ST EK List
7.3.1G Privacy and security concerns arise in the development and use of computational systems and artifacts.
7.3.1H Aggregation of information, such as geolocation, cookies, and browsing history, raises privacy and security concerns.
7.3.1J Technology enables the collection, use, and exploitation of information about, by, and for individuals, groups, and institutions.
7.3.1K People can have instant access to vast amounts of information online; accessing this information can enable the collection of both individual and aggregate data that can be used and collected.
Your Image in the Cloud
In this lab, you will learn about your digital privacy.
On this page, you will consider what information is available online about you and reflect on your online data sharing habits.
If you post a picture of you and your friends to a website, you are making information public about where you were and what you were doing, which may violate both your own privacy and that of your friends. Also, if your phone is lost or stolen, someone else might get access to pictures you thought were private. That's why data on cell phones is normally encrypted so that it can't be recovered without your password. Having to type your password is a trade-off between convenience and security.
Discuss: What kind of digital information is out there about you?
- With a partner, write down a list of the kinds of information someone might be able to find out about you by searching on the Internet.
- Which of these things are information that you voluntarily put online?
- Which of these things would you prefer to keep private?
- Look for information about yourself using acxiom.com (click "AboutTheData.com" at the top - requires registration).
One of the authors of this course did this and here's what he found
. The information circled in red is incorrect.