7.7. Ethics of Data Collection and Data Privacy

Watch the following video about the massive amounts of data our smart phones and computers collect about us.

coding exercise Activity

Try the following activity. If you use GPS location on an Android smartphone for driving directions or games, Google keeps track of your location history and you can see it at https://www.google.com/maps/timeline. You can also turn off location tracking, but it is useful when you want directions and it’s free. Do the benefits outweigh the lack of privacy for you?

../_images/googletimeline.png

As users, we often don’t realize how much personal data we are giving away. As computer programmers, we must be aware of the risks to data privacy when our code collects and stores personal data on computer systems. Legally and ethically, we must ask the users for permission to access and store their data. And if there are data breaches where the data is stolen, we must inform the affected users. The laws are slowly catching up to our technology, and many places, like Europe and California, are passing laws to protect data privacy.

Here are some interesting video resources about data collection and data privacy:

7.7.1. groupwork POGIL Groupwork: Data Privacy

In POGIL groups, explore a popular app or web site and its data collecting practices. Explain the risks to privacy from collecting and storing personal data on computer systems. Discuss the ethical and legal problems that may arise and how programmers can try to avoid them. Design a poster describing the data privacy issues for your chosen app or web site for your class.

7.7.2. Summary

  • When using the computer, personal privacy is at risk. There are risks to privacy from collecting and storing personal data on computer systems. Programmers need to safeguard personal privacy.

  • Computer use and the creation of programs have an impact on personal security and data privacy. These impacts can be beneficial and/or harmful.

You have attempted of activities on this page
Next Section - 7.8. ArrayList Summary