1.3+Privacy+and+Anonymity

=1.3 Privacy and Anonymity =
 * Privacy** is the ability of individuals and groups to determine for themselves when, how and to what extent information about themselves is shared with others. At its extreme, privacy becomes **anonymity** when, for instance, a person uses it to conceal his or her true identity in order to cyber-bully someone else. Conversely, excessive **privacy** could also conceal the perpetrators of criminal, terrorist or computer hacking acts from law enforcement agencies.

Source: //Information technology in a global society guide. 2012 onward.//

**LEARNING GOALS**
EVALUATE privacy concerns related to personal data and advancements in technologies. EXPLAIN how encryption technologies work and how they impact privacy. DISCUSS the ethical issues related to encryption.

**LEARNING RESOURCES**
http://itgsopedia.wikispaces.com/1.3+Privacy+and+Anonymity @http://www.itgstextbook.com/privacy-and-anonymity.html1.3

media type="custom" key="28385951" **.**

media type="custom" key="27950865"

media type="custom" key="28385987"

**REQUIRED READING**
Information Technology in a Global Society, Stuart Gray. 1st Edition. © 2012 Stuart Gray. ISBN 9781468023619. This textbook has been developed independently of the International Baccalaureate ® This book was written specifically for the ITGS course, covering technical systems, social impacts and ethical issues, and each area of application.

Digital Planet: Tomorrow’s Technology And You, George and Ben Beekman. 10th Edition. © 2012 Pearson Education. ISBN 9780132091251. This book explains how various technologies work, how they are used to solve problems and extend human capabilities, and how our ever-growing network of digital devices affect our lives, our world, and our future.

Gift of Fire, Sara Baase. 4th Edition. (C) 2013 Pearson Education. ISBN 978013249267-6. Chapter 2: Privacy**.** This book examines the Social, Legal, and Ethical issues related to Computing Technologies.



LEARNING ACTIVITIES
1.3A GUIDED LEARNING ACTIVITIES: HOMEWORK LEARNING ACTIVITIES:
 * On the sticky note provided, IDENTIFY three things about yourself-two that are true and one that is false. Write the items in any order but do NOT write your name on the page or share what you wrote with others.
 * DISCUSS what is meant by privacy in the context of ITGS.
 * DISCUSS what is meant by anonymity in the the context of ITGS.
 * READ A Face Is Exposed for AOL Searcher No. 4417749 | New York Times (2006)
 * <span style="font-family: 'Helvetica Neue',Helvetica,Arial,sans-serif; line-height: 1.5;">READ More Privacy Perils: Facebook Data Is Greater Than The Sum Of Your Likes | Forbes (2013).
 * <span style="color: #383d48; font-family: 'Helvetica Neue',Helvetica,Arial,sans-serif; line-height: 1.5;">Complete Exercises 9-14 and 9-15 on page 214 (ITGS) handwritten on a piece of notebook paper. [8 marks]. Due prior to class Wednesday. Late day passes will not be accepted for this assignment.

1.3B GUIDED LEARNING ACTIVITIES You may work with ONE partner on this project. media type="custom" key="28384499"
 * CONSTRUCT a new Apple vs. FBI Timeline using HSTRY. [4 marks]
 * WATCH the intro to HSTRY Chrome Extension Video
 * Create a HSTRY student account and join our class. The ITGS grade 11 class join code is <span style="color: #28c5f3; font-family: 'Open Sans Semibold','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 32px;">21676. The ITGS grade 12 class join code is <span style="color: #28c5f3; font-family: 'Open Sans Semibold','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 32px;">21479.
 * Add each of the tagged articles from the link below to your timeline. __ @https://groups.diigo.com/group/hhsitgs/content/tag/apple __
 * For each article: STATE the title, date, source, and include an active link.
 * IDENTIFY at least two new developments (critical information) in each article (information that is new or different from what was in previous articles on the timeline). [30 marks].
 * DESCRIBE one social/ethical **concern** related to the IT system in at least two articles. (A1, A2) [4 marks]
 * EXPLAIN the relationship of key stakeholder(s) to the IT system in at least two articles.(B1, B2) [12 marks]
 * DESCRIBE, step-by-step, how iPhone encryption works. Use bullet points (at least 4) and appropriate terminology. (C) [8 marks]
 * EXPLAIN the relationship between iPhone encryption and a social/ethical concern described in Part A.(D) [6 marks]
 * Use Photoshop to design and CONSTRUCT an appropriate banner for your timeline. [4 marks]
 * EVALUATE the impact of the social/ethical issues on key stakeholders. (E) [8 marks]
 * EVALUATE one possible solution that addresses at least one problem identified in Part A. (F) [8 marks]
 * 1.3B Marking Scheme

<span style="color: #333333; font-family: arial,helvetica,sans-serif;">**1.3C** <span style="color: #333333; font-family: arial,helvetica,sans-serif;">GUIDED LEARNING ACTIVITIES Complete the following as directed on the 1.3C Template with ONE partner.

<span style="color: #333333; font-family: arial,helvetica,sans-serif;">2.10 Jury Screening <span style="color: #333333; font-family: arial,helvetica,sans-serif;">In jury trials, attorneys receive the list of people in the jury pool shortly before the jury selection process begins. Some attorneys bring staff members to court to search for information about prospective jurors on social networks. The attorneys use this information in deciding which potential jurors to accept.

EXPLAIN arguments for and against screening potential jurors via their personal social media. CONSTRUCT three take a stand statements that could be used to facilitate class discussions on this topic. Participants in the discussion will evaluate each statement and determine how they feel about each statement by stating one of the following stances: Strongly Agree, Agree, Slightly Agree, Strongly Disagree, Slightly Disagree, or Strongly Disagree.

2.16 Prepaid Cellphones <span style="color: #333333; font-family: arial,helvetica,sans-serif;">Bills introduced in the U.S. Congress (and proposed in other countries) would require that anyone buying a prepaid cellphone must show identification and/or register the cellphone.

<span style="color: #333333; font-family: arial,helvetica,sans-serif;">EXPLAIN arguments for and against passage of such a law. CONSTRUCT three take a stand statements that could be used to facilitate class discussions on this topic. Participants in the discussion will evaluate each statement and determine how they feel about each statement by stating one of the following stances: Strongly Agree, Agree, Slightly Agree, Strongly Disagree, Slightly Disagree, or Strongly Disagree.

2.17 Mobile Location Tracking <span style="color: #333333; font-family: arial,helvetica,sans-serif;">Law enforcement agencies argue that cellphone users have no expectation of privacy about their location. Indeed, many people share their location with hundreds or thousands of friends on social networks.

<span style="color: #333333; font-family: arial,helvetica,sans-serif;">EXPLAIN arguments on each side of the question of whether we should require law enforcement agents to get a search warrant before tracking someone's cellphone. CONSTRUCT three take a stand statements that could be used to facilitate class discussions on this topic. Participants in the discussion will evaluate each statement and determine how they feel about each statement by stating one of the following stances: Strongly Agree, Agree, Slightly Agree, Strongly Disagree, Slightly Disagree, or Strongly Disagree.

2.19 Vehicle Screening The New York City Police Department is developing a system to screen all vehicles entering Manhattan. The plan would include license plate readers, cameras, and radiation detectors.

DISCUSS pros and cons of such a plan. DESCRIBE the features or operational guidelines that you and your partner feel the NYPD should include to protect privacy. CONSTRUCT three take a stand statements that could be used to facilitate class discussions on this topic. Participants in the discussion will evaluate each statement and determine how they feel about each statement by stating one of the following stances: Strongly Agree, Agree, Slightly Agree, Strongly Disagree, Slightly Disagree, or Strongly Disagree.

2.33 Bitcoin Implementations of digital cash can allow secure and anonymous transactions.

Considering the privacy benefits and the potential for use by tax evaders, criminals, and terrorists, do you think fully anonymous digital cash should be legal? EXPLAIN why or why not you believe people have a negative right (in the sense of GOF section 1.4.2) to use anonymous digital cash? CONSTRUCT three take a stand statements that could be used to facilitate class discussions on this topic. Participants in the discussion will evaluate each statement and determine how they feel about each statement by stating one of the following stances: Strongly Agree, Agree, Slightly Agree, Strongly Disagree, Slightly Disagree, or Strongly Disagree.

HOMEWORK READ GOF 2.6 Communications on pages 112-119. Continue working on 1.3C. Due prior to the start of class Monday.

<span style="color: #333333; font-family: arial,helvetica,sans-serif;">Source: A Gift Of Fire, Chapter 2, Privacy. Sarah Baase (C) 1994.

<span style="color: #383d48; font-family: 'Helvetica Neue',Helvetica,Arial,sans-serif;">Finish reading Gift of Fire Chapter 2: Privacy. <span style="color: #383d48; font-family: 'Helvetica Neue',Helvetica,Arial,sans-serif;">Complete review exercises 2.1 through 2.7 from page 119 and Class Discussion Exercises 2.48 and 2.51 from page 124 handwritten on a piece of notebook paper. Label each exercise accordingly and label the top of the paper with your name and 1.3D. [32 marks possible].
 * 1.3D**