Fiveable
Fiveable
pep
Fiveable
Fiveable

or

Log in

Find what you need to study


Light

7.7 Ethical Issues Around Data Collection

3 min readjanuary 2, 2023

Athena_Codes

Athena_Codes

Milo Chang

Milo Chang

Athena_Codes

Athena_Codes

Milo Chang

Milo Chang

Data structures, such as ArrayLists, are commonly used to store and organize data in databases, both on personal computers and on the internet. This data can include sensitive information, such as names, social security numbers, and bank account details, and it is important to ensure that it is properly safeguarded.

While computer use and the creation of programs can offer numerous benefits and enhance personal security through the use of tools and technologies that protect against online threats, they can also pose risks to personal security if not used responsibly.

Cybercriminals and hackers can take advantage of the widespread use of personal data in digital technologies to access and misuse it, resulting in identity theft, financial fraud, and other forms of harm.

To safeguard personal privacy and protect sensitive data, programmers have a responsibility to design systems that prevent unauthorized access or misuse. There are various ways to achieve this, such as implementing strong security measures like encryption and authentication, and using techniques like and to keep data secure.

By following best practices and taking these measures, programmers can help to protect personal privacy and ensure that sensitive data is used responsibly.

Encapsulation

is where we block data from being used by outside clients. To do this, we keep data private inside the classes that we write, as covered in Unit 5.

helps to protect data by keeping it hidden from the outside world and only allowing access to it through a well-defined interface. This interface, in the form of methods or functions, provides a way for other parts of the program to access and manipulate the data, but only in a controlled and defined way.

By encapsulating data and providing a clear interface for accessing it, helps to protect the data from unauthorized access or misuse. It also helps to prevent the data from being corrupted or modified in unintended ways, as the interface defines the only way in which the data can be accessed and modified.

Cryptography

is the act of securing our data and there are two ways: and .

Hash Functions

encrypt data using complex mathematical functions and are non-reversible. Because of its nonreversabilty, are not used to transmit information, but are instead used for integrity, to show that the data we are being sent is genuine.

Ciphers

Whether it is the right data or not is left to . allow us to encrypt our data so that it can't be read or understood by outside sources, but they can be reversed. To reverse the cipher, we need to have access to the key. The key is either common to both the sender and receiver of the data or unique to each person.

Using the key or keys, the message can successfully be decoded efficiently. The data can still be intercepted by a third-party. However, without the key, it would be difficult or impossible for someone who does not have access to the key to decrypt the message.

This is because decrypting the data without the key would require trying many different combinations of keys, a process known as "brute forcing," which would be time-consuming and complex. As a result, it is generally not worth trying to decrypt data without a key.

Key Terms to Review (5)

ArrayList

: ArrayList is a dynamic data structure that allows you to store and manipulate collections of objects. Unlike arrays, ArrayLists can grow or shrink dynamically as needed.

Ciphers

: Ciphers are algorithms used for encryption and decryption of messages or data. They transform plaintext (original message) into ciphertext (encrypted message) using specific rules or keys, making it difficult for unauthorized individuals to understand or access sensitive information.

Cryptography

: Cryptography refers to techniques used for secure communication in the presence of adversaries. It involves encoding information in such a way that only authorized parties can understand it.

Encapsulation

: Encapsulation refers to the bundling of data and methods within a class, where the data is hidden from external access. It ensures that an object's internal state remains consistent by controlling how it can be accessed or modified.

Hash Functions

: Hash functions are mathematical algorithms that take an input (or message) and produce a fixed-size string of characters, which is typically a hash value or hash code. The output is unique to the input, meaning even a small change in the input will result in a significantly different hash value.

7.7 Ethical Issues Around Data Collection

3 min readjanuary 2, 2023

Athena_Codes

Athena_Codes

Milo Chang

Milo Chang

Athena_Codes

Athena_Codes

Milo Chang

Milo Chang

Data structures, such as ArrayLists, are commonly used to store and organize data in databases, both on personal computers and on the internet. This data can include sensitive information, such as names, social security numbers, and bank account details, and it is important to ensure that it is properly safeguarded.

While computer use and the creation of programs can offer numerous benefits and enhance personal security through the use of tools and technologies that protect against online threats, they can also pose risks to personal security if not used responsibly.

Cybercriminals and hackers can take advantage of the widespread use of personal data in digital technologies to access and misuse it, resulting in identity theft, financial fraud, and other forms of harm.

To safeguard personal privacy and protect sensitive data, programmers have a responsibility to design systems that prevent unauthorized access or misuse. There are various ways to achieve this, such as implementing strong security measures like encryption and authentication, and using techniques like and to keep data secure.

By following best practices and taking these measures, programmers can help to protect personal privacy and ensure that sensitive data is used responsibly.

Encapsulation

is where we block data from being used by outside clients. To do this, we keep data private inside the classes that we write, as covered in Unit 5.

helps to protect data by keeping it hidden from the outside world and only allowing access to it through a well-defined interface. This interface, in the form of methods or functions, provides a way for other parts of the program to access and manipulate the data, but only in a controlled and defined way.

By encapsulating data and providing a clear interface for accessing it, helps to protect the data from unauthorized access or misuse. It also helps to prevent the data from being corrupted or modified in unintended ways, as the interface defines the only way in which the data can be accessed and modified.

Cryptography

is the act of securing our data and there are two ways: and .

Hash Functions

encrypt data using complex mathematical functions and are non-reversible. Because of its nonreversabilty, are not used to transmit information, but are instead used for integrity, to show that the data we are being sent is genuine.

Ciphers

Whether it is the right data or not is left to . allow us to encrypt our data so that it can't be read or understood by outside sources, but they can be reversed. To reverse the cipher, we need to have access to the key. The key is either common to both the sender and receiver of the data or unique to each person.

Using the key or keys, the message can successfully be decoded efficiently. The data can still be intercepted by a third-party. However, without the key, it would be difficult or impossible for someone who does not have access to the key to decrypt the message.

This is because decrypting the data without the key would require trying many different combinations of keys, a process known as "brute forcing," which would be time-consuming and complex. As a result, it is generally not worth trying to decrypt data without a key.

Key Terms to Review (5)

ArrayList

: ArrayList is a dynamic data structure that allows you to store and manipulate collections of objects. Unlike arrays, ArrayLists can grow or shrink dynamically as needed.

Ciphers

: Ciphers are algorithms used for encryption and decryption of messages or data. They transform plaintext (original message) into ciphertext (encrypted message) using specific rules or keys, making it difficult for unauthorized individuals to understand or access sensitive information.

Cryptography

: Cryptography refers to techniques used for secure communication in the presence of adversaries. It involves encoding information in such a way that only authorized parties can understand it.

Encapsulation

: Encapsulation refers to the bundling of data and methods within a class, where the data is hidden from external access. It ensures that an object's internal state remains consistent by controlling how it can be accessed or modified.

Hash Functions

: Hash functions are mathematical algorithms that take an input (or message) and produce a fixed-size string of characters, which is typically a hash value or hash code. The output is unique to the input, meaning even a small change in the input will result in a significantly different hash value.


© 2024 Fiveable Inc. All rights reserved.

AP® and SAT® are trademarks registered by the College Board, which is not affiliated with, and does not endorse this website.


© 2024 Fiveable Inc. All rights reserved.

AP® and SAT® are trademarks registered by the College Board, which is not affiliated with, and does not endorse this website.