Privacy CS 195 Social Implications of Computers. Privacy as Instrumental Good Avoid discrimination based on, e.g., HIV status. Allow anonymous political.

Slides:



Advertisements
Similar presentations
EHealth Privacy & Security Closing Remarks Brenda Kelley AARP CT 4/20/2009.
Advertisements

2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
1 Good Security and Privacy Things Steven M. Bellovin
Recommendations for Parents The Massachusetts Aggression Reduction Center Bridgewater State College Copyright 2008 © Elizabeth K. Englander.
Privacy & Personal Information -- Why do we care or do we?
Warm up Exercise The Perfect Check Today’s Date Tony’s Exxon for car repairs 1, dollars Who cares if you write out a check perfectly, no errors,
HIV/AIDS and Human Rights A New HIV Infection every Six Seconds.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
UNIT 2: CONTEXT. Chapter 3: Ethics & Social Responsibility.
INLS 200 today’s line-up online privacy short video discussion questions from you? ethics cases? Ulrich’s Guide to Periodicals.
Information Security. What is Information Security? A. The quality of being secure B. To protect the confidentiality, integrity, and availability of information.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Solutions to Security and Privacy Issues in Mobile Social Networking
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
An initiative of Regional Collaboratives as Catalysts for Quality Reporting and Improvement: Engaging Consumers Engagingly AHRQ September 15, 2009 Partner.
Over 50’s Self-Advocacy Employment Project LESPN 26th July 2011.
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
Ethical issues Rumors and opinions generated from social media
Mohammed Al-khwyldi  Introduction Safety is the condition of being protected against physical, social, political, emotional, educational or other.
Mental Health Policy, Human Rights & the Law Mental Disability Advocacy Program Open Society Institute Camilla Parker October 2004.
CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net.
© 2003 Spoke Software, Inc. Privacy – California Dreamin’? A Brief Look at the Privacy Landscape in California.
Unit 1 Living in the Digital WorldChapter 3 – Entertain Me This presentation will cover the following topics: What precautions should I take? Name:
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks S. Creese, M. Goldsmith, J. Nurse, E.
Panther Forum Activity Week 9. Things to remember when you are using social media to communicate with others.
Privacy Technologies (H09L2A) Claudia Diaz ESAT / COSIC.
Several Ways to Understand Digital Privacy Peter Eckersley, Senior Staff Technologist Electronic Frontier Foundation 1.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
An ethical problem in science Hwei-yen Andres Lucie Murielle Jakub Valerie Eryn.
What is Spam? d min.
CS 6v Privacy The end of Privacy ?? Dr.Murat Kantarcioglu.
Staying Safe Online. Who are we ? What do we do ? Why are we here ?
1 Ethics of Computing MONT 113G, Spring 2012 Session 29 Privacy.
Cyber Safety Jamie Salazar.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Home Access Health Corporation A Leader in Personal Convenience Diagnostics and Healthcare Information Advisory Meeting November 3, 2005 OTC Home Use HIV.
CSCD 303 Essential Computer Security Lecture 1 - Course Details.
DO NOW – Monday, December 16 On your Do Now response form: What is privacy? Our Constitution protects citizens’ privacy from government snooping. Why does.
Legal issues in cloud computing Teemu Mäntylä
1 Internet – The Good, the Bad, and the Ugly Module 4 Section 3.
Privacy Lost: How Technology is Endangering Your Privacy CS Final Paper Presentation By: Christina Sulfaro.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
Protecting Children from Internet Pornographers Act of 2011.
The mother I love To my mother I know and love and has taken care of me.
IT depends on several codes of ethics 1. PUBLIC - IT engineers shall act consistently with the public interest. 2. CLIENT AND EMPLOYER - IT engineers shall.
EDUCATION-SONGS/FRIEND-SONG/ FRIEND SONG.
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
Privacy, anonymity and other confusing words Przemek Jaroszewski CERT Polska/NASK.
Computer safety By Elliot.
Privacy and the Law.
1.04 -THE LAW- System of Rules
CS 450/650 Fundamentals of Integrated Computer Security
Virtual Private Networks
1.04 -THE LAW- System of Rules
Protect Your Computer Against Harmful Attacks!
1.04 -THE LAW- System of Rules Criminal vs Civil
Privacy given away We accept lost of privacy in exchange for efficiency, convenience and small price discounts. No breakthrough, only a steady advance.
Privacy given away We accept lost of privacy in exchange for efficiency, convenience and small price discounts. No breakthrough, only a steady advance.
1.04 -THE LAW- System of Rules
Privacy given away We accept lost of privacy in exchange for efficiency, convenience and small price discounts. No breakthrough, only a steady advance.
1.04 -THE LAW- System of Rules
1.04 -THE LAW- System of Rules
1.04 -THE LAW- System of Rules
1.04 -THE LAW- System of Rules
1.04 -THE LAW- System of Rules
Presentation transcript:

Privacy CS 195 Social Implications of Computers

Privacy as Instrumental Good Avoid discrimination based on, e.g., HIV status. Allow anonymous political speech. Protect personal security, e.g., against stalkers. Restrain exercise of state power, e.g., require warrants. Prevent spread of incorrect information.

Privacy as Intrinsic Good Different public selves in different contexts. “Right to be left alone.” Part of human dignity. Avoid “creepy” repurposing of information.

Me according to Acxiom

The threats to privacy Governments Corporations People with cellphone cameras

The Case Against Privacy You gain convenience from tailored ads, location services. People today care more about online friendship. Governments need to protect us against bad guys. Businesses must verify eligibility for, e.g., credit. If I’m doing nothing wrong, I have nothing to hide.