MidTerm
MidTerm
1. a) Computer technology has greatly improved crime-fighting methods through enhanced surveillance, [5] CO1
remote access to criminal records, and faster data analysis. However, these advancements also raise
concerns about personal privacy. Discuss how technology has transformed crime prevention and law
enforcement while analyzing the ethical challenges it presents. Suggest possible solutions to maintain
a balance between security and privacy.
2. a) With the rise of Big Data, AI, and government surveillance, individuals' personal information is [10] CO1
increasingly being collected, stored and analyzed by corporations and governments. Recent concerns
about privacy violations, data leaks, and surveillance have sparked debates on how much control
people truly have over their data.
i. Discuss how modern surveillance technologies impact personal privacy. Provide two real-
world examples of how surveillance has raised ethical concerns.
ii. Explain the Fair Information Principles (FIPs) and how they help protect users’ privacy. Do
you think current privacy regulations are effective in protecting user data? Justify your answer
with reasoning.
3. a) A university student, recently discovered that a popular social media platform has been collecting his [10] CO1
personal data, including his location, search history, and private messages, without his explicit consent.
He also learned that the company sells this data to third-party advertisers. Concerned about his privacy,
he wants to understand the ethical and legal implications of such data collection and what steps he can
take to protect his personal information.
i. Analyze the ethical concerns surrounding the unauthorized collection and sale of personal data
by social media companies. Discuss how such practices impact users' privacy and suggest
ways companies can adopt ethical data-handling policies.
ii. Considering the given situation, what measures can individuals take to safeguard their online
privacy? Discuss at least three technical and non-technical solutions that can help protect
personal information from unauthorized access and misuse.
Page 1 of 1