Home | | Syllabus | |
Assignments | | Lecture Notes
Assignment 5Due: Friday, September 27, in class
Reading:
"Computer Ethics", Chapter 4
Response Questions Write a short answer (about 1/2 page double spaced per question) to each of the following (from chapter 4 of Johnson and chapter 4 of "Readings in CyberEthics") 1) What are two arguments that can be made for why we shouldn't worry about privacy? How can each of the two be countered? 2) What is data mining and why has it been considered by many privacy advocates to be an especially serious threat to individual privacy? 3) How, according to Joseph Fulda, can at least some privacy problems associated with data-mining practices in the United States be resolved through a theory of privacy rights based on tort law?
Home | | Syllabus | | Assignments | | Lecture Notes
Constance Royden--croyden@mathcs.holycross.edu
|