Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Frances Celine Tan 7-2-10 1.) What are the significant differences between personal information flow with IT and personal out information flow without IT? The difference between personal information flow with IT and personal information flow without IT, is that the personal information dissemination with IT around or being intact is there are great chances that it will distribute widely and freely in just a matter of seconds without the knowledge of the authorized person and it can have a multiple copies that can be stored somewhere else in the cyber space that for most of the people who don’t have IT specialty can’t figure out and track where are those copies are hidden. Hence, the personal information dissemination without IT around or being intact is that there is a hard time to finalize, to collect and to disseminate and to transfer to other people because there are only limited information that people can use and research about for a specific person and it would took a great time to have a full information to have and greater money to spend for it. 2.) What are three arguments that can be made for why we shouldn’t worry about privacy? How can each of the three be countered? The three arguments that can be made for why shouldn’t worry about privacy are: 1.) “If you haven’t broken the law-if you are doing a good job at work, paying bill on time, not doing any illegal thing online and offline- then you have no need to worry; nothing bad will happen to you from being watched”. They can be countered in everyday lives as moving and each day has passed by to our lives, simply because every person in this land came from different walks of life and who knows, who will commit such kind of crime or doing to satisfy their needs or wants in life. 2.) “the privacy is overrated-people have traded off for benefits, so it must not be valued or valuable.” They can be encounter during the promotions fill up list; raffle draws list and other promotional stuff that can let individuals fill up necessary information to be needed by the company or the promoter. 3.) “Personal information-gathering practices can be beneficial to information-gathering organization and to their customers and subjects.” They can be encountered by filling up some application forms that the company have for subject for approvals and other kind of process. 3.) Explain Rachel’s argument that privacy is necessary for a diversity of relationship. The argument of Rachel: “ Privacy is necessary for a diversity of relationship” – the explains that we should think the relationship with others, not all people we should share all our information , there are some information that we should keep it to ourselves as a secrets and that is back off by other person because it is not to intent to be shared to public We should have also have a line up to what extent that we will share our information to others so they can’t be used in future reference or case. 4.) What does gossip have to do with privacy? The gossip when we lose control of information, we lose control of relationship. 5.) Nissenbaum’s account of privacy as contextual integrity explains privacy in terms of two norms. Explain, and give two examples of each type of norm. Choose examples that show how the norms vary from context to context. 6.) What is the oanopticon? How do prisoners experience themselves differently when they are un panopticon prison? 7.) What happens to people who are watched all the time according to Reiman? 8.) Pick a domain of human activity in which information about individuals is gathered (e.g. insurance, buying, political campaigning, and fund-raising), and describe how organizations in that sector sort individuals into categories and try to predict their behavior. 9.) What would be the benefits and drawbacks of limiting organizations to using only crude categories in their information-gathering practices? 10.) What are the five principles of the code of fair information practices? 11.) How would transparency policies protect privacy? 12.) What is the difference between opt-in policies and opt-out policies? 13.) What do you think are the three most significant personal steps an individual can take to protect his or her personal information?