise.

Complete Chapter List

Search this Book:
Table of Contents
Lee Freeman, A. Graham Peace
Chapter 1
Lee A. Freeman, A. Graham Peace
Richard Mason’s seminal paper describing the four ethical issues of the information age has guided the field of Information Ethics for almost 20... Sample PDF
Revisiting Mason: The Last 18 Years and Onward
Chapter 2
Charles R. Crowell, Darcia Narvaez, Anna Gomberg
This chapter discusses the ways in which moral psychology can inform information ethics. A “Four Component Model” of moral behavior is described... Sample PDF
Moral Psychology and Information Ethics: Psychological Distance and the Components of Moral Behavior in a Digital World
Chapter 3
Kieran Mathieson
Information technology may be able to help people become better ethical decision makers. This chapter explores philosophical and psychological... Sample PDF
Designing a Moral Dilemma Support System
Chapter 4
Kai Kristian Kimppa
In the light of three major ethical theories, Lockean liberalism, consequentialism, and Kantian deontology, it seems that the intellectual property... Sample PDF
Intellectual Property Rights - or Rights to the Immaterial - in Digitally Distributable Media Gone All Wrong
Chapter 5
Bruno de Vuyst, Alea M. Fairchild
Intellectual property rights (IP) are established through the Trade Related Aspects of Intellectual Property Rights (TRIPS) Agreement (part of the... Sample PDF
Intellectual Property Rights, Resources Allocation and Ethical Usefulness
Chapter 6
Asim El-Sheikh, Abdullah Abdali Rashed, A. Graham Peace
Software piracy costs the information technology industry billions of dollars in lost sales each year. This chapter presents an overview of the... Sample PDF
Software Piracy: Possible Causes and Cures
Chapter 7
David W. Miller, Andrew Urbaczewski, Wm. David Salisburg
In the information age, various entities (e.g., citizens or business concerns) are now able to access and gather large amounts of publicly available... Sample PDF
Does 'Public Access' Imply 'Ubiquitous' or 'Immediate'? Issues Surrounding Public Documents Online
Chapter 8
Christopher M. Cassidy, Bongsug Chae, James F. Courtney
Society has focused on privacy solutions to problems related to consumer information, yet the problem has not gone away. Why is this? One answer is... Sample PDF
Ethical Management of Consumer Information: Solving the Problem of Information Externality Using the Coasian Approach
Chapter 9
Robert N. Barger, Charles R. Crowell
This chapter discusses the ethics of a proof-of-concept demonstration of “parasitic computing.” A “parasite” computer attempts to solve a complex... Sample PDF
Ethics of "Parasitic Computing": Fair Use or Abuse of TCP/IP Over the Internet
Chapter 10
Michael Freeman
This chapter addresses how new surveillance technologies and programs aimed at fighting terrorism affect privacy. Some of the new programs and... Sample PDF
Counterterrorism and Privacy: The Changing Landscape of Surveillance and Civil Liberties
Chapter 11
Kathleen S. Hartzel, Patrick E. Deegan
This chapter explores how individuals using different justice perspectives to evaluate the appropriateness of the USA PATRIOT Act will logically... Sample PDF
Balancing Individual Privacy Rights and Intelligence Needs: Procedural-Based vs. Distributive-Based Justice Perspectives on the PATRIOT Act
Chapter 12
Jimmie L.. Joseph, David P. Cook
This chapter explores the ethical implications of a reduction in information asymmetry between health care providers and their patients. In many... Sample PDF
Information Imbalance in Medical Decision Making: Upsetting the Balance
Chapter 13
Pooja Deshmukh, David Croasdell
This chapter explores privacy and security issues in health care. It describes the difference between privacy and security in the context of health... Sample PDF
HIPAA: Privacy and Security in Health Care Networks
Chapter 14
Mary Brabston, Jennifer Dahl
In this chapter, we examine three frameworks or models that could be used in developing codes of information ethics and then review two codes of... Sample PDF
Limitations of Having Diversity in Codes of Information Ethics: A Professional and Corporate Perspective
Glossary of Terms
About the Authors