Lecture4 Information Privacy 1-1. Overview Introduction Perspectives on privacy Information disclosures Data mining 1-2.

Slides:



Advertisements
Similar presentations
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Assessing Privacy Risks of Flash Cookies Kevin Fuller and Stacy Jordan February.
Advertisements

Interaction of RFID Technology and Public Policy Presentation at RFID Privacy MIT 15 TH November 2003 By Rakesh Kumar
Back to Table of Contents
Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.
Ethical Issues concerning Internet Privacy 1.  Personal information on the Internet has become a hot commodity because it can be collected, exchanged,
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Chapter 5: Information Privacy
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
INSURANCE How it works… Why YOU need it…. ALL ABOUT RISK The chance of financial loss from some type of danger RISK MANAGEMENT AVOID THE RISK – Don’t.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Consumer Behavior, Market Research
CISB 412 Social and Professional Issues Understanding Privacy.
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
Lesson 8.1 Budgeting and Planning
C4- Social, Legal, and Ethical Issues in the Digital Firm
Anonymity, Security, Privacy and Civil Liberties
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
The Internet and New Technologies Chapter 2. “We had a choice to enter the country and follow the law. Or we had a choice to not enter the country.” —Eric.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Privacy and Personal Information
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Virtual Business CREATING A WEB PRESENCE Copyright © Texas Education Agency, All rights reserved.
Day 2 – Marketing Research…
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
BASIC CONCEPTS OF COMPUTING.  What is a computer? What is a computer?  An expanded model of a computer An expanded model of a computer  The role of.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
DATA COLLECTION METHODS CONTENT PAGE How data is collected via questionnaires. How data is collected via questionnaires. How data is collected with mark.
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
Information Anxiety By Meghan Randinelli. Introduction Greatest problem concerning ethical information technology (IT) is personal privacy Greatest problem.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
CISB 412 Social and Professional Issues Understanding Privacy.
Copyright © 2004 by Nelson, a division of Thomson Canada Limited CANADIAN BUSINESS AND THE LAW Second Edition by Dorothy Duplessis Steven Enman Shannon.
E-Commerce. E-commerce at the consumer level  Online shopping (B2C transactions)  Online banking  Online Finance E-commerce at the business level 
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
6 Ethics and Privacy.
Managing the Information Copyright © Texas Education Agency, All rights reserved.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
Chapter 10 Electronic Commerce. E-commerce is the buying and selling of products and services electronically over the Internet.
What is Privacy?. 3 Types of Privacy 1.Accessibility Privacy 2.Decisional Privacy 3.Informational Privacy.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
Society & Computers PowerPoint
Copyright © Houghton Mifflin Company. All rights reserved. 4–1 Chapter Outline Marketing on the Internet –Basic Characteristics of Electronic Marketing.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Cybersecurity Test Review Introduction to Digital Technology.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Consumer Credit Selena Lanter-Mason/ Kerrie Kocs.
OCR Nationals - Unit 8 E-commerce – go to slide 11.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Chapter 5 – E-commerce and Enterprise Systems
Facebook privacy policy
The Internet Industry Week Two.
Chapter 4 Consumer Behavior, Online Market Research, and
Chapter 5: Information Privacy.
Big-Data Fundamentals
Computer Hardware-Meeting the machine
Latest Updates on BlackHawk Mines Music : Privacy Policy
Social Media as Instruments of Control and Consensus Making
Computers and Data Collection
Privacy and Information
Chapter 10: Privacy, Security, and Ethics
INFS 452 – Computer Ethics & Society
Presentation transcript:

Lecture4 Information Privacy 1-1

Overview Introduction Perspectives on privacy Information disclosures Data mining 1-2

Introduction Information Technology and Privacy Information collection, exchange, combination, and distribution easier than ever means less privacy. 1-3

Perspectives on Privacy Perspectives on Digital Privacy Slide 4- 4 Privacy Legal Social Technical Policy What rights? How is captured? When is it disclosed? How is it handled? What is it? Do we care?

Defining Privacy Privacy may be understood as a right to control access to and use of both physical items to information, like medical and financial facts. Physical privacy affords individuals access control rights over specific bodies, objects, and places. Informational privacy, on the other hand, allows individuals to control access to personal information Privacy related to notion of access -Access( Knowledge about a person) 1-5

Privacy On The Internet Include The Control Of The Information Detected By The Internet User Himself Determines Who Can Access This Information. What is Internet privacy? 1-6

. ISP (Internet Service Provider). Definition And Trace Files (Cookies). Login Information. Spyware (Spyware Programs). Phishing Information. Search Engines (Google). Social Networking On The Internet Networks (Facebook, Twitter) Privacy Risks 1-7

Benefits of Privacy Individual growth Individual responsibility Freedom to be yourself Intellectual growth Development of loving, trusting, caring, intimate relationships 1-8

1-9

What are the most important steps to protect your privacy: 1-10

Information Disclosures Public Records Private Records 1-11

. public record: information about an accident or action reported to a government agency.. for purpose of informing the public. examples: birth certificates, marriage licenses, criminal records, deeds to property. computerized databases and internet have made public records much easier to access Public Records 1-12

Records Held by Private Organizations Credit card purchases Voluntary disclosures Posts to social network sites 1-13

Data Gathering and Privacy Implications Facebook tags Body scanners Medical records Digital video recorders Cookies and flash cookies 1-14

Facebook Tags Tag: Label identifying a person in a photo Facebook allows users to tag people who are on their list of friends About 100 million tags added per day in Facebook Facebook uses facial recognition to suggest name of friend appearing in photo Does this feature increase risk of improper tagging? 1-15

Body Scanners Some department stores have 3-D body scanners Computer can use this information to recommend clothes Scans can also be used to produce custom- made clothing 1-16

Body Scanner Takes Measurements 1-17 AP Photo/Richard Drew

RFID Tags (Radio-frequency Identification) RFID: Radio frequency identification An RFID tag is a tiny wireless transmitter Manufacturers are replacing bar codes with RFID tags – Contain more information – Can be scanned more easily If tag cannot be removed or disabled, it becomes a tracking device 1-18

. there isnodoubt that (rfid )technology has many advantages in the areas which they are used.. but also allow for other people, violating the privacy of users of this technology, as easy to read rfid chips from unauthorized persons in the case used arfid reader. invasion of privacy 1-19

Automobile “Black Boxes” Modern automobiles come equipped with a “black box” Maintains data for five seconds: – Speed of car – Amount of pressure being put on brake pedal – Seat belt status After an accident, investigators can retrieve and gather information from “black box” 1-20

Medical Records Advantages of changing from paper-based to electronic medical records. Quicker and cheaper for information shared -Lower medical costs -Improve quality of medical care 1-21

Digital Video Recorders TiVo service allows subscribers to record programs and watch them later TiVo collects detailed information about viewing habits of its subscribers Data collected second by second, making it valuable to advertisers and others interested in knowing viewing habits 1-22

Cookies Cookie: File placed on computer’s hard drive by a Web server Contains information about visits to a Web site Allows Web sites to provide personalized services Put on hard drive without user’s permission You can set Web browser to alert you to new cookies or to block cookies entirely 1-23

Flash Cookies Flash cookie: File placed on your computer’s hard drive by a Web server running the Adobe Flash Player Flash cookie can hold 25 times as much information as a browser cookie Flash cookies not controlled by browser’s privacy controls Some Web sites use flash cookies as a way of backing up browser cookies. Half of 100 most popular Web sites use flash cookies 1-24

5.4 Data Mining Searching records in one or more databases, looking for patterns or relationships. Can be used to profiles of individuals. Allows companies to build more personal relationships with customers 1-25

Secondary Uses of Information 1-26

Collaborative Filtering Form of data mining Analyze information about preferences of large number of people to predict what one person may prefer – Explicit method: people rank preferences – Implicit method: keep track of purchases 1-27

Ownership of Transaction Information Who controls transaction information? – Buyer? – Seller? – Both? Opt-in: Consumer must explicitly give permission before the organization can share info Opt-out: Organization can share info until consumer explicitly forbid it. 1-28

Credit Reports Example of how information about customers can itself become a commodity Credit bureaus – Keep track of an individual’s assets, debts, and history of paying bills and repaying loans – Sell credit reports to banks, credit card companies, and other potential lenders System gives you more choices in where to borrow money Poor credit can hurt employment prospects 1-29

Social Network Analysis Data mining now incorporating information collected from social networks Examples – Police predict locations of big parties – Banks evaluate the riskiness of loans 1-30

Privacy Tomorrow Unlimited coverage (sensors everywhere) New types of data (location, habits, …) More knowledge through context And what about trust?