A Gift of Fire Third edition Sara Baase

Slides:



Advertisements
Similar presentations
Organise Workplace Information
Advertisements

Criteria For Approval 45 CFR CFR Minimized risks Reasonable risk/benefit ratio Equitable subject selection Informed consent process Informed.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
PowerPoint® Slides to Accompany
Slides prepared by Cyndi Chie and Sarah Frye Modified for Auburn University by Cheryl Seals A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Cyberculture and Privacy Baase, Chp 2. Cyberculture and Privacy A.Computers and Privacy Computers are not needed for the invasion of privacy. 1.Computers.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 9: Professional Ethics and Responsibilities.
A Gift of Fire Third edition Sara Baase
Internet Ethics Presented by: Daniel Wu Kalven Wu.
A Gift of Fire Fourth edition Sara Baase
CS4020 Privacy L. Grewe What We Will Cover Privacy and Computer Technology “Big Brother is Watching You” Privacy Topics Protecting Privacy Communications.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
Operational Data Tools Chapter Eight. Copyright © Houghton Mifflin Company. All rights reserved.8–28–2 Chapter Eight Learning Objectives To learn database.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
IS 490 Notes for Baase Textbook, Chapter 2. Check the Homework Page for the weekly assignment (it's due next Monday). Go to the Angel Page for this course,
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
A Gift of Fire Third edition Sara Baase
Data Privacy and Security Prof Sunil Wattal. Consumer Analytics  Analytics with consumer data to derive meaningful insights on actions and behaviors.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Privacy and Personal Information
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”
Science and Environment Area of Impact.  UK Citizens  Citizens that had exposed their biological data (DNA) with the scientists in one way or another.
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 9: Professional Ethics and Responsibilities.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 1: Unwrapping the Gift.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 7: Evaluating and Controlling Technology.
Internal Audit Data Protection
What is Privacy?. 3 Types of Privacy 1.Accessibility Privacy 2.Decisional Privacy 3.Informational Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
First week. Catalog Description This course explores basic cultural, social, legal, and ethical issues inherent in the discipline of computing. Students.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
Framework of engagement : big data for official use Roy D. Ibay AVP Regulatory PLDT – Smart.
Privacy and the Law.
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Societal Issues in Computing (COMP466)
Market Research in Sports/Entertainment
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
What are the Major Changes to the IRB under the Final Common Rule?
A Gift of Fire Third edition Sara Baase
INFS 452 – Computer Ethics & Society
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
IT and Society Week 2: Privacy.
A Gift of Fire Third edition Sara Baase
Interviewer Research Ethics
Presentation transcript:

A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye

What We Will Cover Privacy and Computer Technology “Big Brother is Watching You” Privacy Topics Protecting Privacy Communications

Privacy and Computer Technology Key Aspects of Privacy: Freedom from intrusion (being left alone) Control of information about oneself Freedom from surveillance (being tracked, followed, watched)

Privacy and Computer Technology (cont.) New Technology, New Risks: Government and private databases Sophisticated tools for surveillance and data analysis Vulnerability of data

Privacy and Computer Technology (cont.) Terminology: Invisible information gathering - collection of personal information about someone without the person’s knowledge Secondary use - use of personal information for a purpose other than the one it was provided for

Privacy and Computer Technology (cont.) Terminology (cont.): Data mining - searching and analyzing masses of data to find patterns and develop new information or knowledge Computer matching - combining and comparing information from different databases (using social security number, for example, to match records)

Privacy and Computer Technology (cont.) Terminology (cont.): Computer profiling - analyzing data in computer files to determine characteristics of people most likely to engage in certain behavior

Privacy and Computer Technology (cont.) Principles for Data Collection and Use: Informed consent Opt-in and opt-out policies Fair Information Principles (or Practices) Data retention

Privacy and Computer Technology In-class Discussion Questions Have you seen opt-in and opt-out choices? Where? How were they worded? Were any of them deceptive? What are some common elements of privacy policies you have read? If the class doesn't mention it, make sure to mention that online opt-in choices may be pre-checked and require you un-checking the box to avoid opting in. Be sure to mention the "subject to change without notice" clause found in most privacy policies.