A Simplistic View of Internet Privacy

Slides:



Advertisements
Similar presentations
Topology Discovery Requirements Loren Larsen World Wide Packets.
Advertisements

WP 2 Usability Attributes Affected by Software Architecture Deliverable D2 – Usability Patterns Presenter: Robert Chatley - ICSTM.
Adware and Spyware. Objectives u Define terms, scope, and motivation u Discuss impact (personal and business) u Review basic technical aspects u Provide.
E-business Infrastructure
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Engineering Privacy November 6, 2008.
Component Software Beyond Object-Oriented Programming Clements Szyperski Chapter 27 – New Professions Alexandre Alvaro Universidade Federal.
IPhone SDK and Enterprise Peter Wood. Enterprise Upcoming iPhone support for Microsoft Exchange ActiveSync and industry-standard corporate security measures.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
1 System support & Management Protocols Lesson 13 NETS2150/2850 School of Information Technologies.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Chapter 2 TCP/ IP PROTOCOL STACK. TCP/IP Protocol Suite Describes a set of general design guidelines and implementations of specific networking protocols.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Privacy in P2P based Data Sharing Muhammad Nazmus Sakib CSCE 824 April 17, 2013.
Voice over Internet Services and Privacy. Agenda Problem Description Scope Recommendations.
Throughput: Internet scenario
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
Web Page Design I Basic Computer Terms “How the Internet & the World Wide Web (www) Works”
University Health Care Computer Systems Fellows, Residents, & Interns.
Data Protection Compliance Professor Ian Walden Institute of Computer and Communications Law, Centre for Commercial Law Studies, Queen Mary, University.
DoubleClick is the leading provider of comprehensive Internet advertising solutions for Web advertisers and publishers worldwide.
COOKIES. INTERNET COOKIES What are they Where are they found What should you do about them.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
The Framework for Privacy Policies in the UK: Is telling people what information is gathered about them part of the framework? Does it need to be? Emma.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
EPrivacy & Consenting Cookies Rakuten LinkShare Symposium 2012 Liz Robertson Jones Day 17 April 2012.
Getting to Know Your Computer Your File System Applications What’s running on your machine Its own devices Networking.
Cookies Bill Chu. © Bei-Tseng Chu Aug 2000 Definition A cookie is a TEXT object of max 4KB sent from a web server to a browser It is intended for the.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
Privacy and Data Protection III Annual Latin American Telecommunications, Technology, and Internet Public Policy Forum Geff Brown, Assistant General Counsel.
Personal Privacy and the Public Internet John E. Carter Kennesaw State University IT 3700.
1 © NOKIA WWRF-Reference-Framework.PPT/ 26 June 2002 / Kimmo Raatikainen WWRF Reference Framework Nokia’s Perspective WWRF WG2 Meeting 26 June 2002 Kimmo.
1 Network Address Translation. 2 Network Address Translation (NAT) Extension of original addressing scheme Motivated by exhaustion of IP address space.
Windows 2003 Architecture, Active Directory & DNS Lecture # 3 Hassan Shuja 02/14/2006.
Digital Communication and Networks. When people visit web sites their ◦IP address, ◦browser software, ◦operating system ◦viewing.
Wednesday, August 7 th 2013 By the Improvisors.  An Internet Protocol (IP) address is a protocol rule which contains the address of a digital device.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
Mary Trauner Senior Research Scientist Georgia Institute of Technology Middleware for Video.
Basic Internet Skills. What is the internet? A large group of computers connected to one another Its purpose is to send information back and forth to.
Internet Basics 10/23/2012. What is the Internet? It’s a world-wide network of computer networks. It grows hourly and involves national governments, communities,
Requirement Elicitation Nisa’ul Hafidhoh Teknik Informatika
Facebook privacy policy
Hotspot Shield Protect Your Online Identity
Services DFS, DHCP, and WINS are cluster-aware.
Katrin Hoeper Channel Bindings Katrin Hoeper
Objective: ARP.
XACML and the Cloud.
EMBEDDED SYSTEMS Unit 5 EMBEDDED SYSTEMS UNIT 5.
Shavonne Henry, Nikia Clarke, David Heymann, Brandon Knight
COOKIES.
Latest Updates on BlackHawk Mines Music : Privacy Policy
General Data Protection Regulation (GDPR
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
De-anonymizing the Internet Using Unreliable IDs
#01 Client/Server Computing
Network management system
FootPrinting CS391.
HOW DO I KEEP MY COMPUTER SAFE?
ETSI role in Identity Management and Identification Systems
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
Networks and the Internet
I (do not) consent to behavioural advertising
AAA: A Survey and a Policy- Based Architecture and Framework
The Main Ethical Considerations of Big Data
WJEC GCSE Computer Science
COMPUTER NETWORKS AND THE INTERNET Chapter 6
Personal Privacy and the Public Internet

#01 Client/Server Computing
Presentation transcript:

A Simplistic View of Internet Privacy 03/15/10 A Simplistic View of Internet Privacy

Defining Internet Privacy 03/15/10 Defining Internet Privacy Sharing (data) in an explicit context with an expectation of scope.

03/15/10 The Problem Space

Sharing Data What gets shared? Volunteered data (user supplied) 03/15/10 Sharing Data What gets shared? Volunteered data (user supplied) Network data (ip addresses, domain names, geo-location, etc) Hardware and software data (mac addresses, browser and OS details, etc.) Data Conditions In motion (network transit) At rest (stored or cached, local or remote,) Re-directed (data portability, redaction, delegation, etc.)

Explicit Context Bounded Relationships 03/15/10 Explicit Context Bounded Relationships May require assertion/authentication May carry assurances May require consent May be asymmetric Terms and Conditions Issues with notification Issues with transparency Issues with lack of consent Disclosure of collection practices Limitations on Use Clearly defined practices Identification of extended use

Expectation of Scope User Settings Privacy controls Profile data 03/15/10 Expectation of Scope User Settings Privacy controls Profile data Delegation Service Agreements Managed identity Exchange models (direct payment, monetization of shared data, etc.) Portability Ability to transfer data Ability to extract contacts, profiles, etc. Cookies, Caching, and Tracking

03/15/10 Added Complexity