Privacy and Security and Facial Recognition Software Questions

User Generated

fjvsgcnpvsvt

Computer Science

Description

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly.

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search?

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent.

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work?

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion - Are advancing algorithms taking our free will?

9. Should Facebook be regulated, at least as far as it's privacy and data policies?

10. How many public cameras is too many?

Unformatted Attachment Preview

Chapter 3: Freedom of Speech Based on slides prepared by Cyndi Chie, Sarah Frye and Sharon Gray. Fifth edition updated by Timothy Henry Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved ▪ ▪ ▪ ▪ ▪ Communication Paradigms Controlling Speech Posting, Selling, and Leaking Sensitive Material Anonymity The Global Net: Censorship and Political Freedom ▪ Net Neutrality Regulations or the Market? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Regulating communications media ▪ First Amendment protection and government regulation ▪ ▪ ▪ Print media (newspapers, magazines, books) Broadcast (television, radio) Common carries (telephones, postal system) Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Telecommunication Act of 1996 ▪ Changed regulatory structure and removed artificial legal divisions of service areas and restrictions on services that telephone companies can provide. ▪ No provider or user of interactive computer services shall be treated as a publisher of any information provided by another informationcontent provider. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Communications Decency Act of 1996 ▪ First major Internet censorship law ▪ Main parts ruled unconstitutional Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Free-speech Principles ▪ Written for offensive and/or controversial speech and ideas ▪ Covers spoken and written words, pictures, art, and other forms of expression of ideas and opinions ▪ Restriction on the power of government, not individuals or private businesses Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Free-speech Principles ▪ Supreme Court principles and guidelines ▪ Advocating illegal acts is (usually) legal. ▪ Anonymous speech is protected. ▪ Some restrictions are allowed on advertising. ▪ Libel and direct, specific threats are not protected. ▪ Inciting violence is illegal. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Offensive speech: What is it? What is illegal? ▪ Answers depend on who you are. ▪ Most efforts to censor the Internet focus on pornographic and other sexually explicit material Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved What was already illegal? ▪ Obscenity ▪ Depicts a sexual act against state law ▪ Depicts these acts in a patently offensive manner that appeals to prurient interest as judged by a reasonable person using community standards ▪ Lacks literary, artistic, social, political or scientific value Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Straining old legal standards ▪ The definition of “community” ▪ The definition of “distribution” Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Freedom of speech guidelines ▪ Distinguish speech from action. Advocating illegal acts is (usually) legal. ▪ Laws must not chill expression of legal speech. ▪ Do not reduce adults to reading only what is fit for children. ▪ Solve speech problems by least restrictive means. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Internet Censorship Laws & Alternatives ▪ Communications Decency Act of 1996 (CDA) ▪ ▪ Attempted to avoid conflict with First Amendment by focusing on children Made it a crime to make available to anyone under 18 any obscene or indecent communication ▪ Found to be unconstitutional ▪ ▪ ▪ The worst material threatening children was already illegal It was too vague and broad It did not use the least restrictive means of accomplishing the goal of protecting children Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Internet Censorship Laws & Alternatives ▪ Child Online Protection Act of 1998 (COPA) ▪ ▪ More limited than CDA Federal crime for commercial Web sites to make available to minors material “harmful to minors” as judged by community standards ▪ Found to be unconstitutional ▪ ▪ ▪ It was too broad It would restrict the entire country to the standards of the most conservative community It would have a chilling effect Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Internet Censorship Laws & Alternatives ▪ Children's Internet Protection Act of 2000 (CIPA) ▪ Requires schools and libraries that participate in certain federal programs to install filtering software ▪ Upheld in court ▪ ▪ Does not violate First Amendment since it does not require the use of filters, impose jail or fines It sets a condition for receipt of certain federal funds Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Video Games ▪ A California law banned sale or rental of violent video games to minors. ▪ In 2011, the Supreme Court of California ruled it violated the First Amendment. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Alternatives to censorship ▪ Filters ▪ ▪ ▪ ▪ ▪ Blocks sites with specific words, phrases or images Parental control for sex and violence Updated frequently but may still screen out too much or too little Not possible to eliminate all errors What should be blocked? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Alternatives to censorship ▪ Policies ▪ ▪ Commercial services, online communities, and social networking sites develop policies to protect members. Video game industry developed rating system that provides an indication for parents about the amount of sex, profanity, and violence in a game. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Discussion Question ▪ Why is ‘least restrictive means’ important? ▪ Do you consider the Internet an appropriate tool for young children? Why or why not? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Child Pornography ▪ Includes pictures or videos of actual minors (children under 18) engaged in sexually explicit conduct. ▪ Production is illegal primarily because of abuse of the actual children, not because of the impact of the content on a viewer. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Child Pornography ▪ Congress extended the law against child pornography to include “virtual” child pornography. ▪ The Supreme Court ruled the law violated the First Amendment. ▪ The Court accepted a later law providing harsh penalties for certain categories of computergenerated and cartoon-type images. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Sexting ▪ Sending sexually suggestive or explicit text or photos, usually by cellphone or social media ▪ Can meet the definition of child pornography if subject is under 18 Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Spam ▪ What’s the problem? ▪ ▪ ▪ Loosely described as unsolicited bulk email Mostly commercial advertisement Angers people because of content and the way it’s sent ▪ Free speech issues ▪ ▪ Spam imposes a cost on recipients Spam filters do not violate free speech (free speech does not require anyone to listen) Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Spam ▪ Anti-spam Laws ▪ ▪ ▪ Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM Act) Targets commercial spam Criticized for not banning all spam, legitimized commercial spam Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved “Free speech is enhanced by civility.” -Tim O’Reilly Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved ▪ Policies of large companies ▪ A Web site with risks Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved ▪ Leaks ▪ ▪ ▪ Type of material Value to society Risks to society and individuals Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved ▪ Leaks ▪ Examples ▪ WikiLeaks ▪ Climategate Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved ▪ Leaks ▪ ▪ Potentially dangerous leaks Releasing a huge mass of documents Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Discussion Question ▪ Does the value of informing the public of controversial and sensitive information outweigh the dangers and risks? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved ▪ Leaks ▪ Responsibilities of operators of Web sites for leaks Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved ▪ Common Sense and Federalist Papers Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved ▪ Positive uses of anonymity ▪ Protect political speech ▪ Protect against retaliation and embarrassment ▪ Anonymizing services ▪ used by individuals, businesses, law enforcement agencies, and government intelligence services Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved ▪ Negative uses of anonymity ▪ protects criminal and antisocial activities ▪ aids fraud, harassment, extortion, distribution of child pornography, theft, and copyright infringement ▪ masks illegal surveillance by government agencies Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved ▪ Is anonymity protected? ▪ Many legal issues about anonymity are similar to those discussed in Chapter 2. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Discussion Questions ▪ Where (if anywhere) is anonymity appropriate on the Internet? ▪ What are some kinds of Web sites that should prohibit anonymity? ▪ Where (if anywhere) should laws prohibit anonymity on the Internet? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Tools for communication, tools for oppression ▪ Authoritarian governments have impeded flow of information and opinion throughout history. ▪ The vibrant communication of the Internet threatens governments in countries that lack political and cultural freedom. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Tools for communication, tools for oppression ▪ Attempts to limit the flow of information on the Internet similar to earlier attempts to place limits on other communications media ▪ Some countries own the Internet backbone within their countries and block specific sites and content at the border ▪ Some countries ban all or certain types of access to the Internet Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Tools for communication, tools for oppression ▪ Avoiding censorship: the global nature of the Net allows restrictions (or barriers) in one country to be circumvented by using networks in other, less restrictive countries. ▪ Creating censorship: the global nature of the Net makes it easier for one nation to impose restrictive standards on others. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved “The office of communications is ordered to find ways to ensure that the use of the Internet becomes impossible. The Ministry for the Promotion of Virtue and Prevention of Vice is obliged to monitor the order and punish violators.” - Excerpt from Taliban edict banning Internet use in Afghanistan (2001) Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Discussion Question ▪ Will the Internet and related communication technologies be tools for increasing political freedom, or will they give more power to governments to spy on, control, and restrict their people? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Aiding foreign censors and repressive regimes ▪ Yahoo and French censorship ▪ Yahoo, eBay and others make decisions to comply with foreign laws for business reasons ▪ Skype and Chinese control ▪ Chinese government requires modified version of Skype Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Aiding foreign censors and repressive regimes ▪ Companies who do business in countries that control Internet access must comply with the local laws ▪ Google argued that some access is better than no access Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Discussion Questions ▪ When U.S. or other non-Chinese companies set up branches in China and comply with restrictive laws, should we view them as providing more access to information in China than would otherwise exist, albeit not as much as is technically possible? ▪ Should we view them as partners in the Chinese government’s ethically unacceptable restriction on debate and access to information by its citizens? ▪ Should we view them as appropriately respecting the culture and laws of the host country? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Discussion Questions ▪ What impact does the global net have on free speech? ▪ Does censorship in other countries have an impact on free speech in the U.S.? ▪ How does free speech in ‘free countries’ impact more restrictive countries? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Selling surveillance tools ▪ Repressive governments intercept citizens’ communications and filter Internet content. ▪ Companies in Western democracies sell them the sophisticated tools to do so. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Shutting down communications in free countries ▪ Public safety ▪ In the U.S., the Supreme Court would probably declare unconstitutional a law that authorized a government agency to order a private communications service to shut down. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved ▪ Net Neutrality ▪ Refers to a variety of proposals for restrictions on how telephone and cable companies interact with their broadband customers and set fees for services. Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved ▪ Net Neutrality ▪ Argue for equal treatment of all customers ▪ Market ▪ Flexibility and market incentives will benefit customers Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved Discussion Questions ▪ Should companies be permitted to exclude or give special treatment to content transmitted based on the content itself or on the company that provides it? ▪ Should companies be permitted to provide different levels of speed at different prices? Copyright © 2018, 2013, 2008 Pearson Education, Inc. All Rights Reserved
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: PRIVACY AND SECURITY

1

Privacy and Security
Name
Institution
Date

PRIVACY AND SECURITY

2

Q1. Privacy
Ans. Privacy is the feeling of safety at any given location. It's the freedom of expression,
either online or offline. Freedom of speech only applies if all legal and ethical policies are
followed. Privacy is the secrecy and confidentiality of sensitive personal information. Generally,
privacy is the right of a person or group to hide or data about them, and express themselves
selectively (Jain, Gyanchandani & Khare, 2019).
Q2. Risks raised by facial recognition software.
Ans. There are many small to significant risks that can be caused by facial recognition
software. As systems recognize faces of individuals without consent, there's the possibility of
causing embarrassment when the faces appear in the public domain. It can lead to cases of
stalking when there is improper use of this software. The other risk is that it can cause serious
identity fraud. It can also lead to predatory marketing, where companies can exploit vulnerable
customers and use them for marketing. Recognition software leads to disadvantages when
applying for jobs because recruiters can use facial recognition to find out more about a person.
More than the individual is willing to expose.
Q3. Information about me with a google search
Ans. A search on google can provide a lot about a person. It all depends on how private
or public the user has made his/her information. It also depends on the registered online and
offline accounts. A considerable amount of my necessary information can be found online with a
simple google search. My name, social media accounts, and other online registered accounts and
services ca...

Similar Content

Related Tags