CptS 401 Adam Carter. Privacy Section 2.1. For Tomorrow's In-Class Activity. Form into groups of 4 Make sure someone in your group brings a digital camera to class! Your group can’t get credit for the activity without one. Quiz Question 1.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Which of the following is a key aspect of privacy, according to the book:
D: All of the above (p. 45, 3 bullet points)
In a court case discussed in the book, the government asked Google to release people’s search queries in order to crack down on material deemed harmful to minors. Was this be a violation of privacy?
(C): “It was not difficult to deduce the identity of some people, especially those who searched on their own name or address. A process called identified others” (p. 49). In this process, one identifies the individual from a set of anonymous data.
A. Identity tracking B. Re-identification
C. Identity deduction D. Unanonymizing
(B) “Re-identification means identifying the individual from a set of anonymous data” (p. 49).
According to the book, the collection of personal information about a person without the person’s knowledge is known as
(A): Invisible information gathering (p. 50)
Which of the following is a technique used for invisible information gathering?
E: All of the above (see p. 51).
Now let’s focus on online behavior…
Many phone manufacturers (Apple, Google, Microsoft) track and store your location.
Is this an invasion of privacy?
C: Opt-in (p. 53).
What about when people use an internet site that provides a free service with no explicit end-user agreement? What would be a reasonable business policy in this case?
Ex. 2.9, p. 130: A company that supplies filtering software to schools to block access to objectionable websites sold statistical data about the websites visited by school children. The data did not identify the children or individual schools. Was this a privacy violation?
Why or why not? Discuss with group for 5 min.; apply ethical frameworks and privacy principles on p. 54
Ex. 2.14, p. 130: People who fled hurricane Katrina left behind and lost important documents and records such as birth certificates, credit cars, property records, and employment records. A U.S agency proposed a new database where people could voluntarily store essential personal records in case of natural disasters. Is this a good idea?
Discuss pros and cons with group for 5 min.; apply ethical frameworks and privacy principles on p. 54
Ex. 2.16, p. 131: A city government wants to track down people who run small businesses and do not pay the city’s $125 business license fee. The city hired a private detective to obtain IRS tax records of city residents and determine who has reported small-business income to the IRS but paid the license. Should this action by the city be permitted?
Discuss arguments for and against with group for 5 min.; apply ethical frameworks and privacy principles on p. 54
One of the segments in Digital Nation explored the U.S. military’s use of unmanned drones to carry out military operations overseas. From the comfort of a sophisticated control room on a military base on U.S. soil, pilots carry out reconnaissance missions and bomb targets overseas. Drones have been known unintentionally to strike innocent people. Is it ethical for the military to operate unmanned drones?
Is it ethical for the military to operate unmanned drones?
As reported in Digital Nation, many youths in spend inordinate amounts of time playing video games. They play so much that their educations and social relationships suffer. Should the government establish restrictions on gaming for minors? If so, what kinds of restrictions? How would they be enforced?
Should the government establish restrictions on gaming for minors?