4.11 Impacts of CS: Privacy Curriculum Page
Reflection Questions:
- Is it possible to identify someone, perhaps a patient, knowing just the gender, birth date, and zip code? Why or why not?
- It is possible to identify most citizens of the United States with just their gender, birth date, and zip code because people can cross reference the data with other public information to narrow the list down to a select few individuals, or even pinpoint the specific person.
2. Are electronic documents like paper documents? Write 2-3 sentences comparing and contrasting them.
- Electronic documents have some similar attributes to paper documents, however they are also very different. Electronic documents are more easily accessible (like from the comfort of one's home), however paper documents can only be accessed in certain places. In addition, electronic documents can be shared easier and faster than paper documents. Security risks are also much more prevalent in electronic documents than paper documents because of the easiness of their accessibility. However, electronic documents and paper documents are similar in that they both are distributed and read by many people.
3. Earlier in the course, you built the Map Tour app. In the final version, what kind of data is collected from the user? Does the user know the data is being collected? Can they opt out of providing data and still use the app?
- In the MapYour app, the user's location is being collected. The user should be aware that this type of data is being collected because of the fact that the app can pinpoint their destination on a map. They could continue to use the app despite opting out of providing their location, the app just wouldn't be able to provide the "my location" enhancement for the user.
4. Is the Privacy Act effective? Explain why or why not.
- The Privacy Act is not that effective due to the fact that there's a multitude of data that is readily available and easy to access on the internet. In addition, websites still exist that release personal data such as cell phone records, just for a sum of money. There are ways to easily get around these acts and people do.
5. Are you willing to trade some of your privacy for the convenience of having a computer or a company recommend products to you? Why or why not? Under what circumstances?
- I am not willing to trade some of my privacy for the recommendation of certain products online. I think that the advertisements are solely for the benefit of the company. They are hoping that customers will give in to their marketing strategies that they create by following their actions online. I know that all the actions I do on a computer are being recorded, and I think that it is unfair and unjust for companies to be able to use our browsing history in order to benefit themselves and make more money.
6. How do we leave digital "footprints and fingerprints?" Do you think this is important for everyone to know? Why or why not?
- We leave digital "footprints and fingerprints" unintentionally in our data trails. Every we time we visit a website online, send emails, store pictures, call people, etc. that information those actions are being recorded. I think that it is extremely important for people to know about these digital "footprints and fingerprints" because all of the activities that someone does online can be traced back to them and impact their life possibly in a negative way.
7. How have social media platforms such as Twitter, Instagram, Snapchat, etc. affected our privacy?
- Social media platforms have completely changed the way people view privacies. Everything posted on social media is exposed to many people and it can get into the hands of many different people. The things that people post on social media can lead to people getting hurt because their privacy is being taken away due to the ease of sharing someone's pictures and videos to other people.
8. In this course, you are building apps that collect data from users, the device, and its sensors. What responsibilities do we have as app developers for the data we collect?
- As app developers, we have responsibilities for the data we collect such as keeping information private and only using it for educational purposes. In addition, we need to be respectful of people's privacy and cautiously handle the data.
9. Search the web for a recent news story that deals with privacy. Write a paragraph summarizing the article, including any beneficial or harmful impacts on privacy.
- After the terrorist attack in San Bernardino, new reporters hurried to capture images and videos of the attackers' home. In the midst of showing around the house, they also decided to share personal artifacts from the house including a mother's ID card, a birth certificate from a child, and other information that they weren't given the right to access. As a result, the privacy of both an orphaned child and a mother were violated because of the acts of other individuals. It was interesting and helpful for the public to see some of the site, however we shouldn't get carried away and invade privacy just so more details can get shared. The author of the article argues that despite the horrendous acts of the terrorists, we need to remember the importance of keeping human dignity and privacy concerns.