In some location systems, tracked objects gives up their identifiers to the infrastructure. Explain
how this may give rise to concerns about privacy, even if the identifiers are anonymous.

What will be an ideal response?

Consider that a user carries a tracked object (for example, a wearable or handheld device) everywhere. The
places that track the user could collude. If the identifier is directly correlated with the identity of the individual,
then the user’s movements become known, which they might not want. Even if the identifier is anonymous,
the more places that identifier is observed, the greater is the chance that it can be correlated with identifying
information. For example, if the user pays or signs for something and they are the only visitor in that place at
that time, then their identity becomes known and thus their movements. Moreover, in principle, movements
such as regular journeys (as between home and work) might also be used to make inferences. How many
employees of Acme Widgets Ltd live near enough to the Zenith Coffee bar to visit it every working morning?

Computer Science & Information Technology

You might also like to view...

Wildcard characters, such as a dollar sign ($), substitute for other characters when used in a query

Indicate whether the statement is true or false

Computer Science & Information Technology

The getNext function was inlined because:

A. it is likely to be used in a loop, so using it will be faster while not using too much memory for code B. the next element to get is in line with the previous element C. we need many copies of the getNext function, since there are many elements to retrieve D. searches are always faster when they are made in a straight line through the list

Computer Science & Information Technology