Session 25 INST 301 Introduction to Information Science

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

Week 13 LBSC 690 Information Technology Social Issues.
LBSC 690: Week 12 Security and Privacy Jimmy Lin College of Information Studies University of Maryland Monday, April 23, 2007 Contributing sources: David.
Technological Implications for Privacy David Kotz Department of Computer Science Dartmouth College
Cyberculture and Privacy Baase, Chp 2. Cyberculture and Privacy A.Computers and Privacy Computers are not needed for the invasion of privacy. 1.Computers.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 18: November 11, 2003 Further Reflections on Privacy and Control.
Week 13 LBSC 690 Information Technology Policy. Agenda Questions Ownership Identity Privacy Integrity.
Lab 3 Cookie Stealing using XSS Kara James, Chelsea Collins, Trevor Norwood, David Johnson.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
Security of Cookies In A Public Computer Lab Setting Russell Fech November 30, 2000.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
Family Financial Management Annie’s Project January 23, 2007 Coweta Oklahoma.
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
Computer Programming I
What is FORENSICS? Why do we need Network Forensics?
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
Privacy and Personal Information
Web-based E-commerce Architecture
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Privacy, Confidentiality, Security, and Integrity of Electronic Data
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Identity and biometrics.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”
Chapter 2. Core Defense Mechanisms. Fundamental security problem All user input is untrusted.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Information Anxiety By Meghan Randinelli. Introduction Greatest problem concerning ethical information technology (IT) is personal privacy Greatest problem.
Module 5: Configuring Internet Explorer and Supporting Applications.
Computer Ethics Chapter 14 – Computers: Understanding Technology.
 Replication is the process of copying database information  Replication is used for:  Backing up your database  Migrating to a new server  Mirroring.
Every student you have, just like any citizen in the United States, has a right to privacy  An ethical issue that arises when an individual’s right to.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
“ “ Accidental with attachment exposed hundreds of individuals’ names and Social Security Numbers… “ “
11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.
What is Privacy?. 3 Types of Privacy 1.Accessibility Privacy 2.Decisional Privacy 3.Informational Privacy.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
Privacy and Data Mining What Do “They” Know About You?
1 Ethics of Computing MONT 113G, Spring 2012 Session 29 Privacy.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
1 The 28 th Annual International Computer Software and Applications Conference COMPSAC 2004 Hong Kong September 28, :30 am – 12:00 noon Session.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Hotspot Shield Protect Your Online Identity
CHAPTER FOUR OVERVIEW SECTION ETHICS
Protection of CONSUMER information
Module Overview Installing and Configuring a Network Policy Server
E-Commerce: Doing Business on the Internet
Columbus State University
Confidentiality October 14, 2005.
Utilize Group Policy Terminal Server Settings
Computers and Data Collection
ISMS Information Security Management System
Privacy and Information
Ethical and Social Issues in Information Systems
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Chapter 10: Privacy, Security, and Ethics
Computer Programming I
CHAPTER FOUR OVERVIEW SECTION ETHICS
Privacy and Data Mining
Presentation transcript:

Session 25 INST 301 Introduction to Information Science Privacy Session 25 INST 301 Introduction to Information Science

Privacy vs. Anonymity

http://www.appliedautonomy.com/isee.html

Ideals in Tension Whenever a conflict arises between privacy and accountability, people demand the former for themselves and the latter for everybody else. The Transparent Society by David Brin

Privacy Protection (USA) Government: Privacy Act of 1974 Applies only to government records Commercial: Privacy policies Federal Trade Commission enforcement Employers: Ownership Employers own content on services they provide

Obscurity A lot of information is public record Previously shielded by “practical obscurity” Records were hard to access Digital access changes that Physical access Search and data mining

Tracking Before the Web Governments have information about life events Birth and death Marriage and divorce Licenses (e.g., drivers) Property and taxes Business exchange information about transactions How you commute to work What cereal you eat Where you like to go for vacation What hobbies you have

http://www.whitepages.com/

Online Tracking Web tracking Packet sniffers Law enforcement Browser data, clickthrough, cookies, … Packet sniffers Detect passwords, reconstruct packets, … Law enforcement Carnivore (US), RIP (UK), … National security FISA (US), SORM (Russia), …

Centralized Surveillance Proxy server Set up a Web server and enable proxy function Configure all browsers to use the proxy server Store and analyze Web server log files Firewall Can monitor all applications, not just the Web

Distributed Tracking Ecosystem http://wsj.com/wtk