Computer Science Privacy Assignment

831 words - 4 pages

1. Who can access your personal information if you don’t lock your privacy settings tight?
Tons of people who know your name or username can access your personal information if you don’t lock your privacy settings tight. For instance, page 2 of the eBook states that tons of people on the website can access our personal information. In addition, page 6 of the eBook shows similar situation where Amy did not lock her privacy settings and someone hacked her accounts and posted bad stuff on her account page regarding a person who she thought was cute. This incident is evidence of being hacked or someone accessing your personal information if you do not set your privacy settings on.
2. Why is it ...view middle of the document...

This copied data is then posted on different websites as Advertisements. eBook also states that we assume we are customers but most of the times, we are the product. Thus, it is impossible to delete a picture or post from online once it is posted due to others access to it.
4. Discuss how someone can figure out where you live from the information you are posting online? Someone can easily figure out where you live by looking at your personal information that you post on social networking websites or even at your gaming avatar. For Instance, page 9 of the eBook showcases a similar situation where Nathan is being bullied by a person on gaming network who tends to know which school he goes to, how he looks etc. Later, Dave helped him figure out that it was his Avatar and gaming username that gave the sneaky person a clue of his personal information including his appearance as well as his location. Dave also pointed out that mystery man could hear his talks through his microphone and figure out more about his personal data. This is evident of someone figuring out your location by your personal information on social networking websites or gaming avatars.
5. Can posting where you are going to be at certain times turn into a safety issue?
Yes, providing information through social...

Find Another Essay On Computer Science Privacy Assignment

How Management Information Systems Affect Working Ethics

1581 words - 6 pages , need to be established. Human privacy and dignity needs protection from exploits of management information systems. This way, the technology will be termed as fully successful. Works Cited Olumoye, M. (2013). Ethics and Social Impact of Information Systems in Our Society: Analysis and Recommendations. International Journal of Science and Research, 11(2), 154-158 Cushman, M., & Mclean, R. (2008). Guest editorial Exclusion

Should Celebrities Have Their Right to Privacy?

1817 words - 7 pages Privacy Act of 1986.This Act extended the scope of the Wiretap Act of 1968 to include e-mail and computer data transmissions. The next time that surveillance became stricter was after 9/11 when terrorists hijacked four airplanes and they crashed into the twin towers of the World Trade Center and into the Pentagon and in a field in Pennsylvania. Currently, the Obama Administration unveils a Consumer Privacy Bill of Rights to protect privacy and Google

Computer Ethics

967 words - 4 pages aspects these changes have been of great benefit to all, however in some instances it has been of great detriment; case in point, community life, family life and relationships. Of great impact to all has been the loss of privacy, freedom and democracy in this post 9-11 environment mostly due to the U.S. Patriot Act. Computer Ethics tries to study and analyze the social and ethical impact of technology in society.Computer Ethics in recent years have

vocation area report

1917 words - 8 pages will be summarising the main points discussed in this report and I will have my references for this assignment at the end. MAIN BODY (Part 1) What is Computer Network Security? 2. Computer Network security is basically the provisions and policies which are adopted by a network administrator or technician that stops and monitors unauthorized access, misuse, modification or denial of a computer network. Computer Network security

Internet Privacy

1805 words - 7 pages agents. E-commerce is structured on the copy and trade of intimate personal information and therefore, a threat to privacy on the Internet. The Internet?s leading advertising company, DoubleClick, Inc. compiled thorough information on the browsing routine of millions of users. They accomplished this by implementing ?cookie? files onto computer hard drives. These cookies enable Web sites and advertising networks to observe people?s on-line

THE CONTRASY

4431 words - 18 pages : Biology : Plant BiologyScience Essays : Biology : Human BiologyScience Essays : BiotechnologyScience Essays : ChemistryScience Essays : Computer ScienceScience Essays : Computer Science : Artificial IntelligenceScience Essays : Computer Science : Computer EthicsScience Essays : Computer Science : Programming LanguagesScience Essays : Computer Science : Internet and networkingScience Essays : Earth SciencesScience Essays : Earth Sciences : Geology

The Quantum Computer and the Impact If Made Profitable

1440 words - 6 pages would come if the quantum computer was commercially viable. Some of the issues would be national, international, ecological, privacy or technological concerns. Before this paper addresses the concerns and benefits of the quantum computer we need to understand the technologies that manage this computer. Every basic computer has two outputs that are either on or off. It is best described as a light switch that can be switched on or QUANTUM

Digital Media and The Loss of Privacy

818 words - 4 pages Privacy on the Web has become a growing issue among Americans' due to tracking and social profiling of users' and their online habits. Government, businesses, web platforms and their advertisers are collecting users' online data on a daily basis through various techniques which could be used for study, security, and economic advantage. According to “The Danger of Big Data: Social Media as Computational Social Science,” smaller bits of user

Privacy on the Internet: Who Has Your Personal Information?

2293 words - 9 pages strongly opposed to such regulations because they would be ?forced to spend $9-$36 billion to make their websites comply,? if the new privacy measures were passed (Fisher [1]). Senator John McCain, Republican-Arizona, said, ?I remain convinced that a federal law is needed? after leaving a Senate commerce, science, and transportation subcommittee meeting. One of the main issues dividing Democrats and Republicans in the Senate is the debate between

Nursing informatics today

633 words - 3 pages American Nurses Association in 1994. Nursing Informatics is the specialty that integrates nursing science, computer science, and information science in identifying, collecting, processing, and managing data and information to support nursing practice, administration, education, research, and the expansion of nursing knowledge (Murphy, 2010). The term nursing informatics has greatly changed since the 1970’s and has evolved ever since. Today

Computer ethical

1844 words - 7 pages will then further discuss the notions of 'computer viruses' and hacker ethics.Hi-tech ... or an invasion of privacy?In March, 'The Sunday Mail' featured an article on a Queensland high school. The story was about the new computer system in the Bundamba Secondary College library. This school is the first one in Queensland to have a fingerprint recognition sensor. This computer system is unique because it replaces library cards, which means the

Similar Essays

Computer Ethics Awareness Among University Students

930 words - 4 pages caused by unreliable software and to computer misuse (Forrester and Morrison, 2001). According to Forrester and Morrison (2001), this unethical use of computer have created a whole new range of social problems, which include computer crime, software theft, hacking, the creation of viruses, invasion of privacy, overreliance on intelligent machines and workplace stress. This unethical behaviour related to Information System (IS) have caused

Evidence And Examples Of The Four Learning Outcomes

2846 words - 12 pages for writing, genres, conventions, and audiences in their discipline or profession from a rhetorical perspective” (Bell, 2014). Prior to the “Group Report Presentation”, “Summary Assignment”, and “Interview and Ethnography Assignment” I did not feel comfortable speaking or writing about my course major, computer science. I did not feel that I had a strong enough knowledge base to speak or write on any aspect of the discipline. Through the topic

Should Celebrities Have Their Right To Privacy?

2330 words - 9 pages Privacy Act of 1986.This Act extended the scope of the Wiretap Act of 1968 to include e-mail and computer data transmissions. The next time that surveillance became more strict was after 9/11 when terrorists hijacked four airplanes and they crashed into the twin towers of the World Trade Center and into the Pentagon and in a field in Pennsylvania. Currently, the Obama Administration unveils a Consumer Privacy Bill of Rights to protect privacy and

Security Issues In Cyberspace Essay

1325 words - 6 pages growing graph. From the year 1988 to date, it is reported and estimated that attacks have grown so high in number [2]. The hacking act is growing day by day in great number. We then ask, what is hacking? Hacktivism and Hacker ethical issues Hacking is the act of cutting somebody or something with rough, heavy blows. It may mean to kick something roughly or without control. In computer science, hacking is to secretly find a way of looking at and/or