Privacy and Other Social Issues

Slides:



Advertisements
Similar presentations
The Internet.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 Identity Theft and Phishing: What You Need to Know.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
Legal and Ethical Issues: Privacy and Security Chapter Five.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Chapter 10 Privacy and Other Social Issues. Copyright © 2003, Addison-Wesley What Is Privacy? Freedom from observation, intrusion, or attention of others.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Chapter 10 Privacy and Other Social Issues. Old Florida saying Only two things in the water after dark. Gators and gator food.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Copyright © 2004 Pearson Education, Inc. Slide 7-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Chapter 11 Security and Privacy: Computers and the Internet.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
BA J. Galván1 PRIVACY and Other Social Issues.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Privacy, Security and Ethics
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
BASIC CONCEPTS ON INTERNET &
Security, Social and Legal Issues Regarding Software and Internet
Add video notes to lecture
Misuses of ICT Malpractice and crime © Folens 2008.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
CHAPTER FOUR OVERVIEW SECTION ETHICS
IT Security  .
Chapter 10 Cyberlaw, Social Media, and Privacy
Digital Citizenship Middle School
HISTORY OF COMPUTERS AND TECHNOLOGY
Legal and Ethical Issues in E-Commerce
CHAPTER 33 Cyberlaw.
E-Commerce: Regulatory, Ethical, and Social Environments
Societal Issues in Computing (COMP466)
Information Security Session October 24, 2005
Computers and the Internet
Internet Safety Vocabulary
Chapter 10: Privacy, Security, and Ethics
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
CHAPTER FOUR OVERVIEW SECTION ETHICS
Protecting Your Credit Identity
A Gift of Fire Third edition Sara Baase
INFS 452 – Computer Ethics & Society
Personal Privacy and the Public Internet
Presentation transcript:

Privacy and Other Social Issues Chapter 10 Privacy and Other Social Issues

Only two things in the water after dark. Gators and gator food. Old Florida saying Only two things in the water after dark. Gators and gator food.

Arthur C. Clarke, science fiction author Any sufficiently advanced technology is indistinguishable from magic.

Copyright © 2003, Addison-Wesley The FUD Factor Fear, uncertainty, and doubt What you do not know can hurt you The gators in Upper Myakka Lake The lowlifes on the Web Online access opens new opportunities A little knowledge is your best defense Copyright © 2003, Addison-Wesley

Scott McNealy, CEO, Sun Microsystems, Inc. You have zero privacy. Get over it.

Copyright © 2003, Addison-Wesley What Is Privacy? Freedom from observation, intrusion, or attention of others Society’s needs sometimes trump individual privacy Privacy rights are not absolute Balance needed Individual rights Society’s need Copyright © 2003, Addison-Wesley

Some Privacy Issues and Tools Perpetrators &Tools Hackers Script kiddies Viruses and worms Cookies Backdoors Denial of service Packet sniffers IP spoofing TEMPEST Issues Industrial espionage Information theft Data modification Software modification Pirated software Snooping Tracking Identity theft Copyright © 2003, Addison-Wesley

Copyright © 2003, Addison-Wesley Privacy and the Law No constitutional right to privacy The word “privacy” is not in the Constitution Congress has passed numerous laws Not particularly effective Issue is pace of change Privacy is a function of culture Privacy means different things in different countries and regions Serious problem on global Internet Copyright © 2003, Addison-Wesley

Figure 10.1 Some U.S. privacy laws.     Figure 10.1 Some U.S. privacy laws. Year Title Intent 1970 Fair Credit Reporting Act Limits the distribution of credit reports to those who need to know. 1974 Privacy Act Establishes the right to be informed about personal information on government databases. 1978 Right to Financial Privacy Act Prohibits the federal government from examining personal financial accounts without due cause. 1986 Electronic Communications Privacy Act Prohibits the federal government from monitoring personal e-mail without a subpoena. 1988 Video Privacy Protection Act Prohibits disclosing video rental records without customer consent or a court order. 2001 Patriot Act Streamlines federal surveillance guidelines to simplify tracking possible terrorists. Copyright © 2003, Addison-Wesley  

Collecting Personal Information Notice/awareness You must be told when and why Choice/consent Opt-in or opt-out Access/participation You can access and suggest corrections Integrity/security Collecting party is responsible Enforcement/redress You can seek legal remedies Copyright © 2003, Addison-Wesley

Figure 10. 3 Amazon.com’s privacy policy. Copyright © 2003, Addison-Wesley

Figure 10.4 Dell displays the BBB seal. Seal of approval BBB TRUSTe WebTrust Enhances Web site’s credibility Copyright © 2003, Addison-Wesley

Collecting Personal Information Often voluntary Filling out a form Registering for a prize Supermarket “Rewards” cards Legal, involuntary sources Demographics Change of address Various directories Government records Copyright © 2003, Addison-Wesley

Figure 10.5 Online personal information. Copyright © 2003, Addison-Wesley

Completing the Picture Aggregation Combining data from multiple sources Complete dossier Demographics Finding missing pieces Browser supplied data – TCP/IP Public forums – monitoring Samurai Copyright © 2003, Addison-Wesley

Capturing Clickstream Data Record of individual’s Internet activity Web sites and newsgroups visited Incoming and outgoing e-mail addresses Tracking Secretly collecting clickstream data ISP in perfect position to track you All transactions go through ISP Using cookies Using Web bugs Copyright © 2003, Addison-Wesley

Figure 10.6 Tracking with cookies. Client requests Acme page Acme returns page Client requests embedded banner from Gotcha Gotcha returns banner and cookie Copyright © 2003, Addison-Wesley

Figure 10.7 A cookie from DoubleClick. “Gotcha” and DoubleClick sell aggregated data Copyright © 2003, Addison-Wesley

Copyright © 2003, Addison-Wesley Tracking with Web Bugs Web bug – single-pixel clear GIF Image reference buried in HTML Browser requests image Server returns bug plus cookie Request provides clickstream data Difficult to spot a Web bug Web bug in HTML formatted e-mail Secret return receipt Copyright © 2003, Addison-Wesley

Figure 10.8 A demonstration Web bug. This Web bug is designed to be seen Copyright © 2003, Addison-Wesley

Figure 10.9 A Web bug buried in an e-mail message. Again, this one is designed to be seen Copyright © 2003, Addison-Wesley

Copyright © 2003, Addison-Wesley Some Useful Sites Tracking http://privacy.net/track Illustration of how a company can track you http://www.acxiom.com/infobase Consumer, business, and telephone data A sense of what is available Cookies http://www.cookiecentral.com Everything you want to know about cookies Copyright © 2003, Addison-Wesley

Surveillance and Monitoring Continual observation Tampa – facial scanning at Super Bowl Packet sniffing Monitoring The act of watching someone or something E-mail Web bugs Workplace monitoring is legal Copyright © 2003, Addison-Wesley

Surveillance and Monitoring Tools Spyware Sends collected data over back channel Snoopware Records target’s online activities Retrieved later Screen shots, logs, keystrokes Other surveillance/monitoring sources OnStar and GPS tracking E-ZPass systems Phone calls and credit card purchases Copyright © 2003, Addison-Wesley

Copyright © 2003, Addison-Wesley Spam Electronic junk mail Hackers dislike spammers Flame attacks Spammers use anonymous remailers Mailing list sources Online personal information services Dictionary attack software Do not respond in any way! Copyright © 2003, Addison-Wesley

Copyright © 2003, Addison-Wesley Anonymous Remailers Some good FAQs http://www.andrebacard.com/remail.html An example http://www.anonymizer.com What they know about you Not an endorsement Copyright © 2003, Addison-Wesley

Figure 10.10 This banner ad mimics a dialog box. Do not click OK. Fake banner ads like this one are very annoying Spawner – spawns its own pop-up ads Mouse-trapper Turns off browser’s Back button Disable pop-ups ad’s close button No way to close ad – must reboot Spam is a source of spawners and mouse-trappers Copyright © 2003, Addison-Wesley

Copyright © 2003, Addison-Wesley Fraud The crime of obtaining money or some other benefit by deliberate deception. We will consider Identity theft Credit card fraud Scammers and con artists Financial swindles Copyright © 2003, Addison-Wesley

Copyright © 2003, Addison-Wesley Identity Theft The act of using another person’s identity to surf the web, make purchases, etc. Not necessarily online Dumpster diving Shred those credit card offers Protect your social security number Protect your credit card number The Web simplifies identity theft Copyright © 2003, Addison-Wesley

Copyright © 2003, Addison-Wesley Credit Card Fraud As old as credit cards Cost of doing business Can be controlled, but not eliminated Not necessarily online SSL reduces risk Greatest risk Attack on merchant’s database Attractive target Copyright © 2003, Addison-Wesley

Scammers and Con Artists Social engineering – ask for credit card Pyramid schemes or Ponzi schemes Cash flow depends on new participants Dialer programs Scam Web site terminates ISP connection Establish expensive long-distance connection Rogue Web sites Clones and misspelled URLs Auction fraud Shill bidding Copyright © 2003, Addison-Wesley

Copyright © 2003, Addison-Wesley Financial Swindles Stock fraud Pump-and-dump Buy cheap stock Hype it online – chat rooms Dump it when price goes up Popular organized crime tool Fee for credit card or loan Requests for social security or credit card number Copyright © 2003, Addison-Wesley

Pornography and Gambling Online pornography is thriving business Worldwide distribution Free speech and free press protected by US Constitution Prosecution difficult Porn napping Taking over lapsed or innocent URLs Gambling, or gaming Legal in most states and offshore Who do you call? The police? Copyright © 2003, Addison-Wesley

Protecting Your Online Privacy Implement appropriate security measures Get a copy of your credit report Use: Junk e-mail account Anonymous remailer Stealth surfing service Common sense Deal with recognized, trusted e-retailers Keep important numbers and passwords secret Use good passwords If your computer acts strangely, find out why Copyright © 2003, Addison-Wesley