Personal Homework

Task #1

Select 3 documents (web pages, articles, videos,etc.) of the topic of the course (Data&Privacy) and explain why those documents are relevant for the course.

Source 1: Derek Ong on TEDxSunwayUniversity 'The morality of big data'

https://www.youtube.com/watch?v=U8Q6j8dCrs8

In this video the lecturer provides quite a meaningful food for the thoughts about people and global digital space relationships. Everybody all over the world unintendedly takes steps into Big Data and ties himself or herself with it. And here lies an issue - how not to be enslaved by it. It can take several forms starting from philosophical questions about lost reality and finishing with business and marketing. Take an example. Every time when someone fills the form or use the client card he or she contributes to the global organization wielding those flows of information and transactions. But where is the extent, the limit of this wielding?

Source 2: SUSAN J. HARRINGTON (1989) 'Why People Copy Software and Why People Copy Software and Create Computer Viruses:Individual Characteristics or Situational?'

http://vxheaven.org/lib/pdf/Why%20People%20Copy%20Software%20and%20Create%20Computer%20Viruses:%20Individual%20Characteristics%20or%20Situational%20Factors%3F.pdf

The paper provides deeper look into problem of unethical behaviour in terms of using of software by non-professionals. The division of motivators into individual personal characteristics and situational factors may help companies to protect their developments better from copying and damaging. Moreover it grants us with ability to think critically according to this problem and find better possible solutions with spark of our own point of view.

Source 3:What's the future of privacy in a big data world?|PBS NewsHour

https://www.youtube.com/watch?v=t8q3XjoPzdo

'Alright, our refridgerators interact with us and maybe with other refridgerators, but how to step them interacting with the strangers?' This question from the video ince again raises the question about privacy protection in big data. With almost any device connected to the global net people lose their privae life, that in a certain way can end badly someday. Now it is hot debate about what has to be done to reduce the risks. Is the governments should be aware of it? What else can we lose trying to protect our privacy? Answers to these and more questions could be found in this video.

Task #2

Find out information gathered of you in one physical and one digital service. What is collected, how it is used, and who is using that information.

On-line product registration form

What is collected:

  1. general information about customers:
    • first/last name
    • address (including country and city)
    • postal code
    • e-mail
    • phone number
  2. type of the property and it's size
  3. number of previous purchases
  4. product model
  5. serial number
  6. purchase date

Who is using: Data is collected automaticaly by system. But it is processed by the operators which then transfer it to marketing department where specialists use it for generating marketing activities.

How this information is used: Based on collected data marketing specialists create the set of the activities which target particular customer that registered purchased product. General information about the customer provides the knowledge about him/her, e-mail and telephone number give acces to customer (enabling newsletters, etc.), serial number, model and purchase date varify that registrating person is truly a customer and that this particular regisrtation is not a spionage or benchmarking activity.

Accessed @: http://www.husqvarna.com/us/support/product-registration/

Rental payment order

What is collected:

  1. account number
  2. BIC
  3. beneficiary
  4. name of payer
  5. reference number
  6. amount of money to be paid
  7. date
  8. signature
  9. additional information

Who is using: Data is collected and processed by bank employees and transaction operators. Main users of this infromation are banks and in some cases autorities and police.

How this information is used: Operators process this information to finnish the transaction. However, bank specialists through these operations may track the activities of the clients based on which they can mak desicions about bank policy in point of a customer. This data also may be acquired by authorities and the police within the framework of the offence of the individual under suspission.

Task #3

Society vs. individual. Select one community/society/group where you belong and reflect the societal pressures from society and individual perspectives. Point here is to analyze you perception of these pressures to both directions.

Group: project development group in product development course

Taking part in the course of product development students were supposed to form groups for a ceratin product development project. project group or a team is small but still complex phenomenon. It has internal mechanisms of existing and is subjected to influnce of external factors. It means that behaviour in the group is affected by all sorts of pressure.

Firstly, it is institutional pressures. Group has to follow certain rules and norms in writing the report, has some common contents of things to cover. Obviously, that group will be punsihed for not following these rules by lowering the final degree.

Secondly, it is reputational pressures. Every member of the team that I belonged to had shown good performance during the course and was expected by other members to show the same effectiveness in the work under the project.

There is no doubt, that relationships in the team were subjected to moral norms. One of the moral norms in this case can be the equality and fairness in amount of work to be shared and done. Moreover, team always has to agree on a one thing, so if there are polar thoughts on a single object the compromise ahs to be reached.

Of course, taking into account this set of pressures, it becomes obvious that there should be a conflict of group interests or pressures and individual interests. However, in my case there could barely be found conflicts because of matching of team's vision and societal and reputattional pressures. But the could be one example of group and individual interests when members had to be sacrifice their time given to other tasks to the sake of the current project to meet the moral pressures of the system.

Seminars

Seminar 2

Presentation slides for chapters 2&3 nikita_vlasov_liars_and_outliars_chapters2_3.pptx

Seminar 3

Presentation slides for chapters 8&9 8_9chapters.pdf

Online course

Chosen online course is META101x: Philosophical and Critical Thinking

Results:

Exam questions

1. Do you agree with pendulum arguement? Could you sacrifice your private things for the sake of society?

The question checks the understanding of the book's contents and let answerer to use his or her own examples to describe situaton and argumentate own position.

2. Which tools or instruments could you suggest to protect your personal data from tracking, mining, etc.?

The question motivate the people who answer it to think about all possible threats to personal data they can meet in their daily life.

3. What pressures can affect defectors behaviour in social system and which of them have to be treated carefully?

This question allows checking of the comprehension of the book by Bruce Schneier: Liars and Outliers and starting of the own refelection, attitude and personal experience evaluating of the the one who answers this question.

4. What improvements are possible to be made for security systems that make people trust them?

Question can enable critical thinking to the issue of people trust to governmaental institutes like police and develop deeper understanding of the problems connected with that issue.