1.3 Privacy and Anonymity

Source: https://pixabay.com/static/uploads/photo/2014/10/31/15/21/privacy-policy-510728_960_720.jpg
Source: https://pixabay.com/static/uploads/photo/2014/10/31/15/21/privacy-policy-510728_960_720.jpg

Privacy is the ability of individuals and groups to determine for themselves when, how and to what extent information about themselves is shared with others. At its extreme, privacy becomes anonymity when, for instance, a person uses it to conceal his or her true identity in order to cyber-bully someone else. Conversely, excessive privacy could also conceal the perpetrators of criminal, terrorist or computer hacking acts from law enforcement agencies.

Source: Information technology in a global society guide. 2012 onward.

LEARNING GOALS

EVALUATE privacy concerns related to personal data and advancements in technologies.
EXPLAIN how encryption technologies work and how they impact privacy.
DISCUSS the ethical issues related to encryption.

LEARNING RESOURCES

http://itgsopedia.wikispaces.com/1.3+Privacy+and+Anonymity
http://www.itgstextbook.com/privacy-and-anonymity.html1.3

.




REQUIRED READING

Information Technology in a Global Society, Stuart Gray. 1st Edition. © 2012 Stuart Gray. ISBN 9781468023619. This textbook has been developed independently of the International Baccalaureate ® This book was written specifically for the ITGS course, covering technical systems, social impacts and ethical issues, and each area of application.

Digital Planet: Tomorrow’s Technology And You, George and Ben Beekman. 10th Edition. © 2012 Pearson Education. ISBN 9780132091251.
This book explains how various technologies work, how they are used to solve problems and extend human capabilities, and how our ever-growing network of digital devices affect our lives, our world, and our future.

Gift of Fire, Sara Baase. 4th Edition. (C) 2013 Pearson Education. ISBN 978013249267-6.
Chapter 2: Privacy. This book examines the Social, Legal, and Ethical issues related to Computing Technologies.

Source: http://cdn.playbuzz.com/cdn/16bb5e45-03e9-433c-8f85-befc39203662/f8326b98-7523-418b-8807-15cae9421922.jpg
Source: http://cdn.playbuzz.com/cdn/16bb5e45-03e9-433c-8f85-befc39203662/f8326b98-7523-418b-8807-15cae9421922.jpg

LEARNING ACTIVITIES

1.3A
GUIDED LEARNING ACTIVITIES:
HOMEWORK LEARNING ACTIVITIES:
  • Complete Exercises 9-14 and 9-15 on page 214 (ITGS) handwritten on a piece of notebook paper. [8 marks]. Due prior to class Wednesday. Late day passes will not be accepted for this assignment.

1.3B
GUIDED LEARNING ACTIVITIES
You may work with ONE partner on this project.
  • CONSTRUCT a new Apple vs. FBI Timeline using HSTRY. [4 marks]
  • WATCH the intro to HSTRY Chrome Extension Video

  • Create a HSTRY student account and join our class. The ITGS grade 11 class join code is 21676. The ITGS grade 12 class join code is 21479.
  • Add each of the tagged articles from the link below to your timeline. https://groups.diigo.com/group/hhsitgs/content/tag/apple
  • For each article: STATE the title, date, source, and include an active link.
  • IDENTIFY at least two new developments (critical information) in each article (information that is new or different from what was in previous articles on the timeline). [30 marks].
  • DESCRIBE one social/ethical concern related to the IT system in at least two articles. (A1, A2) [4 marks]
  • EXPLAIN the relationship of key stakeholder(s) to the IT system in at least two articles.(B1, B2) [12 marks]
  • DESCRIBE, step-by-step, how iPhone encryption works. Use bullet points (at least 4) and appropriate terminology. (C) [8 marks]
  • EXPLAIN the relationship between iPhone encryption and a social/ethical concern described in Part A.(D) [6 marks]
  • Use Photoshop to design and CONSTRUCT an appropriate banner for your timeline. [4 marks]
  • EVALUATE the impact of the social/ethical issues on key stakeholders. (E) [8 marks]
  • EVALUATE one possible solution that addresses at least one problem identified in Part A. (F) [8 marks]
  • 1.3B Marking Scheme



1.3C
GUIDED LEARNING ACTIVITIES
Complete the following as directed on the 1.3C Template with ONE partner.

2.10 Jury Screening
In jury trials, attorneys receive the list of people in the jury pool shortly before the jury selection process begins. Some attorneys bring staff members to court to search for information about prospective jurors on social networks. The attorneys use this information in deciding which potential jurors to accept.

EXPLAIN arguments for and against screening potential jurors via their personal social media.
CONSTRUCT three take a stand statements that could be used to facilitate class discussions on this topic. Participants in the discussion will evaluate each statement and determine how they feel about each statement by stating one of the following stances: Strongly Agree, Agree, Slightly Agree, Strongly Disagree, Slightly Disagree, or Strongly Disagree.

2.16 Prepaid Cellphones
Bills introduced in the U.S. Congress (and proposed in other countries) would require that anyone buying a prepaid cellphone must show identification and/or register the cellphone.

EXPLAIN arguments for and against passage of such a law.
CONSTRUCT three take a stand statements that could be used to facilitate class discussions on this topic. Participants in the discussion will evaluate each statement and determine how they feel about each statement by stating one of the following stances: Strongly Agree, Agree, Slightly Agree, Strongly Disagree, Slightly Disagree, or Strongly Disagree.

2.17 Mobile Location Tracking
Law enforcement agencies argue that cellphone users have no expectation of privacy about their location. Indeed, many people share their location with hundreds or thousands of friends on social networks.

EXPLAIN arguments on each side of the question of whether we should require law enforcement agents to get a search warrant before tracking someone's cellphone.
CONSTRUCT three take a stand statements that could be used to facilitate class discussions on this topic. Participants in the discussion will evaluate each statement and determine how they feel about each statement by stating one of the following stances: Strongly Agree, Agree, Slightly Agree, Strongly Disagree, Slightly Disagree, or Strongly Disagree.

2.19 Vehicle Screening
The New York City Police Department is developing a system to screen all vehicles entering Manhattan. The plan would include license plate readers, cameras, and radiation detectors.

DISCUSS pros and cons of such a plan.
DESCRIBE the features or operational guidelines that you and your partner feel the NYPD should include to protect privacy.
CONSTRUCT three take a stand statements that could be used to facilitate class discussions on this topic. Participants in the discussion will evaluate each statement and determine how they feel about each statement by stating one of the following stances: Strongly Agree, Agree, Slightly Agree, Strongly Disagree, Slightly Disagree, or Strongly Disagree.

2.33 Bitcoin
Implementations of digital cash can allow secure and anonymous transactions.

Considering the privacy benefits and the potential for use by tax evaders, criminals, and terrorists, do you think fully anonymous digital cash should be legal?
EXPLAIN why or why not you believe people have a negative right (in the sense of GOF section 1.4.2) to use anonymous digital cash?
CONSTRUCT three take a stand statements that could be used to facilitate class discussions on this topic. Participants in the discussion will evaluate each statement and determine how they feel about each statement by stating one of the following stances: Strongly Agree, Agree, Slightly Agree, Strongly Disagree, Slightly Disagree, or Strongly Disagree.

HOMEWORK
READ GOF 2.6 Communications on pages 112-119. Continue working on 1.3C. Due prior to the start of class Monday.

Source: A Gift Of Fire, Chapter 2, Privacy. Sarah Baase (C) 1994.


1.3D
Finish reading Gift of Fire Chapter 2: Privacy.
Complete review exercises 2.1 through 2.7 from page 119 and Class Discussion Exercises 2.48 and 2.51 from page 124 handwritten on a piece of notebook paper. Label each exercise accordingly and label the top of the paper with your name and 1.3D. [32 marks possible].