meta data for this page
Task 1: Data & Privacy.
China, M. 15.08.2005. Hacker found guilty in massive data theft case. InfoWorld, IDG News Service. [Online] Available: http://www.infoworld.com/article/2668662/application-development/hacker-found-guilty-in-massive-data-theft-case.html
We have ask ourselves who are the real victims in the Sniper mail case? Is it acceptable that companies have this much data gathered? What can happen when this data leaks? What could have been the consequences if Scott Levine would have got away with his theft?
Lohr, S. 16.03.2010. How Privacy Vanishes Online. The New York Times. [Online] Available: http://www.nytimes.com/2010/03/17/technology/17privacy.html?_r=0
Steve Lohr shows the positive and negative sides of the data-driven approach. Where do we draw the line, have we already gone too far?
Horne, B. 11.01.2016. Shari Steele on online anonymity: Tor staff are 'freedom fighters'. The Guardian. [Online] Available: http://www.theguardian.com/technology/2016/jan/11/shari-steele-tor-encryption-online-anonymity-censorship
A recent article about Tor Project, free software which defends against traffic analysis and provides anonymity online. Tor can be seen as the tool against censorship of internet. This article goes over the highlights of year 2015 in the eyes of Tor.
4 exam questions
1) What are the differences between meta-data and data, which is more important envelope or content, or are they both equally important, explain (Question tackles the important topic of meta-data and how the envelope can be more important than the content itself.)
2) Why law enforcement should not have the rights to perform dragnet investigations. How data, warrants and dragnet investigations link together, explain (Question asks the reader problem with dragnet investigations and then links the problem to some of the main topics of the both books)
3) Data-base breaches, who are the victims in these breaches, are the multiple victims, explain (The question forces the person to think of other perspectives than just the organization, which was breached.)
4) Explain one method which can be used to limit the possibilities for abuse (abuses related to data), how does the method limit the possiblities for abuse. The method doesn't need to be from the book, explain. (Question forces the person to reflect upon the book and form his/her method to deal with the problems with abuse.)
META101x Philosophy and Critical Thinking
Task 2: Two digital services and their data collection
Users; personal details & credit card number, transaction records, posession of library, statistics (preferences etc.)
Games; sales, behavior, trends, statistics
Steam is is a digital distribution platform which has 125 million active users and $3.5 billion sales through games (2015). This two-sided market keeps growing and producing crucial data on customer behavior and trends.
“By appearing and participating in any ESEA competition, you grant ESEA and its assignees and licensees right to review and make public any and all game play, film, photograph and record your name, nickname, pseudonym, persona, picture, biographical material, voice and/or likeness and to use and distribute the same in any manner or media whatsoever, by any and all means, media, devices, processes and technology now or hereafter known or devised anywhere in the universe at anytime in perpetuity, for any lawful purpose whatsoever, including advertising, publicity or trade.”
Users are forced to release the whole body of him/herself for ESEA if they want to make a buck out of it.
Monitoring users by their chatlogs and forum posts.