Privacy …refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.

Slides:



Advertisements
Similar presentations
Our Digital World Second Edition
Advertisements

4-1. Business in a Changing World McGraw-Hill/Irwin Copyright © 2009 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 4 Managing Information.
 In some countries, not-for-profit organizations are permitted to run advertisements through certain media outlets free-of-charge if the message contained.
Basics of Privacy TC 310 June 16, Protections of Privacy Not explicitly protected (by Right)‏  Fourth Amendment is closest Penumbra Protection.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Review 23 April. Group exercise  What lessons have you learned?  Write full sentences until I tell you to stop.  Examples: Code can affect behavior.
Hidden Apps Carrier IQ and Privacy in Mobile Devices.
3 Ethics and Privacy.
Direct and Online Marketing: The New Marketing Model
 Copyright 1999 Prentice Hall 17-1 Chapter 17 Direct and Online Marketing PRINCIPLES OF MARKETING Eighth Edition Philip Kotler and Gary Armstrong.
E-Commerce: Regulatory, Ethical, and Social Environments
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
CHAPTER 4 Marketing Information and Research: Analyzing the Business Environment Off-line and Online M A R K E T I N G.
Marketing Management Online marketing
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Steve Wicker Cornell University 1 TRUST Autumn 2011 Conference.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
CS2190 Discussion Topic: Governments, Companies, and User Privacy.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
6 Ethics and Privacy.
RFID and Public Policy Elliot Maxwell Fellow, Communications Program, Johns Hopkins University and Distinguished Research Fellow, Pennsylvania State University.
…refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected and stored.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
1 Ethics of Computing MONT 113G, Spring 2012 Session 29 Privacy.
28/01/20161 The Future of Online Privacy: Online advertising and behavioral targeting Kristina Irion Third Internet Governance Forum Thursday, 5/12/2008.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
Creating a Culture of Privacy Michael Kaiser Executive Director National Cyber Security
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
DRONES IN AERIAL SURVEILLANCE WHAT IS A DRONE ?  A drone, in a technological context, is an unmanned aircraft.  Drones are formally known as unmanned.
資安新聞簡報 報告者:劉旭哲. IE9 to Let Privacy-Minded Web Users Leave No Tracks.
Interactivity, social media, digital media and political activity Brooke Taylor and Erin McKinney.
ACO501 – Accommodation Sales & Marketing
A.M. Mustehsan E Commerce: Chapter-1
Big Data and Open Data What's in it for the archives?
RELATIONSHIP BETWEEN ENTREPRENEURSHIP AND ECONOMIC GROWTH.
Computer Literacy – Grade 8
E-commerce Business uses of internet, e-commerce & e-business, e-marketing, e-payments etc.
Dangers of Social Media
Your Turn Paraphrase the following:
UNIT 4 – THE COST OF FREE LESSON 4.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
A Gift of Fire Third edition Sara Baase
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Appendix B Possible Research Topics for CS Taken from A Gift of Fire by Sara Basse PowerPoint Presentation Possible Topics Related to General Education.
Consumers Online Before firms can begin to sell their products online, they must first understand what kinds of people they will find online and how.
E-Commerce: Regulatory, Ethical, and Social Environments
Societal Issues in Computing (COMP466)
Direct and Online Marketing
Privacy given away We accept lost of privacy in exchange for efficiency, convenience and small price discounts. No breakthrough, only a steady advance.
Marketing and Advertising in E-Commerce
“Eyes On You” What is one way that parents can use technology to find out where their children are? One way parents can use technology to find out where.
Privacy given away We accept lost of privacy in exchange for efficiency, convenience and small price discounts. No breakthrough, only a steady advance.
Privacy given away We accept lost of privacy in exchange for efficiency, convenience and small price discounts. No breakthrough, only a steady advance.
UNIT 4 – THE COST OF FREE LESSON 6.
Privacy Issues part 4 Information/data privacy
Direct and Online Marketing: The New Marketing Model
A Gift of Fire Third edition Sara Baase
Knowledge is Power A Marketing Information System (MIS) determines what information managers need and then gathers, sorts, analyzes, stores, and distributes.
Themes of Digital Citizenship
Direct and Online Marketing: The New Marketing Model
IT and Society Week 2: Privacy.
It matters By: Nina Fehrenbach
Presentation transcript:

Privacy …refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected and stored about yourself. In this section: U.S. Privacy-Protective Laws Behavioral Targeting U.S. Privacy-Invasive Laws Traffic Shaping Surveillance Transparency Issues > Privacy

U.S. Privacy-Protective Laws U. S. privacy-protective laws refer to legislation designed to protect the private information of U.S. citizens. The right to privacy has been a hotly debated topic in countries around the world for generations. Many recent privacy laws focus on digital technology issues. Issues > Privacy > U.S. Privacy-Protective Laws

U.S. Privacy-Invasive Laws U.S. privacy-invasive laws refer to legislation that is invasive to individual privacy for a perceived greater good of the country. Links: Video: Patriot Act Presentation Issues > Privacy > U.S. Privacy-Invasive Laws

Surveillance Surveillance is the close monitoring of behavior through electronic technologies such as wiretapping, data mining, remote video and audio monitoring, GPS, and RFID. Who is monitoring those individuals doing the monitoring? Will the information gathered in electronic surveillance be used to invade our privacy? Links: Video: The Surveillance Society Issues > Privacy > Surveillance

Behavioral Targeting Behavioral targeting uses information about a person’s behavior to inform businesses and marketers so that they can offer products that are likely to be of interest to that person. Much of the information gathered about individuals is collected without their knowledge. With commerce moving to the Web, the tracking of consumer information has become much easier. Links: Video: Ads That Track Your Web Activity Video: Ordering Pizza in the Future Issues > Privacy > Behavioral Targeting

Traffic Shaping Traffic shaping refers to controlling the flow of network traffic in order to optimize performance by delaying some data packets in favor of others. The practice of traffic shaping impacts users in different ways. All users should be concerned about how traffic shaping is implemented and if any private information is being gathered in the process. Links: Video: Internet Traffic Shaping Issues > Privacy > Target Shaping

Transparency Transparency is when a person, business, organization, or government keeps little or nothing secret from the world; an approach that is supported by technologies such as lifestreaming, geo-location, and microblogging. So what is the danger in having other people know about your life, the intricacies of your day-to-day dealings, and your secret thoughts? If you aren’t doing anything illegal, why should you care what other people know about you? Some individuals subscribe to this philosophy, have abandoned concerns over privacy, and are leading a transparent lifestyle. Links: Video: The narcissism is eating my soul Issues > Privacy > Transparency

Privacy Terms GPS and RFID surveillance Privacy Behavioral Targeting U.S. Privacy-Protective Laws U.S. Privacy-Invasive Laws Surveillance Wiretapping Data mining Video and audio surveillance GPS and RFID surveillance Behavioral Targeting Onsite behavioral targeting Network behavioral targeting Traffic shaping Transparency Lifestream Issues > Privacy > See your e-book for more information about these terms