HONOR 3374- Final Exam Guide - Comprehensive Notes for the exam ( 45 pages long!)

96 views45 pages

Document Summary

I ve got nothing to hide argument: data mining; analyzing personal data for patterns of suspicious behavior. With this argument, people are okay with being wiretapped or profiled since they haven t done anything wrong, and those who have committed crimes are more likely to be found. Problem with this argument is that everyone wants to hide something, even without any crimes committed. The value of privacy is low because the information is not particularly sensitive, the ones with the most worry about privacy are ones engaged in illegal conduct (and their privacy value is low to non-existent) Privacy in a digital age week 2 part 2. Information processing: storing, analysis and manipulation of data. Insecurity (increasing people"s vulnerability to potential abuse of their information) Exclusion (people"s inability to access and have any say in the way their data is used) Information dissemination: the ways which information is transferred (or threatened to be transferred) to others.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers

Related Documents