Answer & Explanation:Discussion Questions.docx
discussion_questions.docx
Unformatted Attachment Preview
Discussion Questions
Part 1 ( answer with 2 or more paragraphs)
1. Review Helen Nissenbaum’s framework of privacy in terms of “contextual integrity.” What are the differences
between what she calls “norms of appropriateness” and “norms of distribution”? Give an example of how either
or both norms can be breached in a specific context.
2. Through the use of currently available online tools and search facilities, ordinary users can easily acquire
personal information about others. In fact, anyone who has Internet access can, via a search engine such as
Google, find information about us that we ourselves might have had no idea is publicly available there. Does this
use of search engines threaten the privacy of ordinary people? Explain.
3. In debates regarding access and control of personal information, it is sometimes argued that an appropriate
balance needs to be struck between individuals and organizations: individuals claim that they should be able to
control who has access to their information, and organizations, including government and business groups, claim
to need that information in order to make appropriate decisions. How can a reasonable resolution be reached that
would satisfy both parties?
4. Reexamine the arguments made by the U.S. government and by Google regarding the government’s requests for
information about users’ search requests made during the summer of 2005. Are the government’s reasons for
why it should have access to that information reasonable? Does Google have an obligation to protect the personal
information of its users, with respect to disclosing information about their searches? Could this obligation be
overridden by certain kinds of national defense interests? If, for example, the government claimed to need the
information to prevent a potential terrorist attack, would that have changed your analysis of the situation? Or
does the government have the right, and possibly an obligation to the majority of its citizens, to monitor the
searches if doing so could positively affect the outcome of child pornography legislation?
Part 2 (answer with 2 or more paragraphs)
1. In your estimation, could self-regulation be effective in protecting data privacy or does it need to be supplement
by laws and regulations? Is the European model worth emulation in the United States?
2. What is your general assessment of cookie and spyware technologies? Should there be some legal limits on how
these technologies are used?
3. Is it morally acceptable for an employer to inspect the outgoing or incoming email of its employees? How would
you define the scope of workplace privacy right?
4. Almost every major commercial website have a privacy policy. Visit one of these sites in order to read and
evaluate that that policy. Is the policy clear and comprehensible? Does it afford enough protection for that site’s
customer? For example check out one of the following sites:
http://privacy.yahoo.com/privacy/us or http://legal.web.aol.com/policy/aolpol/privpol.html
…
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more