Question: It is for my Societal Issues in Computing class. I need a helping draft for this assigned problem. The problem is posted in the picture

It is for my Societal Issues in Computing class. I need a helping draft for this assigned problem. The problem is posted in the picture and sources for the question are given in there as well.
Thank you,
It is for my Societal Issues in Computing class. I need a
The images seems blurred. So here are in-text sources...
A summary of risks
The examples we described illustrate numerous points about personal data. We summarize here:
1) Anything we do in cyberspace is recorded, at least briefly, and linked to our computer or phone, and possibly our name.
2) With the huge amount of storage space available, companies, organizations, and governments save huge amounts of data that no one would have imagined saving in the recent past.
3) People often are not aware of the collection of information about them and their activities.
4) Software is extremely complex. Sometimes businesses, organizations, and website managers do not even know what the software they use collects and stores.
5) Leaks happen. The existence of the data presents a risk.
6) A collection of many small items of information can give a fairly detailed picture of a person's life.
7) Direct association with a person's name is not essential for compromising privacy. Re-identification has become much easier due to the quantity of personal information stored and the power of data search and analysis tools.
8) If information is on a public website, people other than those for whom it was intended will find it. It is available to everyone.
9) Once information goes on the Internet or into a database, it seems to last forever. People (and automated software) quickly make and distribute copies. It is almost impossible to remove released information from circulation.
10) It is extremely likely that data collected for one purpose (such as making a phone call or responding to a search query) will find other uses (such as business planning, tracking, marketing, or criminal investigations).
11) The government sometimes requests or demands sensitive personal data held by businesses and organizations.
12) We often cannot directly protect information about ourselves. We depend on the businesses and organizations that manage it to protect it from thieves, accidental, collection, leaks, and government prying.
Sorry, for not being clear enough. Pick any of those three points to elaborate.

2.10) Jury Trials: (In at least 50 words) Which of the points at the end of Section 2.1.2 does this use of personal information illustrate? A summary of risks The samples we described illustrate numerous points about personal data. We summarie Anything we do in cyberspace is moorded, at least briefly and ked to our computer or phone, and posibly ourname . With the huge amount of space will companies, organizations, and pements save huge amounts of data that no one would have imagined saving in the recent post People of not aware of the collection of information about them and their activities Software is extremely complex. Sometimes business, organizations, and website managers do not even know what the wore they use collects and so Leaks happen. The existence of the data penes a risk A collection of many small items of information can give a fairly detailed picture of a perlite Direct i on with a name is not ential for compromising privacy Re-identification has become much easier due to the quantity of personal infor mation and and the power of data warch and analysis tool If information is on a public website, people other than those for whom it was intended will find it. It is available to everyone. Once information goes on the Internet or into a database, it seems to last forever People (and automated software) quickly make and distribute copies. It is almost impossible to remove released information from circulation It is extremely likely that data collected for one purpose (such as making a phone call or responding to a scarch query) will find other uses (such as business planning, tracking, marketing, or criminal investigations) The government sometimes requests or demands sensitive personal data held by businesses and organizations. We often cannot directly protect information about ourselves. We depend on the businesses and organizations that manage it to protect it from thieves, accidental collection, leaks, and government prying

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!