0% found this document useful (0 votes)
29 views4 pages

Chapter 7-Activity 6

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views4 pages

Chapter 7-Activity 6

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

NAME: Diana Elizabeth C.

Sebastian

COURSE/BLOCK: BS-Architecture 1A

----------------------------------------------------------- CHAPTER 7 --------------------------------------------------------------

SAQ 9: Privacy and Surveillance


1. Discuss metadata and content under communications surveillance. Cite your reference in APA
format (10 pts.)

Surveillance metadata is details about data pertaining to the actions of an observed party. metadata

summarizes basic information about data, which can make categorizing, finding, and working with

particular instances of data easier. In the case of surveillance – especially on the part of government

agencies -- metadata not only facilitates categorizing and retrieving content but provides information on

its own and may also be used to legitimize collecting and examining content. Surveillance metadata is

usually associated with electronic communication channels, such as phone, email, and social media.

Data is collected through wiretapping and other electronic surveillance methods, including government

Trojans, wiretap Trojans, and keyloggers. Typically, surveillance metadata is gathered by government

or law enforcement pertaining to a particular suspect or person of interest. Metadata related to a phone

call, for example, include the date, time, call duration, calling/contacted the party, and, in the case of

mobile phones, location. The conversation itself is not metadata but content, as is, for example, an

email message.The point that collectors of surveillance metadata, such as the National Security

Agency (NSA), emphasize to justify continued monitoring is that they record only metadata and not

content. However, metadata has been shown to be quite revealing. Furthermore, according to

whistleblower Edward Snowden, the NSA sometimes collects content as well as metadata, and the

agency has access to all email content.Metadata has become a household word since Snowden, a

former NSA employee, reported that the agency’s PRISM program was monitoring United States

citizens. Snowden revealed that the NSA collects metadata from many communication sources

including

● All credit card transactions.

● Phone records from all major providers.

● Facebook data.
● App data and GPS locations from cell phones. Snowden also reported that the NSA

enlisted the cooperation of numerous trusted businesses, creating a ubiquitous

surveillance network and, in doing so, subverted the privacy rights of individuals.

Reference: TechTarget.(n.d). Surveillance Metadata. Retrieved from

https://www.whatis.techtarget.com/definition/surveillance-metadata

SAQ 10: Online Ethics


1. Case study: Sarah caught his boyfriend cheating with another girl. Knowing his social media
passwords and as a means of deploying revenge, Sarah logged in to his boyfriend’s account,
took screenshots of his conversations with “the girl” and posted it on her own account as a means
of exposing their despicable act. Some of the content Sarah discovered and uploaded are
sensitive images of the girl “posing” for the guy. Upon seeing Sarah’s post, both the girl and the
(ex-)boyfriend were dumbfounded. Both tried to contact Sarah to take down the post. The girl
tried to explain how she didn’t know his “boyfriend” has already a girlfriend. The guy also tried to
explain to Sarah the situation.

What should Sarah do? Choose on the three individual ethical theories mentioned (intuitionism,
utilitarianism, or universal principle), state why you chose that theory, and answer the question
based on your theory chosen. (10 pts.)

As an individual and the one that witnessed the situation, I think that what Sarah did is not
ethical. I can see why Sarah did that, It is because of the angriness that she feels about what
did his boyfriends did to her. Sarah can express her emotions but not in that manner posting
the pics on social media and taking screenshots of the conversations of the girl with his
boyfriend. I could advise her that she must talk with his boyfriend first about why he did it to
her. Totally, the wrong thing in that situation is the boy. He is immature knowing that he has a
girlfriend already and has some flirts with another girl as the girl didn't know that the boy that
she is having with has already a relationship. I can conclude that it is Utilitarianism. is not
always possible to predict the outcome of an action. Bowen points out that “consequences are
too unpredictable to be an accurate measure of the ethics of situations.” In other words, the
consequences of actions can be highly volatile or impossible, even, to predict. Using outcomes
as a measurement of ethics will not, therefore, provide an accurate way for professionals to
measure whether decisions are ethical. Professionals must be able to evaluate decisions and
choices with concrete ethical guidelines instead of hoping that certain outcomes will result in
them having made an ethical choice
SAQ 11: Online Safety Tips
1. Narrate a family’s, friend’s, or your own experience of cyberattack and explain how you fought of
that attack or what could your family/friend/or you have done to prevent that attack. (10 pts.)

Cyberattack
Based on my experience, Cyberattack is one that must have to pay close attention especially if
you have some business. Like for me. I have my own business which is the Piso Wifi wherein I
realize that my security access was not that strong enough. I just know that my piso wifi has
been hacked by someone by checking it that the I.P address has been erased and I cannot
access with my piso wifi even I reconnect with the server and even I type the password, I
cannot even have the glance to connect with it. So I decided to erase all my configurations with
my own business which is the piso wifi and bring it to an experienced technician to install some
security and he advised that I must keep my software and systems up to date, install some
firewalls and the password itself must be strong enough that it is not the same as the password
you entered before.

You might also like