Question: It is for my Societal Issues in Computing class. I need a helping draft for this assigned problem. The problem is posted in the picture
2.10) Jury Trials: (In at least 50 words) Which of the points at the end of Section 2.1.2 does this use of personal information illustrate? A summary of risks The samples we described illustrate numerous points about personal data. We summarie Anything we do in cyberspace is moorded, at least briefly and ked to our computer or phone, and posibly ourname . With the huge amount of space will companies, organizations, and pements save huge amounts of data that no one would have imagined saving in the recent post People of not aware of the collection of information about them and their activities Software is extremely complex. Sometimes business, organizations, and website managers do not even know what the wore they use collects and so Leaks happen. The existence of the data penes a risk A collection of many small items of information can give a fairly detailed picture of a perlite Direct i on with a name is not ential for compromising privacy Re-identification has become much easier due to the quantity of personal infor mation and and the power of data warch and analysis tool If information is on a public website, people other than those for whom it was intended will find it. It is available to everyone. Once information goes on the Internet or into a database, it seems to last forever People (and automated software) quickly make and distribute copies. It is almost impossible to remove released information from circulation It is extremely likely that data collected for one purpose (such as making a phone call or responding to a scarch query) will find other uses (such as business planning, tracking, marketing, or criminal investigations) The government sometimes requests or demands sensitive personal data held by businesses and organizations. We often cannot directly protect information about ourselves. We depend on the businesses and organizations that manage it to protect it from thieves, accidental collection, leaks, and government prying
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
