Sunday, March 4, 2012

Chapter 2: Privacy Part 2

Tom Burtless Class time:11 11:50
KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: 2.3 2.5
1. (Knowledge)Tell three interesting elements of this chapter:

a. The young people today are not as concerned by disclosure of personal information or videos of embarrassing behavior.s

b. Public opinion and consumer preferences have a strong impact on decisions businesses make – and on the success or failure of specific products, as well as whole businesses.

c. Within 10 years of the invention of the telephone, people (in and out of government) were wiretapping them.
 
2. (Comprehension) Summarize what is being discussed within this chapter?

Within these sections of chapter 2, the author discusses privacy on a more descriptive level. In section 2.3, Baase covers a wide range of topics. The author begins with discussing target marketing and how people can get automatically put on mailing lists for a variety of companies and organizations. Baase then goes into how people have been offered prizes for information about themselves through surveys filled out on the Internet. Then Baase goes into location tracking, which discusses the pros and cons of how GPS systems can be used. After this the author talks about how data and personal information on millions of people has been stolen (laptops left in taxis, laptops stolen) and used for identity theft and fraud. Baase then goes into privacy and public records, and who has access to what. The author discusses National ID Systems, and how social security numbers have changed in purpose from exclusively deeming who could use the Social Security program to being on almost every credit card form you fill out (amongst other documents). Baase closes out section 2.3 discussing children related to privacy, and how they are at risk for not understanding what can happen when they interact and put information out onto the Internet.

Section 2.4 goes into Protecting Privacy, and the methods people use in an attempt to make their information safe. The author discusses software that can detect spyware and other viruses that may leak out information stored on your computer. The author then discusses encryption, which is a technology that turns data into a file that requires certain software to decrypt. Basically, you can only view the file if you have certain software that decrypts it properly. However, it is possible to decrypt it by figuring out the algorithm used to encrypt it in the first place, so this is not foolproof. The author then goes on to discuss several theories related to rights of privacy. After this, the author debates free market-views versus consumer-protection view, which discusses the differing view of allowing degrees of privacy and having strict regulation on private information. The author concludes 2.4 discussing the European Union’s Privacy Regulation and how it helps with regulating the use with private information. The author also discusses how there are issues with their regulations, and how their regulation system may not work for the wide variety of issues we have in the United States.

Section 2.5 is a brief section that touches on communication privacy. Baase discusses the history of wiretapping, and how laws regarding it have now included email and other digital communication. Baaase also discusses the NSA, and how this agency uses communication devices to detect national threats. However, much controversy has fallen on the NSA because it has tracked thousands of US citizen phone calls and emails. The section and chapter closes out discussing how the United States had banned encryption in the 90’s, not allowing people to protect themselves. However, this ban was lifted in the 2000’s under the guise that encryption on a file must be lifted in a court order is placed on it.

3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?

As discussed in the previous section, a solution for these varying issues of privacy is to fully understand what you are getting into when you sign up for something. That does not just mean the Internet, but anything you subscribe or sign up for. In an article by Robert Vamosi from PCWorld, the author discusses several ways you can protect your online identity from various data mining methods and websites (Vamosi). The author discusses how different websites have varying options for privacy and what you can choose to give to the company (or website) to use. If people are concerned about privacy on the Internet, they need to check the variety of social networking and other websites they are on and make sure they understand what is being used with their information.

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

As the author describes in section 2.4, if you were to leave a magazine lying around in a public place, you would have the understanding that you’ve left it out for whomever to obtain (p. 107 Baase, 2008). That doesn’t make it right that someone has stolen your magazine, but you understand that you’ve left yourself open to such an incident. People, with everything that they own, need to realize how careful they have to be if they want to maintain the utmost of privacy. A new idea that I would add to what is being discussed is cloud based information:

Cloud based information is placing all of the information that resides (whether it be videos, photos, documents, emails) on your phone, out into the Internet. There are already privacy issues with the files that exist in your phone or computer’s storage drives. With all the information you have being placed on the cloud (in the Internet), it seems easier to violate people’s privacy. With all this data just being constantly streamed out from smart phones and computers and placed on the Internet, it opens up a new can of worms in what people can access and how quickly they can access it.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I agree that there is a lot of private information that can be extremely sensitive when thrown out into the world. I also agree with the author’s notion that there are many threats in having such information being placed on the Internet and available so easily. However, I do believe there is an aspect in controlling some information (if not most) that is placed on the Internet about ourselves. Other aspects including stolen and lost data need to be dealt with. Companies need to be held responsible for costumer data being leaked to the public. The fact that information on over millions of people has been stolen or used from large companies is staggering (p. 87 Baase, 2008). The conclusion I draw about this material is that people need to protect their privacy whenever possible. People need to start reading Terms of Service agreements, and looking into privacy settings on the variety of websites they use. Also, that government agencies and companies need to be held responsible for letting information out. 
 
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in todays society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter? 

This is absolutely relevant in today’s society. Privacy is a huge concern among everyone. So much information is being put out into the Internet by everyone all the time. I have family members and friends who have been victims of identity theft and identity fraud. However, they didn’t do much to protect their privacy or hide their identities. They used untrusted websites to purchase items. For situations like this, people need to know how to protect themselves and how to properly use privacy controls. However, with the issue of public records (such as social security numbers, birth dates, and home addresses), there is no clear solution. The problem with that, along with any information put on the Internet about a person is that it is already potentially in someone’s hands. Someone may already have all the information they need to commit identity theft or fraud. 

 These sections have raised some ethical questions. Is it right that the government does not have to disclose information that is lost or stolen about citizens (p. 86 Baase, 2008)? Is it right that there are extensive public records about ourselves available to whomever desires them(within reason) (p. 93 Baase, 2008)? The answer to these questions seems quite obvious, yet both of those situations still exist. After reading this, I will research any company that I give information to and see how they use it and how safe it is to go with such a company. I also will get to know and understand the privacy options of any website I am currently using.
 
References
Vamosi, Robert. "Protect Your Online Privacy (Without Reading All the Fine Print)." ReviewsLink and News on Tech Products, Software and Downloads. PCWorld, 30 Mar. 2011. Web. 04 Mar. 2012. <http://www.pcworld.com/businesscenter/article/221104/protect_your_online_privacy_without_reading_all_the_fine_print.html>.

No comments:

Post a Comment