meta data for this page
Task #1: Select 3 documents (web pages, articles, videos,etc.) of the topic of the course (Data&Privacy) and explain why those documents are relevant for the course.
Source 1: Derek Ong on TEDxSunwayUniversity 'The morality of big data'
In this video the lecturer provides quite a meaningful food for the thoughts about people and global digital space relationships. Everybody all over the world unintendedly takes steps into Big Data and ties himself or herself with it. And here lies an issue - how not to be enslaved by it. It can take several forms starting from philosophical questions about lost reality and finishing with business and marketing. Take an example. Every time when someone fills the form or use the client card he or she contributes to the global organization wielding those flows of information and transactions. But where is the extent, the limit of this wielding?
Source 2: SUSAN J. HARRINGTON (1989) 'Why People Copy Software and Why People Copy Software and Create Computer Viruses:Individual Characteristics or Situational?'
The paper provides deeper look into problem of unethical behaviour in terms of using of software by non-professionals. The division of motivators into individual personal characteristics and situational factors may help companies to protect their developments better from copying and damaging. Moreover it grants us with ability to think critically according to this problem and find better possible solutions with spark of our own point of view.
Source 3:What's the future of privacy in a big data world?|PBS NewsHour
'Alright, our refridgerators interact with us and maybe with other refridgerators, but how to step them interacting with the strangers?' This question from the video ince again raises the question about privacy protection in big data. With almost any device connected to the global net people lose their privae life, that in a certain way can end badly someday. Now it is hot debate about what has to be done to reduce the risks. Is the governments should be aware of it? What else can we lose trying to protect our privacy? Answers to these and more questions could be found in this video.