“zone of inaccessibility” Edmund Byrne, 1998 “The right to be alone” Warren and Brandeis, 1890.

Slides:



Advertisements
Similar presentations
TECHNICOOL A Technology Safety Program © 2011 PCAV.
Advertisements

Critical Thinking Value Conflicts & Assumptions
INTERNET SAFETY.
Ethical Issues concerning Internet Privacy 1.  Personal information on the Internet has become a hot commodity because it can be collected, exchanged,
Chapter 10 Privacy and Other Social Issues. Copyright © 2003, Addison-Wesley What Is Privacy? Freedom from observation, intrusion, or attention of others.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
“zone of inaccessibility” Edmund Byrne, 1998 “The right to be alone” Warren and Brandeis, 1890 COMP 381.
COMP 381. Exercise: Data Collection 1.Who are the “fact collectors”? (make a list—be specific) 2.What KINDS of ‘facts’ are stored about you/us? (make.
 Discrete data: do the lines between mean anything?  When do you use area charts: does the area mean anything or is it for visual effect?  Stacked charts:
Chapter 10 Privacy and Security McGraw-Hill
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
Privacy Chris Kelly iLaw July 5, 2002.
Privacy 2. Additional references
CS294-1 Deeply Embedded Networks Privacy Discussion 11/25/03 David Culler University of California, Berkeley.
6 December Privacy. Presentations News: Tega Scott Peterson trial: Stephen.
1 Good Security and Privacy Things Steven M. Bellovin
Review 23 April. Group exercise  What lessons have you learned?  Write full sentences until I tell you to stop.  Examples: Code can affect behavior.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
“Ethics Online” Shaping social behavior online takes more than new laws and modified edicts. Deborah G. Johnson Communications of the ACM Vol. 40, No.
3 Ethics and Privacy.
 Use to clarify, not obfuscate  Be gentle on the eyes  Need to print?  Use differentiable colors and symbols.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
“Big Brother” and You: Who’s Watching Who? Tom Hurlbutt Program in Writing and Rhetoric 3-15 November 21, 2002.
PRIVACY Britt, Beattie and Amy. What are the issues regarding privacy on the internet? Privacy issues arise everyday. Examples of when privacy becomes.
BA J. Galván1 PRIVACY and Other Social Issues.
Controlling Your Social Networking Privacy Settings Stay safe online!
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
6 Ethics and Privacy.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Module 3 – Security and Privacy SOCIAL MEDIA IN BUSINESS.
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
Types of privacy (Solove, Understanding Privacy)
INFLUENCES AND COMMUNICATION UNIT 8 & 9: STI PREVENTION & SEX ED.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
17 April Reverse Engineering Ethics Privacy Introduction.
Intro to Ubicomp Privacy Jason I. Hong. Ubicomp envisions –lots of sensors for gathering data –rich world models describing people, places, things –pervasive.
6 Ethics and Privacy.
5 December Introduction to Privacy. Term Project Changes Feedback on outlines is on its way Change: not being graded Papers due date Moved to Wednesday.
17 March Privacy (finish) Consumer. Privacy Data & informational privacy One should ask: Who has ACCESS? Who should have ACCESS? Need to know? Why? Keep.
Privacy and Data Mining What Do “They” Know About You?
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
The process through which a person develops proper attitudes and behaviors - toward other people in society, - based on social and cultural norms, rules,
CHAPTER 5 ETHICS & PRIVACY.
Social impacts of IT By Lewis dancocks. Social impacts Due to IT people around the world can commutate with each other anywhere at any time, this is due.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Lecture 19 Page 1 CS 236 Online Privacy Privacy vs. security? Data privacy issues Network privacy issues Some privacy solutions.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Privacy and the Law.
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
Презентация Снежко И.В. МБОУ СОШ №6 Г.Ноябрьск.
Malcolm Crompton International Privacy: Managing Privacy in a Global Organisation – Identity, HR, Security & more IAPP TRUSTe Symposium: Privacy.
Working to Keep our Children Safe in a World Filled with Technology
Privacy given away We accept lost of privacy in exchange for efficiency, convenience and small price discounts. No breakthrough, only a steady advance.
Privacy and confidentiality awareness
Privacy given away We accept lost of privacy in exchange for efficiency, convenience and small price discounts. No breakthrough, only a steady advance.
Privacy given away We accept lost of privacy in exchange for efficiency, convenience and small price discounts. No breakthrough, only a steady advance.
Introduction to Health Privacy
Privacy and Data Mining
Privacy and Data Mining
Privacy Privacy vs. security? Data privacy issues
Sociological Research Methods
It matters By: Nina Fehrenbach
Presentation transcript:

“zone of inaccessibility” Edmund Byrne, 1998 “The right to be alone” Warren and Brandeis, 1890

 “All this secrecy is making life harder, more expensive, dangerous …” Peter Cochran, BT Research  “You have zero privacy anyway.” Scott McNealy, Sun  “By 2010, privacy will become a meaningless concept in western society” Gartner report

 Secrecy › Limiting dissemination of information  Anonymity › Protection from undesired attention  Solitude › Lack of proximity Ruth Gavison 1984

 Deception  Crime  Isolation  Lack of Support

 Extrinsic loss of freedom › Ability of others to control our behavior › Coercion or imposition of others’ wills  Intrinsic loss of freedom › Changes how we behave › “anticipatory conformity”  Autonomy requires privacy

 In order to trust others, need to know something about them › Privacy impedes  In order to build STRONGEST trust between two people, need to create a bond › Requires privacy

Privacy and relationships How is it different from pre- computers/networks? –Electronic alter ego Identity convergence

–Privacy is not absolute in society … why ? –Willing to divulge SOME information in exchange for SOME economic or social benefit…. BUT reasonable expectation about how it’s treated…

My right to informational privacy vs. others’ right to know vs. security Does it have to be versus? Is it really a zero-sum game?

Shouldn’t I have a say? Why should I care? –Decisions made about us –Effect if data are Incomplete? Erroneous? Sensitive?

 Go to the court or town hall  Go through trash  Interview people  Eavesdrop/wiretap  Surveillance  Breaking and entering

 Public records easier to find  Publications spread faster  Surveillance  Keeping records of what you do on the web › Shopping › Surfing › Searching  Breaches

 The right to have information that you don’t expect to be available to others remain that way  On many sites, you give up your right to privacy  But there are also other more insidious ways  Google Dashboard

 Transparency and Control: knowing what is being collected  Anonymity  Security › Data breaches chronology Data breaches

 Cookies › Web site retaining cookies for 5 years  Sniffing, Snarfing, Snorting › Forms of capturing packets over network › Differ by how much info & what is done with it  Surveillance › Different forms? › Google Street View  Data collection and sharing

One should ask: Who has ACCESS? Who should have ACCESS? Need to know? Why? How long is the data kept?

 No Place to Hide No Place to Hide  Big Brother Big Business Big Brother Big Business

Biometrics I believe you have the right to privacy, but not the right to anonymity -No Place To Hide The laws haven’t caught up to the technology -Big Brother Big Business

eggs milk bread cheese plates napkins trash bags eggs cheese sour cream bread chips soup milk eggs bread butter cheese gum soda bread eggs milk cheese diapers juice Diapers and beer? Super Bowl Sunday?

 BabyNames BabyNames  Pandora Pandora  Half.com Half.com

 Recommending Movies  Predicting Ratings  Data-Mining Contest: › Release rating data, sans “identifying information” › Prize awarded Prize awarded › Additional contests: canceled 

 Concept from sociology ◦ Individuals with common friends are more likely to become friends

 Nodes = People  Social Relationships = Edges ◦ Leads to “people you may know”

 “people you may know” › Ex-boyfriend/girlfriend you don’t want to talk to…EVER › Person who used to bully you  “reconnect” › Person in coma in Australia