HONOR 3374- Final Exam Guide - Comprehensive Notes for the exam ( 45 pages long!)
Document Summary
I ve got nothing to hide argument: data mining; analyzing personal data for patterns of suspicious behavior. With this argument, people are okay with being wiretapped or profiled since they haven t done anything wrong, and those who have committed crimes are more likely to be found. Problem with this argument is that everyone wants to hide something, even without any crimes committed. The value of privacy is low because the information is not particularly sensitive, the ones with the most worry about privacy are ones engaged in illegal conduct (and their privacy value is low to non-existent) Privacy in a digital age week 2 part 2. Information processing: storing, analysis and manipulation of data. Insecurity (increasing people"s vulnerability to potential abuse of their information) Exclusion (people"s inability to access and have any say in the way their data is used) Information dissemination: the ways which information is transferred (or threatened to be transferred) to others.