The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | May 2017 |
| Last Sign in: | 283 Weeks Ago, 1 Day Ago |
| Questions Answered: | 27237 |
| Tutorials Posted: | 27372 |
MCS,MBA(IT), Pursuing PHD
Devry University
Sep-2004 - Aug-2010
Assistant Financial Analyst
NatSteel Holdings Pte Ltd
Aug-2007 - Jul-2017
Part 1 ( answer with 2 or more paragraphs)
1. Review Helen Nissenbaum’s framework of privacyin terms of “contextual integrity.” What are the differences between what she calls “norms ofappropriateness” and “norms of distribution”?Give an example of how either or both normscan be breached in a specific context.
2. Through the use of currently available online toolsand search facilities, ordinary users can easily acquirepersonal information about others. In fact, anyonewho has Internet access can, via a search engine suchas Google, find information about us that we ourselvesmight have had no idea is publicly availablethere. Does this use of search engines threaten theprivacy of ordinary people? Explain.
3. In debates regarding access and control of personal information, it is sometimes argued that an appropriate balance needs to be struck between individuals and organizations: individuals claim that they should be able to control who has access to their information, and organizations, including government and business groups, claim to need that information in order to make appropriate decisions. How can a reasonable resolution be reached that would satisfy both parties?
4. Reexamine the arguments made by the U.S. government and byGoogle regarding the government’s requests for information about users’ search requests made during the summer of 2005. Are the government’s reasons for why it should have access to that information reasonable? Does Google have an obligation to protect the personal information of its users, with respect to disclosing information about their searches? Could this obligation be overridden by certain kinds of national defense interests? If, for example, the government claimed to need the information toprevent a potential terrorist attack, would that havechanged your analysis of the situation? Or does the government have the right, and possibly an obligation to the majority of its citizens, to monitor the searches if doing so could positively affect the outcome of child pornography legislation?
Part 2 (answer with 2 or more paragraphs)
1. In your estimation, could self-regulation be effective in protecting data privacy or does it need to be supplement by laws and regulations? Is the European model worth emulation in the United States?
2. What is your general assessment of cookie and spyware technologies? Should there be some legal limits on how these technologies are used?
3. Is it morally acceptable for an employer to inspect the outgoing or incoming email of its employees? How would you define the scope of workplace privacy right?
4. Almost every major commercial website have a privacy policy. Visit one of these sites in order to read and evaluate that that policy. Is the policy clear and comprehensible? Does it afford enough protection for that site’s customer? For example check out one of the following sites:
http://privacy.yahoo.com/privacy/us or http://legal.web.aol.com/policy/aolpol/privpol.html
----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll