100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Overig

Computer Ethics - CP373 ASSIGNMENT 4 (IN CLASS ASSIGNMENT FILLED)

Beoordeling
-
Verkocht
-
Pagina's
7
Geüpload op
30-08-2022
Geschreven in
2021/2022

In class assignment template fully filled out. Assignment 4.

Instelling
Vak









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Studie
Vak

Documentinformatie

Geüpload op
30 augustus 2022
Aantal pagina's
7
Geschreven in
2021/2022
Type
Overig
Persoon
Onbekend

Onderwerpen

Voorbeeld van de inhoud

CP373: Ethics and Professional Practice Qutaiba Albluwi – Fall 2022


A4: Digital Privacy
If you attended both sessions type the following sentence in the white box:
“I certify that I attended both sessions of Module 4”
If you attended only one session type the following sentence:
“I certify that I attended one session of Module 4, which was on <day>”
If you were absent in both sessions, then you cannot submit this report.
I certify that I attended both sessions of Module 4
Notes:
- For each of the following sections, you only need to answer 5 out of the six questions
- If you are absent in one session, you are still responsible to complete the entire sheet before
submission

Privacy Issue I: Location Privacy
[1] What are the three categories of privacy associated with location privacy?
Answering the latter 5.
[2] What potential harms could happen if information about one’s location is made
public to everyone?
If one’s location is made public to everyone, there can be criminal activities performed
that may cause harms such as breaking into one’s house.
[3] What potential harms may arise if ‘location patterns’ of an individual were not
protected under privacy laws?
If location patterns of an individual were not protected under privacy laws, potential
harms such as an insurance company can increase your health insurance premium
knowing that you do not go to the gym/more prone to not being as healthy as someone
else that does.
[4] Similar to tracking chips installed on birds for research purposes, it has been
proposed to use the chips on young children to track them when lost. Excluding health
concerns, are you ready to install such chips into your children? Why?
In regards to children, I think that these chips could be extremely helpful in order to
prevent any harms such as child trafficking and kidnapping from occurring. Although,
the idea that a chip is inside of a human does not seem very ethical or morally okay. In
contrast, someone could also find a way to hack into the network and access the
location of these children with the chip inside them.

1

, CP373: Ethics and Professional Practice Qutaiba Albluwi – Fall 2022

[5] Do you think it is reasonable for a company to ask its sales persons to keep a
tracking device that shows their locations? How is this different than tracking devices by
taxi companies to track its taxi drivers?
I think that it is somewhat reasonable. This is because tracking devices by tax
companies are different in certain scenarios, for example: cars are expensive and
companies might want to be able to track it.
[6] Some auto-insurance companies, promise its clients of discounts if they agree to
install an app that tracks their speeds. Analyze this scenario from the perspective of
location privacy
Upon analyzing this scenario, I think that something like this would be okay since it is
something that has gained consent from the other party and both of them are able to
benefit from this.


Privacy Issue II: Privacy in the Clouds
[1] What motivates companies/organizations to use cloud services? List three
advantages
1) Things are more accessible for people at anytime, anywhere
2) Expenses are saved
3) Data stays backed up
[2] List two security concerns associated with cloud computing services
1) People can access it from anywhere, anytime, without authorization
2) If cloud servers are hacked into, data can be accessible and visible to anyone/data
is violated
[3] Some argue that cloud computing services, by design, is too risky in terms of privacy.
Explain this perspective.
Cloud computing services, by design are too risky in terms of privacy because it stores
data in various different locations, thus being even more likely to be hacked. If one does
hack into the server, they could have access to data they are not authorized to and use
it as they intend.
[4] Most cloud providers store data in multiple countries. Explain how this imposes legal
concerns. What other legal issues are caused by cloud computing.
It imposes concerns in terms of how the government handles the data. How do we
resolve conflicts if there are different rules? Jurisdiction = where the law is applicable.
2
$8.59
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
dg22
1.0
(1)

Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
dg22 Wilfrid Laurier University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
6
Lid sinds
3 jaar
Aantal volgers
2
Documenten
31
Laatst verkocht
2 weken geleden

1.0

1 beoordelingen

5
0
4
0
3
0
2
0
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen