In some location systems, tracked objects gives up their identifiers to the infrastructure. Explain
how this may give rise to concerns about privacy, even if the identifiers are anonymous.

What will be an ideal response?


Consider that a user carries a tracked object (for example, a wearable or handheld device) everywhere. The
places that track the user could collude. If the identifier is directly correlated with the identity of the individual,
then the user’s movements become known, which they might not want. Even if the identifier is anonymous,
the more places that identifier is observed, the greater is the chance that it can be correlated with identifying
information. For example, if the user pays or signs for something and they are the only visitor in that place at
that time, then their identity becomes known and thus their movements. Moreover, in principle, movements
such as regular journeys (as between home and work) might also be used to make inferences. How many
employees of Acme Widgets Ltd live near enough to the Zenith Coffee bar to visit it every working morning?

Computer Science & Information Technology

You might also like to view...

What is the value of the following expression?

true && false a. true b. false c. -1 d. +1 e. None of these

Computer Science & Information Technology

Change the shift method to shiftFreq which takes a frequency instead of a factor, then plays the given sound at the desired frequency.

What will be an ideal response?

Computer Science & Information Technology

What is the output of the following code:

``` public class Test { public static void main(String[] args) { String s1 = new String("Java"); String s2 = new String("Java"); System.out.print((s1 == s2) + " " + (s1.equals(s2))); } } ``` a. false false b. true true c. false true d. true false

Computer Science & Information Technology

The ____ statement can be used to instantiate an object from a class.

A. Create B. CreateObject C. Instantiate D. New

Computer Science & Information Technology