Week 5 A s s i g nm e n t
Part 2: Et h i c a l I s s u e s with Wearable Technologies Template
Directions: Use the wearable technology selected in the Week 3 Part 1: Examining Wearable Technologies assignment. Use
this template to complete the Part 2: Ethical Issues with Wearable Technologies assignment.
• Click into the box below to add your name and date.
• Click into each box where it says [TYPE HERE] on the following concept
• map slides. Remove the words [TYPE HERE] and answer the questions.
• Do not change the font size. Ensure the font color is black and that your answer fits
• within the box. Answer the questions under each section on all slides with explanation
• and detail.
Provide at least two scholarly sources from the Chamberlain Library to answer the questions. Provide an APA in-text
citation for the scholarly sources.
Name: Rebekah Walker
Date: August 5 - 10, 2024
, PRIVACY
Data Collection Data Storage
Data Access
What are privacy concerns related to what personal data is collected? What are the security concerns surrounding d
Some laws protect us when using personal information such as When it comes to security concerns it is not w
HIPPA; however, social, location and login credentials are at times What are the concerns surrounding who has access? misuse, and identity theft. Within the applicat
in jeopardy of being hacked. Most apps downloaded today come anything from sleep patterns, activity, heart ra
from a third party and those securities are easier to breach. Per When it comes to who has access to the information that has been other things, which are then stored in databas
CNBC due to most having Bluetooth connections, it leaves us more put into the apps, you risk potentially being hacked. However, that systems, (i.e. iCloud). This system is like a sa
susceptible to information breaches (Munk, 2022). is just one concern; another is that it is not sent to the party uploaded. However, some information may be
intended. This can be just another scam for getting information. party companies for research or other purpos
Personal information can be sold to third parties and advertisers
without that person’s knowledge or consent. This can be where
identity theft and data breaches are highly talked about. If
information is sold and bought it can cost the victim money, they
don’t necessarily have to fix what has been done to the name and
reputation (Silvia, 2023).
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller studyguider55. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $20.49. You're not tied to anything after your purchase.