Points: 100 | Assignment 2: Interactive Activity: The Value of Digital Privacy in an Information Technology Age (Thread Discussion Summary) |
Criteria | Unacceptable Below 70% F | Fair 70-79% C | Proficient 80-89% B | Exemplary 90-100% A |
1. List and describe at least three (3) technologies that allow an individual to research citizens’ private data. Weight: 15% | Did not submit or incompletely listed and described at least three (3) technologies that allow an individual to research citizens’ private data. | Partially listed and described at least three (3) technologies that allow an individual to research citizens’ private data. | Satisfactorily listed and described at least three (3) technologies that allow an individual to research citizens’ private data. | Thoroughly listed and described at least three (3) technologies that allow an individual to research citizens’ private data. |
2. Discuss the advantages and disadvantages of public access to this information, both for the researchers and those who are being “ investigated”. Weight: 20% | Did not submit or incompletely discussed the advantages and disadvantages of public access to this information, both for the researchers and those who are being “investigated”. | Partially discussed the advantages and disadvantages of public access to this information, both for the researchers and those who are being “ investigated”. | Satisfactorily discussed the advantages and disadvantages of public access to this information, both for the researchers and those who are being “ investigated”. | Thoroughly discussed the advantages and disadvantages of public access to this information, both for the researchers and those who are being “ investigated”. |
3. Determine what measures citizens can take to protect private information or information they do not want to be disclosed. Weight: 15% | Did not submit or incompletely determined what measures citizens can take to protect private information or information they do not want to be disclosed. | Partially determined what measures citizens can take to protect private information or information they do not want to be disclosed. | Satisfactorily determined what measures citizens can take to protect private information or information they do not want to be disclosed. | Thoroughly determined what measures citizens can take to protect private information or information they do not want to be disclosed. |
4. Discuss a federal law that grants the federal government the legal right to make private information on U.S. citizens available to the public and whether or not you agree with this law. Weight: 20% | Did not submit or incompletely discussed a federal law that grants the federal government the legal right to make private information on U.S. citizens available to the public and whether or not you agree with this law. | Partially discussed a federal law that grants the federal government the legal right to make private information on U.S. citizens available to the public and whether or not you agree with this law. | Satisfactorily discussed a federal law that grants the federal government the legal right to make private information on U.S. citizens available to the public and whether or not you agree with this law. | Thoroughly discussed a federal law that grants the federal government the legal right to make private information on U.S. citizens available to the public and whether or not you agree with this law. |
5. Determine whether there are “electronic privacy laws” that can prevent others from having access to “private information” as well as how effective they are. Weight: 20% | Did not submit or incompletely determined whether there are “electronic privacy laws” that can prevent others from having access to “ private information” as well as how effective they are. | Partially determined whether there are “electronic privacy laws” that can prevent others from having access to “private information” as well as how effective they are. | Satisfactorily determined whether there are “electronic privacy laws” that can prevent others from having access to “private information” as well as how effective they are. | Thoroughly determined whether there are “electronic privacy laws” that can prevent others from having access to “private information” as well as how effective they are. |
6. Clarity, writing mechanics, and formatting requirements Weight: 10% | More than 6 errors present | 5-6 errors present | 3-4 errors present | 0-2 errors present |