Download Frances Celine Tan 7-2-10 What are the significant differences

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Schema (psychology) wikipedia , lookup

Transcript
Frances Celine Tan
7-2-10
1.) What are the significant differences between personal information flow with IT and personal
out information flow without IT?
The difference between personal information flow with IT and personal information flow
without IT, is that the personal information dissemination with IT around or being intact is there
are great chances that it will distribute widely and freely in just a matter of seconds without the
knowledge of the authorized person and it can have a multiple copies that can be stored
somewhere else in the cyber space that for most of the people who don’t have IT specialty can’t
figure out and track where are those copies are hidden.
Hence, the personal information dissemination without IT around or being intact is that there is
a hard time to finalize, to collect and to disseminate and to transfer to other people because
there are only limited information that people can use and research about for a specific person
and it would took a great time to have a full information to have and greater money to spend
for it.
2.) What are three arguments that can be made for why we shouldn’t worry about privacy? How
can each of the three be countered?
The three arguments that can be made for why shouldn’t worry about privacy are:
1.) “If you haven’t broken the law-if you are doing a good job at work, paying bill on time, not
doing any illegal thing online and offline- then you have no need to worry; nothing bad will
happen to you from being watched”. They can be countered in everyday lives as moving and
each day has passed by to our lives, simply because every person in this land came from
different walks of life and who knows, who will commit such kind of crime or doing to satisfy
their needs or wants in life.
2.) “the privacy is overrated-people have traded off for benefits, so it must not be valued or
valuable.” They can be encounter during the promotions fill up list; raffle draws list and
other promotional stuff that can let individuals fill up necessary information to be needed by
the company or the promoter.
3.) “Personal information-gathering practices can be beneficial to information-gathering
organization and to their customers and subjects.” They can be encountered by filling up
some application forms that the company have for subject for approvals and other kind of
process.
3.) Explain Rachel’s argument that privacy is necessary for a diversity of relationship.
The argument of Rachel: “ Privacy is necessary for a diversity of relationship” – the explains that
we should think the relationship with others, not all people we should share all our information ,
there are some information that we should keep it to ourselves as a secrets and that is back off
by other person because it is not to intent to be shared to public
We should have also have a line up to what extent that we will share our information to others
so they can’t be used in future reference or case.
4.) What does gossip have to do with privacy?
The gossip when we lose control of information, we lose control of relationship.
5.) Nissenbaum’s account of privacy as contextual integrity explains privacy in terms of two
norms. Explain, and give two examples of each type of norm. Choose examples that show how
the norms vary from context to context.
6.) What is the oanopticon? How do prisoners experience themselves differently when they are
un panopticon prison?
7.) What happens to people who are watched all the time according to Reiman?
8.) Pick a domain of human activity in which information about individuals is gathered (e.g.
insurance, buying, political campaigning, and fund-raising), and describe how organizations in
that sector sort individuals into categories and try to predict their behavior.
9.) What would be the benefits and drawbacks of limiting organizations to using only crude
categories in their information-gathering practices?
10.) What are the five principles of the code of fair information practices?
11.) How would transparency policies protect privacy?
12.) What is the difference between opt-in policies and opt-out policies?
13.) What do you think are the three most significant personal steps an individual can take to
protect his or her personal information?