4.11 BB: Privacy Curriculum Page
Read Blown to Bits Chapter 2 and answer these questions. You can revise your answers after we discuss this reading in class or in the forum.
Chapter 2: Naked in the Sunlight
Due Thursday November 16, 2017
http://www.bitsbook.com/wp-content/uploads/2008/12/B2B_3.pdf#page=37
Vocabulary List:
Directions: As you read, write down definitions for each item of the list in words that you understand from the text. If you cannot find a definition within the text, search the internet for a definition and write it down in words that you understand. Make sure your definitions are related to Computer Science.
ad hoc: when used to describe programming, it means a quick fix for a problem, not usually the best example that will sustain an issue.
database: a collection of information organized in such a way that a computer program can quickly selected the desired pieces of data. Often abbreviated DB
data aggregation: process in which information is gathered and expressed in a summary form for purposes such as statistical analysis
data mining: a class of database applications that look for hidden patterns in a group of data that could be used to predict future behavior
data repository: generically refers to a general place where data is stored and maintained
data sources: name given to the connection setup from a database to a server. The name is commonly used when creating a query to the database
digital detritus: term used to describe unsightly debris that accrues as the result of the experience of digital living
dossier: a collection of documents about a person, event, or subject
EDR: event data recorder
encode: the phrase used to describe the method of preparing data for storage or transmission.
encryption: the translation of data into secret code
IP address: an identifier for devices on a TCP/IP network
metadata: data about data; describes how and when and by whom a particular set of data was collected, and how data is formatted
query: a request for information from a database
RFID: radio frequency identification, similar to barcodes
Double Entry Journal:
Directions: As you read, write down at least three big ideas from this part of the chapter that you believe are critically important to this topic. You should either quote the authors or summarize the their points, but always include a page number. Then write your reaction to the idea.
The Text (Quote or Summary)
Page #
My Reaction to the Text
His actual city now has at least half a million.
Across the UK, there is one surveillance camera for every dozen people.
The average Londoner is photographed hundreds of times a day by electronic
eyes on the sides of buildings and on utility poles.
20
I was surprised on how many cameras came to be in only such a short time. After the terrorist incident London used a lot to tighten up security.
Or consider AOL user 17556639, whose search history was released along
with Thelma Arnold’s. He searched for the following:
how to kill your wife 23 Mar, 22:09
wife killer 23 Mar, 22:11
poop 23 Mar, 22:12
dead people 23 Mar, 22:13
pictures of dead people 23 Mar, 22:15
killed people 23 Mar, 22:16
dead pictures 23 Mar, 22:17
murder photo 23 Mar, 22:20
steak and cheese 23 Mar, 22:22
photo of death 23 Mar, 22:30
death 23 Mar, 22:33
dead people photos 23 Mar, 22:33
photo of dead people 23 Mar, 22:35
www.murderdpeople.com 23 Mar, 22:37
decapitated photos 23 Mar, 22:39
car crashes 3.23 Mar, 22:40
car crash photo 23 Mar, 22:41
Is this AOL user a potential criminal? Should AOL have called the police? Is17556639 about to kill his wife? Is he (or she) a researcher with a spelling problem and an interest in Philly cheese steak? Is reporting him to the police doing a public service, or is it an invasion of privacy?
60
I liked this example of perceiving these search results. You can never know if that person is actually wanting to commit his act or just searching these thing up for fun or a dare. This person actually might want to but confirming it is hard, and if this person wasn't going to commit murder then this a kind of intruding on his privacy.
Companies can do almost anything they want with your information, as long as you agree. It seems hard to argue with that principle, but the deck can be stacked against the consumer who is “agreeing” to the company’s terms. Sears Holding Corporation (SHC), the parent of Sears, Roebuck and Kmart, gave
consumers an opportunity to join “My Sears Holding Community,” ...When you went online to sign up, the terms appeared in a window on the screen. The scroll box held only 10 lines of text, and the agreement was 54 boxfuls long. Deep in the terms was a detail: You were allowing Sears to install software
on your PC that “monitors all of the Internet behavior that occurs on
the computer …, including … filling a shopping basket, completing an application form, or checking your … personal financial or health information.” So your computer might send your credit history and AIDS test results to SHC, and you said it was fine!
67
I agree that many people agree to things they don't even read. Many people won't care about privacy concerns if that company gives you coupons or give you free stuff. I this example you have to let them download a software onto your computer, letting it take as much of your information on the computer, and you agreed to it. I also have seen an experince in which people agreed to letting something in without reading the terms of agreement. Last year there was a phishing attack on google and the school got emails, saying to get access to google docs. Many people just let it be and gave it access and which got information of thousands of people, just because the users didn't read what the phishing attack is letting itself do.
Reflection Questions:
Directions: After you read, write brief answers using complete sentences to the following questions.
What is an RFID tag and what does it do?
A RFID tag is a chip used to track something or someone
What is an EDR and what does it do?
EDR is used to record data events that happen like car crashes.
Is it possible to identify someone, perhaps a patient, knowing just his or her gender, birthdate, and zip code? Explain.
Yes you probably can, if that patient is that certain area then you can narrow it down to a few people.
What is the difference between "big brotherism" and "little brotherism"?
Big brotherism is like collecting data from a larger area than little brotherism. An example of Big Brotherism is the NSA, while little brothism is collecting data locally.
How do you feel about “Big Brother” watching you? Do you think having security cameras everywhere is good or bad?
I think If the reason for watching us is to protect us is good. However I also don't think they shouldn't see certain information that might be sensitive to the person.
Is the Privacy Act effective? Explain.
I don't think the privacy act is effective because a lot of what we have is one the internet and the government won't protect you data if it gets leaked.
“The digital explosion has scattered the bits of our lives everywhere: records of the clothes we wear, the soaps we wash with, the streets we walk, and the cars we drive and where we drive them.” (pg 20) Marketing companies use these data to build models of our preferences and use these models to recommend products to us. In 1 or 2 paragraphs, address the question 'Am I willing to trade some of my privacy for the convenience of having a computer or a company recommend products to me? Why or Why not?’
Yes I am willing to trade some of my privacy for the convenience of having technology and recommendations. Depending on how much privacy is sent and what is sent then many people would not object. Most people would want their tech to be faster, and easier to use. Companies recommendations are also good because for example Youtube, it is a video streaming site and gives recommendations for videos. A Lot of people without those recommendations wouldn't know what to watch, however if youtube has access to what you watch and search up then they can give recommendations to you.
How do “we leave digital footprints and fingerprints?” Do you think this is important for everyone to know? Why or why not?
We leave our footprints and fingerprints on almost everything, and these prints are important if something that you don't want to get out or a sensitive subject gets into the hands of someone bad then they would try to blackmail you.
How has the social evolution affected privacy? Consider social networking.
Social evolution hasn't helped us in privacy, it probably makes it easier to get your information now. Many people post on social networks things that you don't want to get posted or you post things that you later regret. Once somethings on the social media it is close to impossible to erase it.
What are our responsibilities as app developers with data that is gathered from the apps we create?
Our responsibility is to only use the information collected for the app only and not share it with anything else.
Search the web for a recent news story that deals with privacy. Write a paragraph summarizing the article, including any beneficial or harmful impacts on privacy.
This article talks about the new smart devices that are going to be watching them constantly. Smart home devices like amazon show, echos, google home and many more can be useful products but like what this chapter said, at the cost of what. The privacy of your life is going to be very easy to see and track now, the amazon show especially because there is a camera in it so people can spy on you easier. This article talks about the worries of people with smart devices.