Privacy Issues part 4 Information/data privacy

Slides:



Advertisements
Similar presentations
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Assessing Privacy Risks of Flash Cookies Kevin Fuller and Stacy Jordan February.
Advertisements

Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
Back to Table of Contents
Ethical Issues concerning Internet Privacy 1.  Personal information on the Internet has become a hot commodity because it can be collected, exchanged,
Social Media Remarketing Making the Most of Your Traffic.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
17 April Using Technology. Where Can You Use Technology? Product Sales Marketing Operations Finances Salaries Inventory Logistics Analysis Market Customer.
Perceptions of Behavioral Advertising among CMU Community Ashwini Rao April 21, 2014.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
By: Mr Hashem Alaidaros MKT 445 Lecture 3 Title: Affiliate Marketing.
Behavior Tracking Dhaval Patel.
Jared Cinque Section 6.  Internet tracking is the process of following internet activity backwards from recipient to user through a special type of software.
Operational Data Tools Chapter Eight. Copyright © Houghton Mifflin Company. All rights reserved.8–28–2 Chapter Eight Learning Objectives To learn database.
HTTP: cookies and advertising Concepts to cover:  web page content (including ads) from multiple site: composition at client  cookies  third-party cookies:
Privacy Issues (set 3) CS 340 Spring Lotame: Data Management Intelligence management-tutorials.
By: Justin Mauss Privacy vs. Convenience. Agenda Finding the Balance: Privacy vs. Convenience Revisit Privacy vs. Convenience Overview of Online Tracking.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
“Informational Privacy” privacy notes, set 2 CS 340.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Nilsa Polanco CMP 230 LA01 Meta Search Engine Presentation.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Day 2 – Marketing Research…
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Canadian Advertising in Action, 6th ed. Keith J. Tuckwell ©2003 Pearson Education Canada Inc Elements of the Internet World Wide Web World.
The DoubleClick controversy and other related issues pertaining to privacy on the Internet.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
Privacy and Data Mining What Do “They” Know About You?
Restoring Privacy, Cleaning Your Computer's Cookies and Beacons.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Computer-made Cookies Presented by Helal Lutfi. What is a Computer Cookie?  A small text file which contains a unique ID tag.  Placed on your computer.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Some from Chapter 11.9 – “Web” 4 th edition and SY306 Web and Databases for Cyber Operations Cookies and.
What’s the Big Deal About Internet Privacy?. Scenario: Our principal has hired a research company to collect information that will help us make the school.
HCS 212: Introduction to MIS
Facebook privacy policy
ACO501 – Accommodation Sales & Marketing
Digital Citizenship Grades 4-6
"Our vision is to be earth's most customer-centric company; to build a place where people can come to find and discover anything they might want to buy.
SETTING UP OF E-COMMERCE WEBSITE
The Internet Industry Week Two.
E-commerce Business uses of internet, e-commerce & e-business, e-marketing, e-payments etc.
Unit 12 Using the Internet & Browsing the Web
Shavonne Henry, Nikia Clarke, David Heymann, Brandon Knight
Latest Updates on BlackHawk Mines Music : Privacy Policy
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
PIXELS! 12/3/2015.
What is Affiliate Marketing?
Education – Partnership – Solutions
Societal Issues in Computing (COMP466)
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Chapter 10: Privacy, Security, and Ethics
Ethical and Social Issues in Information Systems
Being Aware of What You Share
A Gift of Fire Third edition Sara Baase
What is E- marketing? Internet marketing is any marketing activity that is connected online through the use of Internet technologies.
Online Safety: Rights and Responsibilities
INFS 452 – Computer Ethics & Society
Privacy and Data Mining
Digital Citizen.
Personal Privacy and the Public Internet
IT and Society Week 2: Privacy.
Do You Have Multiple Amazon Seller Accounts? Amazon Knows it! By EsellersCare Contact : +1 (855)
Presentation transcript:

Privacy Issues part 4 Information/data privacy CS 340 Fall 2015

Privacy As consumers: Most European countries have specific laws and regulations aimed at protecting an individual’s (consumer) privacy. In the US, historically consumer privacy has relied on social norms and market forces laws are typically a last resort or response to an event highly reactive and unsystematic

Misc. Privacy Laws Fair Credit Reporting Act, 1970 Right to Financial Privacy Act, 1978 Cable Communications Policy Act, 1984 Video Protection Privacy Act, 1988 Driver’s Protection Privacy Act, 1994 Children’s Online Privacy Protection Act (COPPA), 1998 Info on kids under 13 Financial Services Modernization Act, 1999 Health Insurance Portability and Accountability Act (HIPAA), 2001

Texas Infant DNA collection program, p. 96-97 Routine and often mandatory blood samples collected after birth. Reason? What happens to the samples after processed? Discarded OR Stored indefinitely See http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3065077/table/T1/ Motivations? Detect important health problems Later identification Are parents informed? Not always. Raises ethical issues This is not limited to Texas… overview http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3065077/ Recent issue in Indiana http://www.wthr.com/story/25954821/2014/07/07/your-childs-dna-who-has-it Alabama policy: http://www.babysfirsttest.org/newborn-screening/states/alabama (new link)

Texas’ use of the newborn blood test cards to catalogue information unrelated to that infant’s direct health care is an example of a secondary use of information. True False

Opinion: Suppose a public school provides students with laptops Opinion: Suppose a public school provides students with laptops. Should that school be able to turn on a web cam on the laptop to check on a student’s off campus behavior? Yes Maybe No

Robbins v. Lower Merion School District, p. 98-99 US District Court PA (2010) School district surreptitiously activated webcams using LANrev on laptops provided to students while students were off campus Video: http://www.cbsnews.com/news/6 10k-settlement-in-school- webcam-spy-case/ Settlement: $610,000

Lotame: Data Management Intelligence http://www.lotame.com/news-resources/ Old video https://www.youtube.com/watch?v=qzdEiKgamMM

Online tracking devices Cookies: small text file that stores information Stored client side, on hard drive Cookie creator: Lou Montulli Originally To allow for shopping cart functionality (online memory) Effort made to not allow the sharing of these between sites Now Third party cookies: site to site Behavioral Targeting: ad network; relationship with same advertiser http://live.wsj.com/video/how-advertisers-use-internet-cookies-to-track-you/92E525EB-9E4A-4399-817D-8C4E6EF68F93.html#!92E525EB-9E4A-4399-817D-8C4E6EF68F93

Third Party tracking files “The first time a site is visited, it installs a tracking file, which assigns the computer a unique ID number. Later, when the user visits another site affiliated with the same tracking company, it can take note of where that user was before, and where he is now. This way, over time the company can build a robust profile.”

Online tracking devices cont’d Beacons a.k.a. pixel tag, web bug Invisible image embedded in webpage Image is not place there by website, but by other company for ad tracking Potentials: Capture of what is typed on a website Bundles into a profile http://www.brighttag.com/resources/tag-101/

WSJ article: “The Web's New Gold Mine: Your Secrets” Info on Ashley Hayes- Beaty: 4c812db292272995e541 6a323e79bd37 Valued at $0.001 http://online.wsj.com/n ews/articles/SB1000142 40527487039409045753 95073512989404

The WSJ study findings Surreptitious installation of tracking technology Not just cookies, but real time logging Buying and selling of profiles Advertisers: No longer paying for ad placement on a site Paying instead to follow users around Internet with personalized marketing messages

Online advertiser tracking companies “considered anonymous because it identifies web browsers, not individuals.” https://www.privatewifi.com/lotame-online-tracking-and-your-privacy/ What is tracked: http://www.bluekai.com/consumers_privacyguidelines.php Opt out options: BlueKai http://www.bluekai.com/registry/ Lotame http://www.lotame.com/privacy

Taking control of the tracking Tracking blockers like Ghostery https://www.youtube.com/watch?v=EKzyifAvC_U

Which tracking technology is a transparent 1x1 pixel used to surreptitiously gather what people type? Cookie Beacon Third Party Cookie Ghostery