Question

In: Computer Science

PKA3 : 1. What is privacy? 2. What risks, if any, does facial recognition software raise?...

PKA3 :

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search?

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent.

Solutions

Expert Solution

Note: Done accordingly. Please comment for any problem. Please Uprate. Thanks.

1)

Privacy is an person or group's capacity to seclude itself, or data about itself, and thus express themselves selectively. Cultures and people vary in the limits and content of what is deemed private.

It generally implies that something is inherently unique or sensitive to a individual when something is private. The privacy domain partly overlaps with safety, which may include suitable use concepts as well as data protection. Privacy can also take the form of integrity of the body. The right not to be subjected by government, corporations or individuals to unauthorized invasions of privacy is part of the privacy laws of many countries and, in some cases, constitutions.

2)

Would you be worried if a stranger walked next to you all day while looking in the eyes at the same time? Face Recognition (FR) is connected with similar privacy issues. Only such intrusion raises a wider range of issues relating to privacy and legality.

And these are not baseless issues. During the Champions League Finals in 2017, UK police used FR to define prospective wrongdoers, which resulted in more than 2,000 individuals being wrongly matched to real criminals. FR failed in 92 percent of instances in this specific example. Fortunately, businesses are already addressing potential issues about privacy and bias. In addition, some of the largest AI study organisations are now calling for FR tech legislation. These regulations enable businesses to explore the technology's possibilities safely— from enhanced safety to better customization of the product. Indeed, it is already being effectively leveraged by such enormous fields as retail, travel and healthcare.

3)

With simple google search I can know about my social media accounts, from there if I have not implemented the security then I can know about my email id,date of birth, family,friends, personal photos and almost everything except some confidential documents like driver licence,certificates etc.

4)

If I have my SSN number and mobile phone then I can search anything, even I can download all of my documents, certificates, licenses etc.

5)

Consent provided with complete understanding of the implicated hazards, likely implications, and options. Normally each and every software take our consent but we don’t read it properly and give our consent. It is similar in medical therapy involving invasive (and potentially life-threatening) processes, a doctor or health care provider must reveal for him or her (or his or her guardian) adequate data to give informed consent to the patient. What constitutes ' sufficient information' varies with the jurisdiction. The amount of information requested in the US is generally higher than in the UK.


Related Solutions

Facial recognition software is becoming more effective and more widely employed by government agencies and by...
Facial recognition software is becoming more effective and more widely employed by government agencies and by businesses all the time. Kindly, (i) explain how businesses might use such technology (ii) detail any ethically important aspects of its use (iii) construct an argument either in defense of or in opposition to its use.
1) What is performance obligation and how is it related to revenue recognition? 2) What does...
1) What is performance obligation and how is it related to revenue recognition? 2) What does cash conversion cycle measure?
What is Privacy? Is there any Privacy for an individual? What issues can occur to an individual if there is lack of Privacy in the information age? Explain.
What is Privacy? Is there any Privacy for an individual? What issues can occur to an individual if there is lack of Privacy in the information age? Explain.
Explain what ‘equity’ is and why the conceptual framework does not prescribe any recognition criteria for...
Explain what ‘equity’ is and why the conceptual framework does not prescribe any recognition criteria for equity. b) What is the relationship of corporate social responsibility and the following theories.(i)Institutional Theory(ii)Legitimacy Theory(iii)Positive Accounting Theory (iv)Stakeholder Theory.
1.  In order to meet new Homeland Security guidelines, the Eagles install new facial recognition technology that...
1.  In order to meet new Homeland Security guidelines, the Eagles install new facial recognition technology that can instantly identify all patrons entering Lincoln Financial Field.  Installing the new security system costs the team $150 million.  Once installed, it is essentially costless to operate.  Use the appropriate economic framework to derive the impact of installing this system on ticket prices to Eagles games.
what risks can impact a software development project and how does that risk affect the projects...
what risks can impact a software development project and how does that risk affect the projects development cycle?
1) What is Big Data? 2) What challenges and risks does Big Data present to business?...
1) What is Big Data? 2) What challenges and risks does Big Data present to business? 3) Provide one or more example of the use and benefits of Big Data
(1) What do we mean by revenue recognition? What does GAAP say about proper revenue recognition?...
(1) What do we mean by revenue recognition? What does GAAP say about proper revenue recognition? (2) Why is the audit of revenue recognition riskier for a new company? (3) What are some justifications for not using confirmations of accounts receivable on a particular audit?
a) What is the differences between hardware and software revenue recognition? Based on this, what pieces...
a) What is the differences between hardware and software revenue recognition? Based on this, what pieces of information are important for an accountant to know before they can recognize revenue? b) Describe the revenue cycle - from the point in time when a sales person closes a deal, to that becoming revenue, AR and eventually cash on a company's financials.
How does the Privacy Act relate to Facebook and especially any data that may be public...
How does the Privacy Act relate to Facebook and especially any data that may be public or semi-public, like Linkedin. For example, there is a company (HiQ I think) that scrapes Linkedin profiles to predict if someone is likely to leave their job.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT