Please email your homework in Microsoft Word or PDF format to privacy-homework AT cups DOT cs DOT cmu DOT edu and put "hw1" in the subject line.
Don't forget to properly cite all sources (including assigned readings) and include a bibliography with all homework assignments. In homework 1 you will get points for your properly formatted bibliography. In future homeworks you will lose points for improper bibliography formatting or not including a bibliography.
1. [25 points] Write a short summary of each of the four assigned readings (3-7 sentences each - do not exceed 7 sentences!). Graduate students also read and write a summary of one optional reading paper. After each summary (in a separate paragraph) provide a "highlight" for that chapter. This can be something new you learned that you found particularly interesting, a point you would like to discuss further in class, a question the chapter did not fully answer, something you found confusing, a point you disagree with, or anything else you found noteworthy. Here is an example of how to do this, taken from a previous semester's reading assignment.
Smith Introduction - Summary: Americans value personal privacy, but they also ask for and provide a lot of personal information. Thus, there is a tension between privacy and curiosity. Throughout history, people have become more interested in protecting their privacy each time new technology is deployed that intrudes on their privacy - especially when that technology is "in the hands of large and powerful organizations." The Web raises new privacy concerns because it places the ability to snoop in the hands of individuals.
Smith Introduction - Highlight: Smith portrays curiosity about other people as a uniquely American trait. There are a lot of students in this class from other countries, I wonder whether they would agree.
2. [10 points] Make a one-page "collage" by photocopying the contents of your wallet on a single sheet of paper. You may "edit" your collage by leaving out items or by blacking out information on items you do include. Your collage will be passed around the classroom for your classmates to see and turned in for grading. This question, only, must be turned in during class rather than submitted electronically.
3. [10 points] Briefly describe two privacy-related issues that have been in the news recently. Cite at least one news article where each issue is discussed. Be prepared to discuss these issues in class.
4. [25 points] The CMU Data Privacy Lab has setup a web site where you can view public web cams. Take a look at several of these web cams and think about their implications. [15 points]
5. [10 points] Find a reference to privacy in art, literature, advertising, or pop-culture (tv, movie, cartoon, etc.). Explain the reference and what it says about privacy. If possible, provide a URL or a copy of the privacy reference that you can share with the class. [10 points]
6. [10 points] The following are three attempts at paraphrasing the conclusion of the "Nothing to Hide" paper. For each one, decide whether or not it contains plagiarism and provide a brief explanation to justify your decision.
Conceptions of privacy underpin nearly every argument made about privacy, including the "nothing to hide" argument, which represents a singular and narrow way of conceiving privacy. If we do not exclude from consideration the other problems raised in government surveillance and data mining programs, the "nothing to hide" argument is a loser (Solove 2007).
Solove (2007) writes that the "nothing to hide" argument misses important dimensions of privacy and results in a very narrowly focused debate. He argues that when we consider privacy more broadly, we see that this argument "has nothing to say."
As Solove (2007) writes, conceptions of privacy are at the root of nearly every argument ever made about privacy, causing people to talk past each other when discussing privacy issues. We can better address privacy problems by focusing more specifically on the related problems. Rather than using the singular and narrow "nothing to hide" argument, we should confront the plurality of privacy problems implicated by government data collection and use beyond surveillance and disclosure.
7. [10 points] Choose a bibliography format and use it to prepare a bibliography for all of the chapters and articles you cited in this homework. Please indicate at the top what format you are using (for example, Chicago, ACM, IEEE, etc.) and provide a URL for where you found the instructions for using this format. It would be a good idea to choose a format typically used by conferences or journals that people in your field publish in. Feel free to use Bibtex or Endnote or other automated tool to generate your bibliography, but also find the formatting instructions and verify that your bibliography is properly formatted before you submit it.