meta data for this page
Three chosen articles
Search and select three (3) documents (web pages, articles, videos, …) of the topic of your course (Data & Privacy in Critical thinking and Sustainability in Green IT course) and explain why those documents are relevant for the course.
European commission’s take on how your data will be secured within European countries. One of the most important things in data and privacy is how the authorities handle and provide protection from breaches and provide security for their citizens.
Some interesting facts that might surprise your understanding of personal data privacy, and how easily companies can for example sell your app data to 3rd parties.
Some good information on the biggest data breaches in the history of internet. Even if you haven’t been reading news on data breaches, you can get a decent picture on the amount of them from this article. This really shows why it is so vital to have good counter-measures against data breaches.
Gmail and Pobox - Collected data and usage
1. Why privacy and security are not and should not be dependent on each other? Base your opinions and arguments on the ideas presented in the book Nothing to Hide.
This question is one of the main points and which is discussed extensively in the book. It also shows that the reader has read the book and has reflected on the ideas of the book. There is no direct answer to the question, the answer shows the writer’s reflection on the book.
2. Tell us about NSA’s major actions, decisions, deceptions and errors from the beginning of its history to modern day.
It is good to study the past to fix the present. If one knows what’s been done wrong in the past, there’s a better chance that they won’t do it again. Most of the first book was about NSA and what/how it has been conducting its actions so again it’s a good way to see that the reader has read the book.
3. Describe the different types of defending from surveillance given in the book Data and Goliath.
This one is a more traditional exam question which aims to see that the reader has read the book, has thought about what is written there (you can pretty much come up with these yourself if you think about it logically). In case the examinee has read the book he should be able to deduce the answer even If he doesn’t remember all the details. (Short answer: avoid/block/distort/break surveillance)
4. Explain big data (and data mining) and how it can be used in positive/negative ways. How data and data processing is protected and should it be more restricted? How?
A question in which the examinee has to reflect on his own thoughts and ideas that he has and has gotten from the books and during course discussions. It’s also an opportunity to show their critical thinking skills.