KEEP THIS TO 1-3 – PAGES LONG (EXCLUDING REFERENCE PAGE)
Author: Sara Baase
Date of Publication: 2008
Book: A Gift of Fire
Sections read: Chapter 2 (2.1-2.2, 2.3.2-2.3.6, 2.4.2, 2.5.3-2.5.4)
1. (Knowledge)Tell three interesting elements of this chapter:
a. The three aspects of privacy involve freedom from intrusion, control of information about oneself, and freedom from surveillance; all 3 of these combined can make privacy hard to fully sustain (Baase, 45)
b. CODIS, a database tracking DNA in crimes, has become much more broad; for example, something that typically only involved the worst of crimes now also records people who simply commit a misdemeanor (Baase, 60)
c. Privacy is something the government constantly dismisses; in 2002 the NSA scanned 7,000 peoples’ international calls and emails (Baase, 123)
2. (Comprehension) Summarize what is being discussed within this chapter?
Privacy is an important factor as technology gets more sophisticated. However, people also give it up for convenience and personal service (Baase, 45). Personal info can be swapped – sometimes without consent – through intentional uses of it (for law enforcement), unauthorized use by “insiders”, theft of info, or even through negligence of one’s own actions (Baase, 46). Secondary use is when you use info at hand for a different purpose than otherwise specified (ie: checking a buyer’s transaction history to see if he had bought anything suspicious recently), and is considered an infringement of privacy (Baase, 51). The Privacy Act of 1974 tried to make things easier, though there are many loopholes that surround it (Baase, 58). Video surveillance is increasing, as in Britain alone there are known to be about 4 million cameras outside watching everyone go about their business (Baase, 73). However, while some may see this as an invasion of privacy, it also helped the government catch known bombers in the area (Baase, 74). Location tracking and GPS services are also becoming increasingly popular, especially so advertisers know how to reach the consumer, and also pinpoint what exactly they could want (Baase, 83). While sites will do their best to protect their users, hackers can use spyware to steal information anyways, for example, Time Warner’s files on 600,000 of its employees (Baase, 86-87). Regarding transactions, they are something done by two parties, and both parties have a role in deciding how private the transaction can be, and can negotiate accordingly (Baase, 109). Regulations can strengthen privacy, but are very costly (Baase, 112). The free-market and consumer-protection viewpoints show insight into privacy and technology; while the first gives the consumer more responsibility and the option to opt-into privacy statements with the other party, the latter views privacy as a much needed right and strongly believes consumers should simply get as much privacy as possible (Baase, 114-115). The government can also easily be put in the hot seat, as the NSA has had many issues dealing with security and privacy, from the 1920’s on (Baase, 123-124). The government also gets paranoid during wartime, suspecting things even as simple as flower arrangements to be attempts to spy or relay personal info (Baase, 126). Also, encryption brings an attempt to make info much more secure and private to the internet, but at the same time this can help lawbreakers stay under the radar (ie: a pedophile finding ways to encrypt the child pornography on their drive) (Baase, 129). Privacy is a very touchy subject with technology and the internet, as it is hard to define, and even harder to protect.
3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – BE SPECIFIC AND EXPLAIN?
A specific example that can be used and applied to the text is the hacking of the database of the US Pentagon. A couple months back, the US Pentagon was hacked into, putting over 24,000 sensitive files in danger. It was believed that there was a country involved, though no further comments were made. This alone proved that the US government databases themselves can be hacked, and has put officials in a new state of worry, as they now know that they are very vulnerable. More about the Pentagon fiasco can be read here.
4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.
An idea, while tried before, would be to try and make an updated Privacy Act for each year that passes. Given that technology is something that is constantly changing and laws need to reflect such (as stated in Baase’s first chapter), this act should routinely be updated with the addition of new technology so that past loopholes may be closed. Hackers will still nevertheless be able to get into networks, but this will give the internet users more security and more privacy from advertising agents and the government – also, if said hackers are caught, strict punishments may be put in the bill so that they cannot commit the crime again. This will also prove an example to other hackers who see others prosecuted at a heavy level.
5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?
I agree with what is being said when it is stated that people need to be careful of what they post on the internet – even though some privacy issues can’t be helped, it is important to make sure we know what we are putting online so that we don’t help contribute to the problem (Baase, 91). One other point the author makes that is an interesting one is that our generation is no longer used to privacy and acts accordingly (92). This is increasingly noticeable in the sense that major areas have cameras around everyday street corners and people don’t mind them (Baase, 72). People also get advertised to through location tracking services, which while reducing their privacy, helps them get what they are interested in buying, which helps to make them more comfortable with their privacy being obstructed (Baase, 83). I have concluded that it never hurts to be a bit secretive; you don’t have to post your phone number, address, etcetera on Facebook. It is important to monitor what is on your record on the internet.
6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?
I believe this topic is very relevant in today’s society, as internet shopping, searching, and blogging are very popular in this day and age, and they are all ways for someone to learn more about you if they were to look up this information about you. I am viewing the topic in the way that I am, as at my job a large topic brought up by customers is identity theft, how often it’s happened to them and how it is becoming increasingly popular – my job also uses a “suggested sell” model which helps customers buy things related to what they have bought previously, which is touched on largely in the chapter.
References
International Business Times. "Pentagon Seeks Cyber Security Strategy After Massive Hack of 24,000 Files - International Business Times." International Business Times. 14 July 2011. Web. 25 Sept. 2011.
Baase, Sara. "Chapter 2: Privacy." A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Upper Saddle River, NJ: Prentice Hall, 2008. 45-129. Print.