100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Otro

Computer Ethics - CP373 ASSIGNMENT 4 (IN CLASS ASSIGNMENT FILLED)

Puntuación
-
Vendido
-
Páginas
7
Subido en
30-08-2022
Escrito en
2021/2022

In class assignment template fully filled out. Assignment 4.

Institución
Grado

Vista previa del contenido

CP373: Ethics and Professional Practice Qutaiba Albluwi – Fall 2022


A4: Digital Privacy
If you attended both sessions type the following sentence in the white box:
“I certify that I attended both sessions of Module 4”
If you attended only one session type the following sentence:
“I certify that I attended one session of Module 4, which was on <day>”
If you were absent in both sessions, then you cannot submit this report.
I certify that I attended both sessions of Module 4
Notes:
- For each of the following sections, you only need to answer 5 out of the six questions
- If you are absent in one session, you are still responsible to complete the entire sheet before
submission

Privacy Issue I: Location Privacy
[1] What are the three categories of privacy associated with location privacy?
Answering the latter 5.
[2] What potential harms could happen if information about one’s location is made
public to everyone?
If one’s location is made public to everyone, there can be criminal activities performed
that may cause harms such as breaking into one’s house.
[3] What potential harms may arise if ‘location patterns’ of an individual were not
protected under privacy laws?
If location patterns of an individual were not protected under privacy laws, potential
harms such as an insurance company can increase your health insurance premium
knowing that you do not go to the gym/more prone to not being as healthy as someone
else that does.
[4] Similar to tracking chips installed on birds for research purposes, it has been
proposed to use the chips on young children to track them when lost. Excluding health
concerns, are you ready to install such chips into your children? Why?
In regards to children, I think that these chips could be extremely helpful in order to
prevent any harms such as child trafficking and kidnapping from occurring. Although,
the idea that a chip is inside of a human does not seem very ethical or morally okay. In
contrast, someone could also find a way to hack into the network and access the
location of these children with the chip inside them.

1

, CP373: Ethics and Professional Practice Qutaiba Albluwi – Fall 2022

[5] Do you think it is reasonable for a company to ask its sales persons to keep a
tracking device that shows their locations? How is this different than tracking devices by
taxi companies to track its taxi drivers?
I think that it is somewhat reasonable. This is because tracking devices by tax
companies are different in certain scenarios, for example: cars are expensive and
companies might want to be able to track it.
[6] Some auto-insurance companies, promise its clients of discounts if they agree to
install an app that tracks their speeds. Analyze this scenario from the perspective of
location privacy
Upon analyzing this scenario, I think that something like this would be okay since it is
something that has gained consent from the other party and both of them are able to
benefit from this.


Privacy Issue II: Privacy in the Clouds
[1] What motivates companies/organizations to use cloud services? List three
advantages
1) Things are more accessible for people at anytime, anywhere
2) Expenses are saved
3) Data stays backed up
[2] List two security concerns associated with cloud computing services
1) People can access it from anywhere, anytime, without authorization
2) If cloud servers are hacked into, data can be accessible and visible to anyone/data
is violated
[3] Some argue that cloud computing services, by design, is too risky in terms of privacy.
Explain this perspective.
Cloud computing services, by design are too risky in terms of privacy because it stores
data in various different locations, thus being even more likely to be hacked. If one does
hack into the server, they could have access to data they are not authorized to and use
it as they intend.
[4] Most cloud providers store data in multiple countries. Explain how this imposes legal
concerns. What other legal issues are caused by cloud computing.
It imposes concerns in terms of how the government handles the data. How do we
resolve conflicts if there are different rules? Jurisdiction = where the law is applicable.
2

Escuela, estudio y materia

Institución
Estudio
Grado

Información del documento

Subido en
30 de agosto de 2022
Número de páginas
7
Escrito en
2021/2022
Tipo
OTRO
Personaje
Desconocido

Temas

$9.09
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
dg22
1.0
(1)

Documento también disponible en un lote

Conoce al vendedor

Seller avatar
dg22 Wilfrid Laurier University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
6
Miembro desde
3 año
Número de seguidores
2
Documentos
31
Última venta
3 meses hace

1.0

1 reseñas

5
0
4
0
3
0
2
0
1
1

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes