SlideShare una empresa de Scribd logo
1 de 9
Unit2PeerResponse 5006 Due 10.20.2022
Response Guidelines
To practice thinking critically and communicating when
advocating for your point of view on behalf of your clients,
challenge a colleague's policy analytic method, value critical
analysis versus analytic descriptive, by providing competing
arguments for using the opposite method.
Peer Response to challenge:
The value critical analysis is defined as “economic, cultural,
and social structures privilege some and not others, those who
are not privileged tend to need social work service because of
their position in such structures (Chambers & Bonk, 2014)”.
Analytic descriptive method evaluation is defined as a method
that “identifies or describes a social policy or program and what
the outcome should be as a result of the identifiable challenge
(Chambers & Bonk, 2014)”.There are a few differences between
the two forms of analysis. The differences are that the value
critical analysis evaluates the process of using current and
historical data to identify trends and relationships but doesn't
dig deep into the concern, analytic descriptive method policy
analysis is the description of a social policy or program, and
considers the impacts that the policy or program will have on
their neighbors or friends.The analytic descriptive method
offers a viewpoint of how things works. In order to best address
the issue I presented in my discussion I would use the analytic
approach to analyze the various ways social policy can help
balance the equal rights of women.
8/21/2021 The Erosion Of Privacy As We Know It
https://www.forbes.com/sites/forbestechcouncil/2017/06/21/the-
erosion-of-privacy-as-we-know-it/?sh=7c127e075208 1/5
Innovation
POST WRITTEN BY
Reg Harnish
CEO of GreyCastle Security, a cybersecurity consulting firm
dedicated to the practical management of
cybersecurity risks.
The Erosion Of Privacy As We
Know It
Jun 21, 2017, 09:00am EDT
Reg Harnish Forbes Councils Member
Forbes Technology Council COUNCIL POST | Membership
(fee-based)
A decade ago, who would have thought an electronic heart
device could be
connected to the internet? Or that the data from that same
device could lead
to an arson and insurance fraud conviction of the very man it
was placed in?
If our own bodily functions can’t be kept private, what makes
us think that
everything else isn’t already waiting to be exposed? As
technology makes its
way into every aspect of our lives, we are increasingly trading
our privacy for
convenience, whether we know it or not. But based on the
example above,
and assuming you are a law-abiding citizen, this might not be a
bad thing.
https://www.forbes.com/innovation
https://www.greycastlesecurity.com/
https://www.forbes.com/sites/forbestechcouncil/
https://www.forbes.com/sites/forbestechcouncil/people/regharni
sh/
https://www.forbes.com/sites/forbestechcouncil/
http://fortune.com/2017/02/07/pacemaker-arson-charges/
8/21/2021 The Erosion Of Privacy As We Know It
https://www.forbes.com/sites/forbestechcouncil/2017/06/21/the-
erosion-of-privacy-as-we-know-it/?sh=7c127e075208 2/5
In today’s world, we are never alone.
Most people don’t realize they will be photographed roughly 15
times, on
average, during a simple drive to the supermarket. On that same
trip, they’ll
typically end up on about 90 seconds of video without ever
knowing about it.
The texts and the calls they made on the way could also be
tracked. The
metadata will be sent instantly to databases around the world
and into the
cloud, where it will be immediately available to hundreds,
perhaps
thousands, of people and organizations. Our smartphones are
broadcasting
our exact locations at every moment, possibly sending the
information to
our friends, governments around the world, certainly to the
National
Security Agency (NSA) and to many others we are not aware of.
Let’s face it: Privacy as we know it is gone. But is that such a
bad thing?
Some argue that privacy is an intrinsic value and shouldn’t be
treated as a
dispensable commodity. They argue that privacy is essential for
self-
development, and without that, we would all conform to each
other and lose
our individuality.
Today, however, most Americans have unwittingly opted out of
privacy for
the convenience of surfing the web, monitoring their fitness
activity with
health trackers or receiving digital discounts at the grocery
store, just to
name a few. Our texts, medical records and credit card
information all have
been entered online and provided at our consent through terms
and
conditions. In fact, if we actually read through all of the terms
and
conditions each one of us is subjected to each year, it would
take about 76
work days to complete.
Shutterstock
http://crimefeed.com/2015/02/eyes-many-times-caught-
surveillance-cameras-per-day/
https://philosophia.uncg.edu/phi361-matteson/module-6-
privacy-property-and-technology/why-do-we-value-privacy/
http://techland.time.com/2012/03/06/youd-need-76-work-days-
to-read-all-your-privacy-policies-each-year/
8/21/2021 The Erosion Of Privacy As We Know It
https://www.forbes.com/sites/forbestechcouncil/2017/06/21/the-
erosion-of-privacy-as-we-know-it/?sh=7c127e075208 3/5
By spending so much time online or opting in to terms and
conditions, we
are essentially allowing third parties not only to create digital
copies of
ourselves but also to predict our behaviors before we even know
how we will
behave ourselves.
Again, is that such a bad thing?
Maybe it’s time we embrace this change. Here are three benefits
that I
believe will come from the erosion of privacy as we know it
today:
Less Cybercrime
The mere fact that we assign value to privacy makes it worth
stealing. Take
social security numbers, for example. SSNs were never intended
to be
anything more than a means for tracking the earnings histories
of U.S.
workers to determine their benefit entitlements. Now, someone
can use your
social security number to open a bank account under your name,
receive
benefits and ultimately steal your identity -- all because we put
so much
value on a previously worthless nine-digit number. We as a
society created a
need to keep social security numbers private, and now it’s
coming back to
haunt us.
Like our SSNs, information -- including NSA records, the
security cameras
that line our city streets and corporate databases -- should be
made public.
The more public our information is, the less it’s worth,
therefore limiting any
real value for cybercriminals.
Forbes Technology Council is an invitation-only community for
world-class
CIOs, CTOs and technology executives. Do I qualify?
Improved Health
A world without privacy has many benefits that extend far
beyond receiving
tailored advertisements and discounts showing up on your social
media
https://www.ssa.gov/policy/docs/ssb/v69n2/v69n2p55.html
http://www.forbestechcouncil.com/qualify/?source=forbes-text
http://www.forbestechcouncil.com/qualify/?source=forbes-text
8/21/2021 The Erosion Of Privacy As We Know It
https://www.forbes.com/sites/forbestechcouncil/2017/06/21/the-
erosion-of-privacy-as-we-know-it/?sh=7c127e075208 4/5
feed. It can also save lives. Currently, our health data is
protected by the
Health Insurance Portability and Accountability Act (HIPAA),
which limits
disclosure of patient data and mandates secure storage and
transmission of
electronic records.
But what patients don’t realize is their health data may provide
the next big
breakthrough in medicine. By freely sharing our information --
such as the
state of our own health, medications we’re taking, side effects
we are
experiencing and our lifestyle habits -- we can help medical
providers,
entrepreneurs and companies make new medical discoveries that
would not
be possible without access to the large amounts of data that is
currently
being protected.
If we truly want answers to the world’s biggest health
mysteries, we must be
willing to share our most personal health information. We’ll not
only save
lives, but we may just all live a little bit longer.
Transparency
Privacy as we know it has only existed for a short time. If we
continue to
fight it, we are doing ourselves a disservice, because the more
we continue to
keep our information hidden from the masses, the longer our
governments
and a select few will be the only entities with access to it.
Having large sums
of data and metadata in the hands of only a few, allowing them
to dictate the
flow of information, could set the stage for societal peril.
Our information should be shared democratically like it was in
simpler
times, when everyone knew everything about you. Your favorite
color. Your
favorite food. What made you laugh. Your kids’ names. Where
is the harm in
that? Once information flows freely, governments will be forced
to follow
suit with transparency.
If we can’t stop the erosion of privacy as we know it, let’s
embrace a society
without it. Maybe we just might make the world a better place.
https://www.virgin.com/entrepreneur/why-you-have-duty-share-
your-health-data
https://medium.com/the-ferenstein-wire/the-birth-and-death-of-
privacy-3-000-years-of-history-in-50-images-614c26059e
8/21/2021 The Erosion Of Privacy As We Know It
https://www.forbes.com/sites/forbestechcouncil/2017/06/21/the-
erosion-of-privacy-as-we-know-it/?sh=7c127e075208 5/5
Reg Harnish
Reg Harnish is the CEO of GreyCastle Security, a cybersecurity
consulting firm
dedicated to the practical management of cybersecurity
risks.… Read More
ADVERTISEMENT
Reprints & Permissions
https://www.forbes.com/sites/forbestechcouncil/people/regharni
sh/
https://www.greycastlesecurity.com/
https://www.forbes.com/sites/forbestechcouncil/people/regharni
sh/
https://www.parsintl.com/publication/forbes/

Más contenido relacionado

Similar a Unit2PeerResponse 5006 Due 10.20.2022Response Guidelines .docx

Sogeti big data research privacy technology and the law
Sogeti big data research privacy technology and the lawSogeti big data research privacy technology and the law
Sogeti big data research privacy technology and the lawYann SESE
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4Data-Set
 

Similar a Unit2PeerResponse 5006 Due 10.20.2022Response Guidelines .docx (7)

Sogeti big data research privacy technology and the law
Sogeti big data research privacy technology and the lawSogeti big data research privacy technology and the law
Sogeti big data research privacy technology and the law
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
 

Más de jolleybendicty

Which of the following statements regarding components of a time ser.docx
Which of the following statements regarding components of a time ser.docxWhich of the following statements regarding components of a time ser.docx
Which of the following statements regarding components of a time ser.docxjolleybendicty
 
Which of the works we read was used by President Bushs 2002 appoint.docx
Which of the works we read was used by President Bushs 2002 appoint.docxWhich of the works we read was used by President Bushs 2002 appoint.docx
Which of the works we read was used by President Bushs 2002 appoint.docxjolleybendicty
 
Which of these articles confirms or negates your view on housing ava.docx
Which of these articles confirms or negates your view on housing ava.docxWhich of these articles confirms or negates your view on housing ava.docx
Which of these articles confirms or negates your view on housing ava.docxjolleybendicty
 
Which of these images represents the following system of equations b.docx
Which of these images represents the following system of equations b.docxWhich of these images represents the following system of equations b.docx
Which of these images represents the following system of equations b.docxjolleybendicty
 
Which of these images tells us the most about the rise, fall and the.docx
Which of these images tells us the most about the rise, fall and the.docxWhich of these images tells us the most about the rise, fall and the.docx
Which of these images tells us the most about the rise, fall and the.docxjolleybendicty
 
Which of the following was a component of the Earths Hadean atm.docx
Which of the following was a component of the Earths Hadean atm.docxWhich of the following was a component of the Earths Hadean atm.docx
Which of the following was a component of the Earths Hadean atm.docxjolleybendicty
 
Which of the following statements was true of the Homestead Strike.docx
Which of the following statements was true of the Homestead Strike.docxWhich of the following statements was true of the Homestead Strike.docx
Which of the following statements was true of the Homestead Strike.docxjolleybendicty
 
Which of the following studies would require a scientist to have e.docx
Which of the following studies would require a scientist to have e.docxWhich of the following studies would require a scientist to have e.docx
Which of the following studies would require a scientist to have e.docxjolleybendicty
 
Which of the following statements is true about the Internet[remo.docx
Which of the following statements is true about the Internet[remo.docxWhich of the following statements is true about the Internet[remo.docx
Which of the following statements is true about the Internet[remo.docxjolleybendicty
 
Which of the following occurred after the Civil WarAnswer.docx
Which of the following occurred after the Civil WarAnswer.docxWhich of the following occurred after the Civil WarAnswer.docx
Which of the following occurred after the Civil WarAnswer.docxjolleybendicty
 
Which of the following statements about bodhisattvas is true..docx
Which of the following statements about bodhisattvas is true..docxWhich of the following statements about bodhisattvas is true..docx
Which of the following statements about bodhisattvas is true..docxjolleybendicty
 
Which of the following statements about Mexican immigration to.docx
Which of the following statements about Mexican immigration to.docxWhich of the following statements about Mexican immigration to.docx
Which of the following statements about Mexican immigration to.docxjolleybendicty
 
Which of the following statements is NOT true of an atomthat.docx
Which of the following statements is NOT true of an atomthat.docxWhich of the following statements is NOT true of an atomthat.docx
Which of the following statements is NOT true of an atomthat.docxjolleybendicty
 
Which of the following is true of chemical properties (2 points).docx
Which of the following is true of chemical properties (2 points).docxWhich of the following is true of chemical properties (2 points).docx
Which of the following is true of chemical properties (2 points).docxjolleybendicty
 
Which of the following is NOT true of dialects (Points 1)       .docx
Which of the following is NOT true of dialects (Points  1)       .docxWhich of the following is NOT true of dialects (Points  1)       .docx
Which of the following is NOT true of dialects (Points 1)       .docxjolleybendicty
 
Which of the following is true in a monopolyA.)Business owner.docx
Which of the following is true in a monopolyA.)Business owner.docxWhich of the following is true in a monopolyA.)Business owner.docx
Which of the following is true in a monopolyA.)Business owner.docxjolleybendicty
 
Which of the following psychological perspectives is most likely to .docx
Which of the following psychological perspectives is most likely to .docxWhich of the following psychological perspectives is most likely to .docx
Which of the following psychological perspectives is most likely to .docxjolleybendicty
 
Which of the following is true a. Economics is the study of the .docx
Which of the following is true a. Economics is the study of the .docxWhich of the following is true a. Economics is the study of the .docx
Which of the following is true a. Economics is the study of the .docxjolleybendicty
 
Which of the following is the net requirement using an MRP program i.docx
Which of the following is the net requirement using an MRP program i.docxWhich of the following is the net requirement using an MRP program i.docx
Which of the following is the net requirement using an MRP program i.docxjolleybendicty
 
Which of the following is not a way managers generally benefit from .docx
Which of the following is not a way managers generally benefit from .docxWhich of the following is not a way managers generally benefit from .docx
Which of the following is not a way managers generally benefit from .docxjolleybendicty
 

Más de jolleybendicty (20)

Which of the following statements regarding components of a time ser.docx
Which of the following statements regarding components of a time ser.docxWhich of the following statements regarding components of a time ser.docx
Which of the following statements regarding components of a time ser.docx
 
Which of the works we read was used by President Bushs 2002 appoint.docx
Which of the works we read was used by President Bushs 2002 appoint.docxWhich of the works we read was used by President Bushs 2002 appoint.docx
Which of the works we read was used by President Bushs 2002 appoint.docx
 
Which of these articles confirms or negates your view on housing ava.docx
Which of these articles confirms or negates your view on housing ava.docxWhich of these articles confirms or negates your view on housing ava.docx
Which of these articles confirms or negates your view on housing ava.docx
 
Which of these images represents the following system of equations b.docx
Which of these images represents the following system of equations b.docxWhich of these images represents the following system of equations b.docx
Which of these images represents the following system of equations b.docx
 
Which of these images tells us the most about the rise, fall and the.docx
Which of these images tells us the most about the rise, fall and the.docxWhich of these images tells us the most about the rise, fall and the.docx
Which of these images tells us the most about the rise, fall and the.docx
 
Which of the following was a component of the Earths Hadean atm.docx
Which of the following was a component of the Earths Hadean atm.docxWhich of the following was a component of the Earths Hadean atm.docx
Which of the following was a component of the Earths Hadean atm.docx
 
Which of the following statements was true of the Homestead Strike.docx
Which of the following statements was true of the Homestead Strike.docxWhich of the following statements was true of the Homestead Strike.docx
Which of the following statements was true of the Homestead Strike.docx
 
Which of the following studies would require a scientist to have e.docx
Which of the following studies would require a scientist to have e.docxWhich of the following studies would require a scientist to have e.docx
Which of the following studies would require a scientist to have e.docx
 
Which of the following statements is true about the Internet[remo.docx
Which of the following statements is true about the Internet[remo.docxWhich of the following statements is true about the Internet[remo.docx
Which of the following statements is true about the Internet[remo.docx
 
Which of the following occurred after the Civil WarAnswer.docx
Which of the following occurred after the Civil WarAnswer.docxWhich of the following occurred after the Civil WarAnswer.docx
Which of the following occurred after the Civil WarAnswer.docx
 
Which of the following statements about bodhisattvas is true..docx
Which of the following statements about bodhisattvas is true..docxWhich of the following statements about bodhisattvas is true..docx
Which of the following statements about bodhisattvas is true..docx
 
Which of the following statements about Mexican immigration to.docx
Which of the following statements about Mexican immigration to.docxWhich of the following statements about Mexican immigration to.docx
Which of the following statements about Mexican immigration to.docx
 
Which of the following statements is NOT true of an atomthat.docx
Which of the following statements is NOT true of an atomthat.docxWhich of the following statements is NOT true of an atomthat.docx
Which of the following statements is NOT true of an atomthat.docx
 
Which of the following is true of chemical properties (2 points).docx
Which of the following is true of chemical properties (2 points).docxWhich of the following is true of chemical properties (2 points).docx
Which of the following is true of chemical properties (2 points).docx
 
Which of the following is NOT true of dialects (Points 1)       .docx
Which of the following is NOT true of dialects (Points  1)       .docxWhich of the following is NOT true of dialects (Points  1)       .docx
Which of the following is NOT true of dialects (Points 1)       .docx
 
Which of the following is true in a monopolyA.)Business owner.docx
Which of the following is true in a monopolyA.)Business owner.docxWhich of the following is true in a monopolyA.)Business owner.docx
Which of the following is true in a monopolyA.)Business owner.docx
 
Which of the following psychological perspectives is most likely to .docx
Which of the following psychological perspectives is most likely to .docxWhich of the following psychological perspectives is most likely to .docx
Which of the following psychological perspectives is most likely to .docx
 
Which of the following is true a. Economics is the study of the .docx
Which of the following is true a. Economics is the study of the .docxWhich of the following is true a. Economics is the study of the .docx
Which of the following is true a. Economics is the study of the .docx
 
Which of the following is the net requirement using an MRP program i.docx
Which of the following is the net requirement using an MRP program i.docxWhich of the following is the net requirement using an MRP program i.docx
Which of the following is the net requirement using an MRP program i.docx
 
Which of the following is not a way managers generally benefit from .docx
Which of the following is not a way managers generally benefit from .docxWhich of the following is not a way managers generally benefit from .docx
Which of the following is not a way managers generally benefit from .docx
 

Último

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 

Último (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 

Unit2PeerResponse 5006 Due 10.20.2022Response Guidelines .docx

  • 1. Unit2PeerResponse 5006 Due 10.20.2022 Response Guidelines To practice thinking critically and communicating when advocating for your point of view on behalf of your clients, challenge a colleague's policy analytic method, value critical analysis versus analytic descriptive, by providing competing arguments for using the opposite method. Peer Response to challenge: The value critical analysis is defined as “economic, cultural, and social structures privilege some and not others, those who are not privileged tend to need social work service because of their position in such structures (Chambers & Bonk, 2014)”. Analytic descriptive method evaluation is defined as a method that “identifies or describes a social policy or program and what the outcome should be as a result of the identifiable challenge (Chambers & Bonk, 2014)”.There are a few differences between the two forms of analysis. The differences are that the value critical analysis evaluates the process of using current and historical data to identify trends and relationships but doesn't dig deep into the concern, analytic descriptive method policy analysis is the description of a social policy or program, and considers the impacts that the policy or program will have on their neighbors or friends.The analytic descriptive method offers a viewpoint of how things works. In order to best address the issue I presented in my discussion I would use the analytic approach to analyze the various ways social policy can help balance the equal rights of women.
  • 2. 8/21/2021 The Erosion Of Privacy As We Know It https://www.forbes.com/sites/forbestechcouncil/2017/06/21/the- erosion-of-privacy-as-we-know-it/?sh=7c127e075208 1/5 Innovation POST WRITTEN BY Reg Harnish CEO of GreyCastle Security, a cybersecurity consulting firm dedicated to the practical management of cybersecurity risks. The Erosion Of Privacy As We Know It Jun 21, 2017, 09:00am EDT Reg Harnish Forbes Councils Member Forbes Technology Council COUNCIL POST | Membership (fee-based) A decade ago, who would have thought an electronic heart device could be connected to the internet? Or that the data from that same device could lead to an arson and insurance fraud conviction of the very man it was placed in?
  • 3. If our own bodily functions can’t be kept private, what makes us think that everything else isn’t already waiting to be exposed? As technology makes its way into every aspect of our lives, we are increasingly trading our privacy for convenience, whether we know it or not. But based on the example above, and assuming you are a law-abiding citizen, this might not be a bad thing. https://www.forbes.com/innovation https://www.greycastlesecurity.com/ https://www.forbes.com/sites/forbestechcouncil/ https://www.forbes.com/sites/forbestechcouncil/people/regharni sh/ https://www.forbes.com/sites/forbestechcouncil/ http://fortune.com/2017/02/07/pacemaker-arson-charges/ 8/21/2021 The Erosion Of Privacy As We Know It https://www.forbes.com/sites/forbestechcouncil/2017/06/21/the- erosion-of-privacy-as-we-know-it/?sh=7c127e075208 2/5 In today’s world, we are never alone. Most people don’t realize they will be photographed roughly 15 times, on average, during a simple drive to the supermarket. On that same trip, they’ll typically end up on about 90 seconds of video without ever knowing about it. The texts and the calls they made on the way could also be tracked. The
  • 4. metadata will be sent instantly to databases around the world and into the cloud, where it will be immediately available to hundreds, perhaps thousands, of people and organizations. Our smartphones are broadcasting our exact locations at every moment, possibly sending the information to our friends, governments around the world, certainly to the National Security Agency (NSA) and to many others we are not aware of. Let’s face it: Privacy as we know it is gone. But is that such a bad thing? Some argue that privacy is an intrinsic value and shouldn’t be treated as a dispensable commodity. They argue that privacy is essential for self- development, and without that, we would all conform to each other and lose our individuality. Today, however, most Americans have unwittingly opted out of privacy for the convenience of surfing the web, monitoring their fitness activity with health trackers or receiving digital discounts at the grocery store, just to name a few. Our texts, medical records and credit card information all have been entered online and provided at our consent through terms and conditions. In fact, if we actually read through all of the terms and conditions each one of us is subjected to each year, it would
  • 5. take about 76 work days to complete. Shutterstock http://crimefeed.com/2015/02/eyes-many-times-caught- surveillance-cameras-per-day/ https://philosophia.uncg.edu/phi361-matteson/module-6- privacy-property-and-technology/why-do-we-value-privacy/ http://techland.time.com/2012/03/06/youd-need-76-work-days- to-read-all-your-privacy-policies-each-year/ 8/21/2021 The Erosion Of Privacy As We Know It https://www.forbes.com/sites/forbestechcouncil/2017/06/21/the- erosion-of-privacy-as-we-know-it/?sh=7c127e075208 3/5 By spending so much time online or opting in to terms and conditions, we are essentially allowing third parties not only to create digital copies of ourselves but also to predict our behaviors before we even know how we will behave ourselves. Again, is that such a bad thing? Maybe it’s time we embrace this change. Here are three benefits that I believe will come from the erosion of privacy as we know it today: Less Cybercrime The mere fact that we assign value to privacy makes it worth
  • 6. stealing. Take social security numbers, for example. SSNs were never intended to be anything more than a means for tracking the earnings histories of U.S. workers to determine their benefit entitlements. Now, someone can use your social security number to open a bank account under your name, receive benefits and ultimately steal your identity -- all because we put so much value on a previously worthless nine-digit number. We as a society created a need to keep social security numbers private, and now it’s coming back to haunt us. Like our SSNs, information -- including NSA records, the security cameras that line our city streets and corporate databases -- should be made public. The more public our information is, the less it’s worth, therefore limiting any real value for cybercriminals. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify? Improved Health A world without privacy has many benefits that extend far beyond receiving tailored advertisements and discounts showing up on your social media
  • 7. https://www.ssa.gov/policy/docs/ssb/v69n2/v69n2p55.html http://www.forbestechcouncil.com/qualify/?source=forbes-text http://www.forbestechcouncil.com/qualify/?source=forbes-text 8/21/2021 The Erosion Of Privacy As We Know It https://www.forbes.com/sites/forbestechcouncil/2017/06/21/the- erosion-of-privacy-as-we-know-it/?sh=7c127e075208 4/5 feed. It can also save lives. Currently, our health data is protected by the Health Insurance Portability and Accountability Act (HIPAA), which limits disclosure of patient data and mandates secure storage and transmission of electronic records. But what patients don’t realize is their health data may provide the next big breakthrough in medicine. By freely sharing our information -- such as the state of our own health, medications we’re taking, side effects we are experiencing and our lifestyle habits -- we can help medical providers, entrepreneurs and companies make new medical discoveries that would not be possible without access to the large amounts of data that is currently being protected. If we truly want answers to the world’s biggest health mysteries, we must be willing to share our most personal health information. We’ll not only save
  • 8. lives, but we may just all live a little bit longer. Transparency Privacy as we know it has only existed for a short time. If we continue to fight it, we are doing ourselves a disservice, because the more we continue to keep our information hidden from the masses, the longer our governments and a select few will be the only entities with access to it. Having large sums of data and metadata in the hands of only a few, allowing them to dictate the flow of information, could set the stage for societal peril. Our information should be shared democratically like it was in simpler times, when everyone knew everything about you. Your favorite color. Your favorite food. What made you laugh. Your kids’ names. Where is the harm in that? Once information flows freely, governments will be forced to follow suit with transparency. If we can’t stop the erosion of privacy as we know it, let’s embrace a society without it. Maybe we just might make the world a better place. https://www.virgin.com/entrepreneur/why-you-have-duty-share- your-health-data https://medium.com/the-ferenstein-wire/the-birth-and-death-of- privacy-3-000-years-of-history-in-50-images-614c26059e
  • 9. 8/21/2021 The Erosion Of Privacy As We Know It https://www.forbes.com/sites/forbestechcouncil/2017/06/21/the- erosion-of-privacy-as-we-know-it/?sh=7c127e075208 5/5 Reg Harnish Reg Harnish is the CEO of GreyCastle Security, a cybersecurity consulting firm dedicated to the practical management of cybersecurity risks.… Read More ADVERTISEMENT Reprints & Permissions https://www.forbes.com/sites/forbestechcouncil/people/regharni sh/ https://www.greycastlesecurity.com/ https://www.forbes.com/sites/forbestechcouncil/people/regharni sh/ https://www.parsintl.com/publication/forbes/