meta data for this page

This is an old revision of the document!

Reading slides and coursera diploma

UQx: META101x Philosophy and Critical Thinking

Screenshot comes here:

Day 1: Nothing to hide slides:


Day 2: Liars and Outliers slides:


Day 3: Liars and Outliers slides:


Task 1

Search and select three (3) documents (web pages, articles, videos, …) of the topic of your course (Data & Privacy in Critical thinking and Sustainability in Green IT course) and explain why those documents are relevant for the course.

1: Lomas, N. 8.2.2015. Today In Creepy Privacy Policies, Samsung’s Eavesdropping TV. TechCrunch. [Online] Available:

  • With techonology constantly evolving we have to consider privacy issues which come from new features. This article revolves around the new features in televisions and voice control. There are concerns whether the private information and private spoken information leaking to third parties. Samsung itself is warning users to not speak sensitive information in front of a TV with certain features turned on.

2: Wilson, M. Sep. 2015. Accepting Microsoft's Windows 10 privacy stance at face value is sheer folly. Betanews. [Online] Available:

  • In this article writer questions Microsoft's decision to not let home users to completely disable telemetry in Windows 10, while giving Enterprise customers ability to do so. Why should home users be treated differently in terms of privacy and data collection.

3: Lomas, N. 22.02.2105. Metadata retention: 'Those with nothing to hide have nothing to fear', says Australian Federal Police Assistant Commissioner Tim Morris. Digital Life, The Sydney Morning Herald. [Online] Available:

  • This article talks about using metadata for counter-terrorism and how people with nothing to hide have nothing to fear. Yet this means privacy is highly at risk here.

Task 2

Find out information gathered of you in one physical and one digital service. What is collected, how it is used, who is using that etc. Deadline 2nd discussions.

Physical service: K-Plussa bonus card

  • What data is possessed:
    • Basic information about card owner: customer number, customer type, date of relationship start, surname, first names, home address, phone number, email address, date of birth / personal id, gender, language
    • Card information: card number, period of validity, date of card application, card type, card numbers of expired or lost cards
  • What is gathered:
    • Information related to card use: purchases made involving use of card, product groups, place of purchase, receipt number, means of payment, date and time of purchase, discounts granted
    • K-Plussa system information: number of points accumulated by customer each month, number of vouchers and their serial numbers sent to customer, dates and places of voucher use, requests for voucher values to be transferred to bank account
    • Information related to customer relationship: recordings of customer service calls and information on marketing and customer service activities
    • Record of clubs related to K-Plussa: Napero-kerho (includes dates of birth of members children), Musta Pörssi, identification details for users who register on K-Pluss website, information regarding means of payment connected to card holders, K-Plussa points donation to charity policy, records based on statistical classifications related to the customer relatonship, whether person has become K-Plussa developer, any sponsorship targets selected for the household
  • How is information used:
    • For managing customer relationships under K-Plussa program
    • Contacting customers
    • Marketing
  • Who is using information:
    • Data on card holders purchasing patterns (group and product level) is used by companies belonging to the K-Plussa programme for direct marketing purposes (unless card holder has prevented this)
    • Card holder information may be used to update customer data files of companies belonging to K-Plussa system (if customer has given consent to this)


Digital service: Twitter

  • What data is possessed:
    • Basic account information: name, username, password, email, phone number,
    • Additional information: biography, location, website, date of birth, picture, address book contacts, information from connected services
  • What is gathered:
    • Public information: tweets, metadata (date and client data), language and timezone, created lists, people you follow, liked tweets, retweeted tweets
    • “Many other bits of information that result from your use of the Twitter Services”
    • Location information: GPS, wireless networks or cell towers near mobile device, IP address.
    • Links interaction (links are redirected through shortener): click statistics
    • Cookies: website usage data (Do Not Track option is honored)
    • Log Data: IP address, browser type, OS, referrals, pages visited, location, mobile carrier, device information, search terms, cookie information.
    • Commerce Services (payment information): credit card number, expiration date, cvv code(not stored), billing address, shipping address, information gathered by purchases made through Twitter services (merchant name, date, time, amount of transaction)
  • How is information used:
    • To make inferences: what topics may be interesting to you, customizing content that is showed, customizing ads.
    • To provide and improve services: local trends, stories, ads and suggestions for people to follow.
  • Who is using information:
    • Public user profile information and public tweets are immediately delivered via SMS and APIs to partners and third parties
    • Search engines, developers and publishers that integrate Twitter content into their services
    • Institutions such as universities and public health agencies that analyze information for trends and insights.


Task 3

Society vs. individual. Select one community/society/group where you belong and reflect the societal pressures from society and individual perspectives. Point here is to analyze you perception of these pressures to both directions.

Task 4

Create 4 exam questions representing the course contents. Explain why the question is good.__ Question 1:

Question 2:

Question 3:

Question 4: