meta data for this page
This is an old revision of the document!
Student number: 0444724
Chosen methods for the course:
Two books: Nothing to Hide and Data and Goliath
Chosen course: Philosophy and Critical Thinking , since there is no dates on coursera course
Search and select three (3) documents (web pages, articles, videos, …) of the topic of your course (Data & Privacy in Critical thinking and Sustainability in Green IT course) and explain why those documents are relevant for the course.
There are many topics that are relevant to matter of Data & Privacy for me personally. Right now in recent memory I've had few matters that have brought up discussion within my circle of friends and fellow students, and here are few I consider very good:
1.) Windows 10 privacy worries answered in an article in the guardian, by Jack Schofield (http://www.theguardian.com/technology/askjack/2015/aug/15/windows-10-microsoft-should-privacy-problems-worry-me)
I think this article discusses well the controversy and doubt placed on newest Windows, and it's underlying issue with concerns regarding privacy settings. As it is, Windows by default requests and gathers a lot of information from the users without informing them too well of it. We can argue whether the outrage is justified or not, for if we are online we leave information everywhere, but the biggest issue is the default approach of the operating system that makes changes without the users implicit command.
This brings me to my next pick, which is a video from youtube personality that worked for Microsoft for a good decade according to his own claims, and was laid off in recent company changes:
2.) How to disable Windows 10 Spying - https://www.youtube.com/watch?v=u1kGMCfb2xw
Now while this video doesn't touch the topic of Data & Privacy as whole, it's a good example of where we are right now. We are given options and contracts to approve while we register or choose to use any program or service. However, we only have the option to either accept or not use them at all, most of the time. Other times we are not even asked and these options are included in the default options, like in case of Windows 10. In order to change the privacy settings, you have to go into lengths that normal users cannot be expected to manage. Not to mention, in case of Windows it was proven that with updates the system makes changes to existing settings by turning some of them back to defaults without any notice. It's also a good video with instructions on how to do this.
3.) This last one I feel to be important for anyone that uses internet. I recall seeing it when I was checking out new password managers and I had to search it again to link it: http://www.theguardian.com/commentisfree/2013/dec/03/eight-ways-to-protect-your-privacy-online
It is an article about 8 ways to protect ones privacy online, and has very good basic tips for anyone wanting to avoid simple mistakes, like default passwords, leaving wireless connections open and unprotected, etc.
17.6.2016 First meeting
Google holds a site where you can view what data they collect on their users. https://privacy.google.com/data-we-collect.html
They are very extensive in explaining the details and types of data, and how these are used. Basics of these, when you use google search for example, are:
- Things you search for
- Websites you visit
- Videos you watch
- Ads you click on or tap
- Your location
- Device information
- IP address and cookie data
We collect device-specific information (such as your hardware model, operating system version, unique device identifiers, and mobile network information including phone number). Google may associate your device identifiers or phone number with your Google Account.
Details of how you used our service, such as your search queries. telephony log information like your phone number, calling-party number, forwarding numbers, time and date of calls, duration of calls, SMS routing information and types of calls. Internet protocol address. device event information such as crashes, system activity, hardware settings, browser type, browser language, the date and time of your request and referral URL. cookies that may uniquely identify your browser or your Google Account.
When you use Google services, we may collect and process information about your actual location. We use various technologies to determine location, including IP address, GPS, and other sensors that may, for example, provide Google with information on nearby devices, Wi-Fi access points and cell towers.
In the end, the amount of information we “agree” to give, is immensely private and somewhat scary. These privacy policies are not advertised, or made clear to the people. The information they openly claim to collect, is not anywhere near what they truly do, and they know it. This is why they do not start the pitch with the hardware information, or your location and nearby Wi-fi hotspots!
Esaimaa, a finnish news site for local news in Lappeenranta. The page itself appears to not gather much of information, outside the time of usage through cookies, that these days are basic for website functions.
In their user agreement and registry information, they claim that cookies will only collect information of “how” and “when” the service (website) is used for non-registered users. If you register, your basic knowledge is held but will not be used for any other than their own services and advertisement of their own products.
1) Where do you draw line between privacy and security? Base your answer using examples from the books.
I feel this question we had in the meeting, was one of the most inherent and important questions in this course. I feel it is important one can base their opinions and thoughts on some of the claimed examples from the book, and I would want to see them explain the ethic of their choice here. This would show that they have put thought into the topic of discussion in the course.
2) What is Reasonable Expectation of Privacy?
While I do not personally like so called normal exam questions, I feel that it is good to have some understanding of how well student knows basic concepts of the book. I feel that this question refers to a basic concept we had to go through in both available books, and everyone should have some idea of what this means by now. It is also an excellent point of discussion.
3) What is so called “Chilling effect”? How do you feel about it?
Again, another test of whether someone read the book or listened during the class. While I think I can easily at times forget terms or specific context of said terms, I feel these kind checkers are good. It also allows them to give their own explanation and how they view the point of Surveillance creating censorship and affecting our daily interaction.
4) Who does the data, which is gathered of your daily doings, belong to? When are you willing to give that data away, and for what reason? List three things that author in Data and Goliath mentions as factors for a good balance in making sure that power is not abused, and explain when you'd be willing to give away your data. Or if you would not, why?
I would want to see an essey answer of this, to see how everyone has come to view personal data. What is it worth to them, and what do they think of ethics of gathering data. What about the idea of transparency - would someone give their data away if they trusted the other party?