CourseLover

(12)

$10/per page/Negotiable

About CourseLover

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Algebra,Applied Sciences See all
Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Engineering,Health & Medical,HR Management,Law,Marketing,Math,Physics,Psychology,Programming,Science Hide all
Teaching Since: May 2017
Last Sign in: 283 Weeks Ago, 1 Day Ago
Questions Answered: 27237
Tutorials Posted: 27372

Education

  • MCS,MBA(IT), Pursuing PHD
    Devry University
    Sep-2004 - Aug-2010

Experience

  • Assistant Financial Analyst
    NatSteel Holdings Pte Ltd
    Aug-2007 - Jul-2017

Category > English Posted 06 Sep 2017 My Price 10.00

Need Help with answering Discussion Questions

Discussion Questions.docx

Discussion Questions

Part 1 ( answer with 2 or more paragraphs)

1.    Review Helen Nissenbaum’s framework of privacyin terms of “contextual integrity.” What are the differences between what she calls “norms ofappropriateness” and “norms of distribution”?Give an example of how either or both normscan be breached in a specific context.

 

2.    Through the use of currently available online toolsand search facilities, ordinary users can easily acquirepersonal information about others. In fact, anyonewho has Internet access can, via a search engine suchas Google, find information about us that we ourselvesmight have had no idea is publicly availablethere. Does this use of search engines threaten theprivacy of ordinary people? Explain.

 

3.    In debates regarding access and control of personal information, it is sometimes argued that an appropriate balance needs to be struck between individuals and organizations: individuals claim that they should be able to control who has access to their information, and organizations, including government and business groups, claim to need that information in order to make appropriate decisions. How can a reasonable resolution be reached that would satisfy both parties?

 

4.    Reexamine the arguments made by the U.S. government and byGoogle regarding the government’s requests for information about users’ search requests made during the summer of 2005. Are the government’s reasons for why it should have access to that information reasonable? Does Google have an obligation to protect the personal information of its users, with respect to disclosing information about their searches? Could this obligation be overridden by certain kinds of national defense interests? If, for example, the government claimed to need the information toprevent a potential terrorist attack, would that havechanged your analysis of the situation? Or does the government have the right, and possibly an obligation to the majority of its citizens, to monitor the searches if doing so could positively affect the outcome of child pornography legislation?

 

Part 2 (answer with 2 or more paragraphs)

 

1.    In your estimation, could self-regulation be effective in protecting data privacy or does it need to be supplement by laws and regulations? Is the European model worth emulation in the United States?

2.    What is your general assessment of cookie and spyware technologies? Should there be some legal limits on how these technologies are used?

3.    Is it morally acceptable for an employer to inspect the outgoing or incoming email of its employees? How would you define the scope of workplace privacy right?

4.    Almost every major commercial website have a privacy policy. Visit one of these sites in order to read and evaluate that that policy. Is the policy clear and comprehensible? Does it afford enough protection for that site’s customer? For example check out one of the following sites:

http://privacy.yahoo.com/privacy/us or http://legal.web.aol.com/policy/aolpol/privpol.html

 

Answers

(12)
Status NEW Posted 06 Sep 2017 06:09 AM My Price 10.00

----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll

Not Rated(0)