Societal Issues in Computing (COMP466)

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Slides prepared by Cyndi Chie and Sarah Frye Modified for Auburn University by Cheryl Seals A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
A Gift of Fire Fourth edition Sara Baase
3 Ethics and Privacy.
CS4020 Privacy L. Grewe What We Will Cover Privacy and Computer Technology “Big Brother is Watching You” Privacy Topics Protecting Privacy Communications.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
A Gift of Fire Third edition Sara Baase
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Take Charge of your Finances
Privacy and the Law.
Add video notes to lecture
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
Take Charge of your Finances
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Securing Information Systems
Today’s Risk. Today’s Solutions. Cyber security and
COMPUTER PRIVACY.
Ethical and Social Issues in Information Systems
Computers and Data Collection
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Current Privacy Issues That May Affect Your Credit Union
Privacy and Information
Ethical and Social Issues in Information Systems
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Other Sources of Information
Chapter 10: Privacy, Security, and Ethics
ONE® Mail Training Presentation
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Privacy Issues part 4 Information/data privacy
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
INFS 452 – Computer Ethics & Society
Take Charge of your Finances
Communicating in the IT Industry
Protecting Yourself from Fraud including Identity Theft
IT and Society Week 2: Privacy.
Presentation transcript:

Societal Issues in Computing (COMP466) Chapter 4 COMPUTER PRIVACY Prepared by: Qasem Obeidat .

Ethics and Privacy Suppose you are a programmer for a medical organization, and while working, you see records about a celebrity. Is it ethical to describe the medical treatment to your friends?

Privacy Issues Anytime you submit information on the Internet, it is possible for it to be gathered by many individuals and used for various situations. Information can also be gathered from online data regarding: School Banking Hospitals Insurance Credit History, etc. If a company provides you with e-mail, the information you send is available to the company. The company can also monitor Internet logs to determine web sites that have been visited.

Computer security and data protection Do you store confidential information and records of negotiations with clients or business partners on your PC or laptop where they're easily accessible? How do you protect your company's financial data and personal computer privacy? Are there logs of your computer activity stored there, for example: site visit logs in the browser history, instant messenger history logs, incoming and outgoing email?

Computer security and data protection Your computer activity can be easily extracted when someone gains physical access to it if you don't use any computer security solutions. Competitors can steal your client database, criminals can read your personal identity or medical records, and your wife/husband/partner can take hold of your private correspondence. The list is endless, and there are many cases where our encryption software will save your money and definitely save your nerves.

Computer Privacy Demonstrates IT’s role in creating new opportunities for improved business performance Illustrates how technology can be a double-edged sword by providing benefits such as increased sales and security while compromising privacy. Computer data about you is bought, sold, and traded every day. More often than not, the exchange of data about you occurs without your knowledge.

Computer Privacy (Cont…) The front line of defense in protecting your personal privacy begins with you. All those forms, surveys, credit card transactions, etc. generate a vast amount of data about you.

Computer Invasion of Privacy Any person who uses a computer or computer network with the intention of examining any employment, medical, salary, credit, or any other financial or personal data relating to any other person with knowledge that such examination is without authority shall be guilty of the crime of computer invasion of privacy.

Privacy and Computer Technology Key Aspects of Privacy: Freedom from intrusion (being left alone) Control of information about oneself Freedom from surveillance (being tracked, followed, watched)

Privacy and Computer Technology (Cont…) New Technology, New Risks: Government and private databases Government agencies have very sophisticated tools for surveillance, watching us, collecting and analyzing data about us. Why? Vulnerability of data

Terminology Invisible information gathering - collection of personal information about someone without the person’s knowledge Secondary use - use of personal information for a purpose other than the one it was provided for Data mining - searching and analyzing masses of data to find patterns and develop new information or knowledge

Terminology (Cont…) Computer matching - combining and comparing information from different databases (using social security number, for example, to match records) Computer profiling - analyzing data in computer files to determine characteristics of people most likely to engage in certain behavior

Principles for Data Collection and Use: 1. Informed consent - How much they value there privacy? 2. Opt-in and opt-out policies - Opt-in: Organization can used information in a particular way. - Opt-out: Organization can’t used information in a particular way. 3. Fair Information Principles (or Practices) - very reasonable ethical guidelines and law. 4. Data retention

Diverse Privacy Topics 1. Marketing, Personalization and Consumer Dossiers: Targeted marketing Data mining Paying for consumer information Data firms and consumer profiles Credit records

Diverse Privacy Topics (Cont…) 2. Location Tracking: Global Positioning Systems (GPS) -computer or communication services that know exactly where a person is at a particular time Cell phones and other devices are used for location tracking Pros and cons

Diverse Privacy Topics (Cont…) 3. Stolen and Lost Data: Hackers Physical theft (laptops, thumb-drives, etc.) Requesting information under false pretenses Bribery of employees who have access

Diverse Privacy Topics (Cont…) 4. What We Do Ourselves : Personal information in blogs and online profiles Pictures of ourselves and our families File sharing and storing Is privacy old-fashioned? Young people put less value on privacy than previous generations May not understand the risks

Diverse Privacy Topics (Cont…) 5. Public Records: Access vs. Privacy: Public Records - records available to general public (bankruptcy, property, and arrest records, salaries of government employees, etc.) Identity theft can arise when public records are accessed How should we control access to sensitive public records?

Diverse Privacy Topics (Cont…) 6. National ID System: Social Security Numbers Too widely used Easy to falsify

Diverse Privacy Topics (Cont…) 7. Children: The Internet Not able to make decisions on when to provide information Vulnerable to online predators Parental monitoring Software to monitor Web usage Web cams to monitor children while parents are at work GPS tracking via cell phones or RFID

THE WAYS OF COMPUTER PRIVACY Password Encryption Email Privacy

PASSWORD Not just to protect the computer but to make sure that the computer issues by authorized worker or user only.

ENCRYPTION With public key encryption there are two keys, one public and the other private. The public key needs to be known. To send a message to a friend, you uses his public key to encrypt the message. Your friend then uses his private key to decode the message after receiving it.

EMAIL PRIVACY When u send a message by email, the message is broken into packets and the packets are sent out over the Internet. The number of packets depends on the size of message. Each message has the internet address of the recipient. This means there may be some places between the packets could be intercepted and examined.

Privacy Agility Fully Secure Non-Secure Security Full Disclosure Anonymous Privacy Public Opinion Solution Range

Privacy Laws Affecting Private Institutions Fair Credit Reporting Act of 1970 Family Educational Rights and Privacy Act of 1974 Right to Financial Privacy Act of 1978 Privacy Protection Act of 1980 Cable Communications Policy Act of 1984 Computer Fraud and Abuse Act of 1986 Electronic Communications Privacy Act of 1986 Video Privacy Protection Act of 1988 The Health Insurance Portability and Accountability Act of 1996 Children’s Online Privacy Protection Act of 1998 Financial Modernization Act (Gramm-Leach-Bliley Act) of 1999 But, these laws apply only to govt. intrusion