When The Data You Want Comes From Hackers, Or, Looking A Gift Horse In The Mouth. Nathaniel Poor, Brooklyn, & Roei Davidson, U of Haifa. Pros: Data is.

Slides:



Advertisements
Similar presentations
Final Presentation CS By: Brittany Roy. My Book  Title:  Privacy Lost: How Technology Is Endangering Your Privacy  Author:  David H. Holtzman.
Advertisements

2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
EXAMPLES OF CREATIVE CAPITALISM IN ACTION. SIMPLE CORPORATE PHILANTHROPY: CORPORATIONS GIVE AWAY GOODS OR CASH TO PEOPLE WHO DESPERATELY NEED IT. Pro:
Steven Savage Swedish Defence Research Agency Dept. Of Information Systems Public body with expertise in surveillance systems, sensor technology and sensors.
08534: Web Browser Privacy and Security Survey of Firefox Add-ons that (Could) Leverage Social Processes Jeff Salk 10/13/20091Jeff Salk (08534-F09)
COMP427 ~ Assignment 1 Prepared By Joseph Leung. Question 1 Find 5 newspapers and / or magazine articles about hackers from the past few years. How are.
Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Privacy & Personal Information -- Why do we care or do we?
Quiz Review.
Employee Monitoring Con: Carmine Fieo Con: Samuel Heitzer Con: Robert Sagel Pro: Christina Hallock Pro: Tahmid Rashid Pro: Tynisha Snellbaker.
Protecting People and Information: Threats and Safeguards
Number 10: To Respond or Not to DMCA Notices Pro –Good faith effort towards content owner concerns. –As a matter of policy and citizenship obligations.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
Horse Idioms Byrdseed.com. Don't put the cart before the horse. Byrdseed.com.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
The Patriot Act Is Spying on US citizens Ethical?
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Write the Screening Questionnaire GGGE /2014  Steps for developing a screener :  Review the profile to understand users’ backgrounds  Identify.
Solar Energy By Jack Lin. Production of Solar Energy Solar energy is energy from the sun and it is easily harnessed with the use of solar panels How it.
BA 417: Business Ethics Mini-Lecture 5b: Privacy and Safety in the Workplace.
Labor Issues in Sports Presented to. Mandatory Issues  Working conditions  Hours  Wages.
Pros and cons to online learning By justin chalmers.
CJA 474 Week 4 DQ 1 NEW Check this A+ tutorial guideline at 474-NEW/CJA-474-Week-4-DQ-1-NEW What are the norms and.
IT 242 Week 3 DQ 1 To purchase this material link 242-Week-3-DQ-1 For more courses visit our website
BIS 320 Week 3 DQ 1 What are the pros and cons of social networks in business? How can companies use social networks to improve business? Check this A+
Critical Thinking What is critical thinking?
Add video notes to lecture
Sources of finance Muhammad Ashfaq.
Chapter 10 Cyberlaw, Social Media, and Privacy
Big Picture Consider this How many online threats might you be faced with a day?
Security.
Renewable Energy vs. Nonrenewable Energy
Developing a Methodology
Warm-up What are the three reasons why money is important?
Regulation of Investigatory Powers Act 2000
Ethical hacking
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Intercepting Communications
Pros & Cons of Mass Messaging for Businesses
Design & Evaluation Methods
4.3: Using Studies Wisely.
Societal Issues in Computing (COMP466)
– Communication Technology in a Changing World
GDPR Museums and you Copyright
ISNE101 Dr. Ken Cosh Week 13.
Records Required By ISO 9001:2000
Cyber Bullying Cyber Ethics Cyber Law
Web Site Privacy: How Much Should We Worry?
HOW DO I KEEP MY COMPUTER SAFE?
I PRO' -.._ r.. f FOLLOW I 0.
Dynamic Detection of Novice vs. Skilled Use Without a Task Model
GINA Genome Information Non-discrimination Act
Management Information Systems
APA Ethical Guidelines!
Management Information Systems
Social Engineering Humans are often the weakest point in security
Chapter One Data Collection
Norwegian workshop in madrid
FERPA Training Quiz.
Lesson 2: Correlational Analysis
Records Required By ISO 9001:2000
Watching two billion people
Principles of Information Technology
3.1 What is Business? Business Objectives Different Forms of Business
It matters By: Nina Fehrenbach
AS90844: EXternal pressures on A Large Business
Presentation transcript:

When The Data You Want Comes From Hackers, Or, Looking A Gift Horse In The Mouth. Nathaniel Poor, Brooklyn, & Roei Davidson, U of Haifa. Pros: Data is public, like a newspaper. We hope to serve the public good via our work. This is the data we want, but we can’t get it via other methods. Companies and the NSA look at it already. Cons: Public and private information in the data. May see private data when data cleaning. Perhaps legitimizing criminal activity. Violating users’ expectation of privacy. Using people’s data without consent. We want this data, but we don’t need it. Other data can be ethically collected. HCDS Workshop, CSCW 2016