CISC280 project 5

docx

School

Northampton County Area Community College *

*We aren’t endorsed by this school

Course

280

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by UltraTurtle1405

Report
CISC280 - Project 5 - Information privacy 1. What is the difference between having privacy and being alone? Provide examples. You can keep your personal information private at a concert with thousands of other people. You can be alone in your house but be a victim of identity theft or have a stalker. 2. Provide an example (not already given in the book) of a situation where people must disclose personal information to a private organization in order to obtain a product or service. People may have to take and pass a drug test as a prerequisite to being hired at a company. 3. Assuming people value privacy so much, why do they put so much personal information on their Facebook pages and in their blogs? I don’t think many people realize just how much information they’re giving away online. For example, people are always posting “the words next to your birth month and date are your Rapper Name” memes and doing those “let’s get to know each other!” quizzes where you’re supposed to fill in your own info to keep the “game” going. 4. MIT computer science professor Harold Abelson has said, “In today’s online world, what your mother told you is true, only more so: people really can judge you by your friends” [97]. Have you ever been upset or embarrassed by what your friends posted on Facebook? Are you concerned that people are going to judge you based on what your friends are posting?
CISC280 - Project 5 - Information privacy Yes, I have … I have friends on FB who I know in person, and I just don’t understand how such smart people can be anti-vax and anti-common-sense, among other things. I’m not at all concerned that people are going to judge me based on what my friends post, though, because my friends know where I stand on all the topics of contention. 5. Do you agree with the argument that it is more difficult to know whom to trust in modern society than it was in a small village of a couple of centuries ago? Why or why not? Yes, I do. It is frighteningly easy for people to pretend to be someone they’re not on the internet. Kids and teenagers can think they’re talking to a friend their age that they met online, when really, it’s a 30-year- old man on the other side of the screen. I have personal experience being duped by an old schoolmate a decade ago. She was a year ahead of me in grade school and we couldn’t stand each other back then. 17 years later, she sent me a friend request on Facebook. I debated about accepting it, but finally did, figuring if she was as bad as she was back then, I could just block her and move on. We actually ended up spending an entire Saturday chatting and I was amazed at how much we had in common, including living in the same general area. VERY long story short, it turns out she’s a narcissist, a pathological liar, a thief, and a fraud. 6. While the cost of auto insurance varies from person to person, based on the home zip code and driving record of each individual, health insurance premiums are typically uniform across groups of people, such as the employees of a company. However, a majority of health care costs are incurred by a minority of policy holders. Today it is possible to take a blood sample from a person and extract a genetic profile that reveals a person's predisposition to certain diseases. Should insurers collect this information and base premiums on each individual’s propensity to illness? Absolutely NOT. I am an extremely strong supporter of universal health care. I believe we all have a moral responsibility to look out for each other. I wouldn’t mind paying higher taxes, as Canada does, to ensure that people who need medical care can and do receive it, and that it’s high-quality care. Basing premiums on each individual’s propensity to illness is borderline on eugenics, if not over the line of it. Making someone with Type 1 Diabetes, cancer, renal failure, etc. pay more for care and medications that they literally require to survive would drastically diminish these populations. In fact, it already does. People ration their insulin and die from doing so because they can’t afford to pay $1000 a month for the insulin their body needs to live. 7. Should mobile apps be allowed to collect information about your location and transmit this information to data brokers? Why or why not? No, they should not. The only ones who should be able to know your location information are family and friends – and that’s only if you grant them express permission to do so. I understand providing location information to some apps, such as map apps, greatly enhance their features, but for them to provide this information to data brokers is a complete invasion of privacy. I don’t want targeted ads. I don’t want anyone knowing my location unless I expressly grant them permission to know such information. And people should be allowed to provide this information without having it sold/given to outside parties.
CISC280 - Project 5 - Information privacy 8. You are sitting on a jury. A driver of a car has been charged with manslaughter for killing a pedestrian. The prosecution presents evidence collected from the car's 'black box' that indicates the car was travelling at 45 MPH before the accident. The defense presents four eyewitnesses to the accident, all of whom testify that the car could not have been going faster than 30 MPH. Are you more inclined to believe the eyewitness or the data from the 'black box'? I’d believe the data from the black box. Eyewitness accounts are notoriously unreliable. 9. Explain the difference between an opt-in policy and an opt-out policy. Which policy is favored by privacy advocates? With an opt-in policy, users must actively choose to participate in the service. With opt-out policies, users are automatically enrolled and have to remove themselves from participating in the service. Opt-in policies are favored by privacy advocates because it gives individuals control over what information they choose to share, if any, without being forced into sharing from the get-go. 10. What special responsibilities do computer professionals have with respect to understanding and protecting the privacy rights of others? 11. Provide an example (not already given in the book) of a situation where people must disclose personal information to a private organization in order to obtain a product or service. You have to provide your medical records in order to obtain a life insurance policy. 12. What are the advantages of consolidating a patient’s medical records into a single database accessible by many? What are the risks associated with this consolidation? A patient’s medical records being available in a single database is very convenient for doctors and patients because it allows a patient’s medical information to be accessible to doctors in different practices and networks. If someone from New Jersey is on vacation in Hawaii and ends up in the hospital, that hospital can quickly and easily access the patient’s medical history without having to wait for it to be faxed over to them, as in the past. A single database also allows doctors to see what medications are contraindicated with what the patient is already taking and prescribe an alternate, safe medication instead. The risks involved with this are that, if someone were to hack into, for example, a hospital’s database, as happened to Lehigh Valley Health Network in January 2021, patient account numbers, medical record numbers, and diagnoses, as well as a slew of non-medical information such as social security numbers, drivers’ license numbers, date of birth, addresses, and billing information could be exposed and potentially used for nefarious purposes. 13. Warren and Brandeis argued that it is a violation of a person’s privacy to take their photograph without their consent. Do you agree with their position? Why or why not? If someone takes your photo, should you just assume it’s going to be posted on the Web?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
CISC280 - Project 5 - Information privacy I believe that location and context play a huge role in whether or not someone’s privacy is violated by having their photo taken without their explicit consent. If you're somewhere like a rally, a protest, a concert, or just out and about in public, I do not believe that you have a reasonable expectation of privacy. If you're in your own backyard, at a private family gathering, at a doctor's office or hospital - these are places where you do have a reasonable expectation of privacy and where your photo should not be able to be taken without your consent. I think it’s pretty safe to presume these days that if your photo is taken, it will end up on the internet in some capacity. 14. Critics of grocery club cards give examples of card-member prices being equal to the regular product price at stores without customer loyalty programs. In other words, customers who want to get food at the regular price must use the card. Customers pay extra if they don’t want to use the card. Is it fair for a store to charge us more if we don’t want to use its loyalty card? Explain your reasoning. This is not fair of a store to do at all. A loyalty card should offer discounts, exclusive sale prices, and rewards such as a few cents savings per gallon of gas if they have an associated gas station or a free food item (such as a ham or a turkey) during the holidays when you spend a certain amount of money, but people who do not have a club card shouldn’t be penalized by paying higher prices. There are various reasons why someone might not want to sign up for a loyalty card, but they shouldn’t be penalized for it at the register.