Privacy 2.3 CptS 401 Adam Carter. Quiz Question 1 Which of the three aspects of privacy discussed in the book does so-called targeted marketing potentially.

Slides:



Advertisements
Similar presentations
Chapter 27 Your Credit and the Law pp Learning Objectives 1.Explain 1.Explain how government protects credit rights. 2. Name 2. Name federal.
Advertisements

CptS 401, Spring2011 2/3/2011 Chapter : Privacy II See Dilbert cartoons about privacy:
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft.
What is identity theft, and how can you protect yourself from it?
IS3350 Security Issues in Legal Context
CptS 401, Spring2011 2/7/2011 Chapter : Privacy II See Dilbert cartoons about privacy:
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
CptS 401, Spring /25/2011 Chapter : Privacy I See Dilbert cartoons about privacy:
CptS 401 Adam Carter. For Tomorrow's In-Class Activity...  Form into groups of 4  Make sure someone in your group brings a digital camera to class!
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
MONEY MANAGEMENT II Credit Reports. What We’re Covering Today What a credit report is and why it’s important Credit bureau basics What is actually on.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
How To Protect Your Privacy and Avoid Identity Theft Online.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
How It Applies In A Virtual World
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
How can you protect yourself from online identity theft?
Scams & Schemes Common Sense Media.
Internet regulation National limits of Internet Content.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Public Records Overview and Case Update: September 11, 2015 presentation Patricia Gleason Special Counsel for Open Government.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Privacy Section 2.2 CptS 401 Adam Carter. Quiz Question 7 According to the book, the following is a provision of the Privacy Act of 1974: A.It requires.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy 2.4 CptS 401 Adam Carter. Discuss position paper rubric.
Back to Table of Contents pp Chapter 27 Your Credit and the Law.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
Chapter 27 Your Credit and the Law pp Learning Targets 1.Explain 1.Explain how government protects credit rights. 2. Name 2. Name federal laws.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Digital Citizenship Middle School
A Parent Guide to creating a student (under 13) Apple ID
Appropriate Use of Technology
Protecting Your Credit
Other Sources of Information
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
The Issues with Technology in education
Legal, social & ethical issues
Ethical and Social Issues in Information Systems
A Gift of Fire Third edition Sara Baase
INFS 452 – Computer Ethics & Society
Protecting Yourself from Fraud including Identity Theft
IT and Society Week 2: Privacy.
Presentation transcript:

Privacy 2.3 CptS 401 Adam Carter

Quiz Question 1 Which of the three aspects of privacy discussed in the book does so-called targeted marketing potentially violate? A.Freedom from intrusion—from being left alone B.Control of information about oneself C.Freedom from surveillance D.More than one of the above E.None of the above 2

Discuss with your Group! 3

Quiz Question 1 Answer D: More than one of the above (see pp ) What is “targeted marketing?” How might it violate privacy? – Control of one’s own information (marketing data are bought and sold without consumers’ consent) – Freedom from surveillance(e.g., tracking web browsing) – Freedom from intrusion (being left alone) may also be impacted: Consumers may receive ads they don’t want and didn’t ask for 4

Quiz Question 2 According to the book, the following question is fundamental to many privacy issues about consumer data: A.How clear and obvious must an information policy be? B.Does a person’s decision to interact with a business or Web site constitute consent to its policy? C.All of the above D.None of the above 5

Quiz Question 2 Answer C: All of the Above See second-to-last paragraph on p. 77 Can you think of any other important questions, or any strategies companies could use to ensure consumers understand their policies? 6

Quiz Question 3 The Fair Credit Reporting Act A.was the first law in the world to regulate the use of consumer info by private businesses B.requires credit bureaus to furnish each individual with one copy of his/her credit report per year C.All of the above D.None of the above 7

Quiz Question 3 Answer C: All of the above See the gray box on p. 81. Why was the FCRA necessary? Credit records a major source of privacy problems Many Credit records were bought and sold Errors can disrupt people’s lives Disclosure of credit records can embarrass people and also increase the risk of fraud 8

Quiz Question 4 Location tracking applications A.make it possible to provide a person with services based on the person’s location B.can monitor a person’s location without knowing the identity of the person. C.can be used to assist law enforcement in finding the location of 911 callers D.All of the above E.None of the above 9

Quiz Question 4 Answer D: All of the above See pp An example of (B) is provided at the top of p. 84. Can you think of location tracking applications? 10

Quiz Question 5 Which of the following is an example of spyware: A.A computer program that allows a person to use a web cam to remotely monitor a loved one in a nursing home. B.A computer program that is installed without a person’s knowledge and secretly collects information about the person’s activities and data. C.A computer program that allows a person to post to the web the person’s whereabouts in real time. D.All of the above E.None of the above 11

Quiz Question 5 Answer B. See the top of p. 86 Clicker poll: Have you been a victim of spyware? A.Yes B.No 12

Quiz Question 6 The following is an example of pretexting: A.Contacting customer service department of an internet social site and asking for the real name of someone by pretending to be someone with a legitimate claim to the information. B.Sending a text message to preempt a privacy violation C.Contacting the customer service department of a credit bureau and asking for the credit report of a friend (but claiming to be yourself) D.All of the above E.None of the above 13

Quiz Question 6 Answer A. (See p. 88) Who can tell us about the famous AOL pretexting case involving a Navy sailor? Is it a federal crime to pretext? Under what circumstances? 14

Question 7 The REAL ID Act of 2005 mandated the following: A.A person must provide documentation of address, birth date, SSN, and legal residency in order to obtain a federally approved driver license or ID card. B.Individual states must set requirements for what they will accept as valid documentation for a driver license or ID card C.Federal social security cards must contain special features to resist tampering and conterfeiting D.All of the above E.None of the above 15

Quiz Question 7 Answer A. See p. 97 Why can’t we use social security numbers for a national ID system? 16

Question 8 In 2000, Congress enacted COPPA, which A.requires people who want access to websites with personal information on children under 13 to disclose their identities B.prohibits websites from collecting personal information from children under 13 without verifiable parental consent C.allows web sites to collect certain non-sensitive personal information on children under 13 D.prohibits sex offenders from accessing websites with sensitive information on children under 13 E.None of the above 17

Privacy II Case Study: Google Street View (This story was written by Melissa Eddy of the Associated Press and published on 8/20/10. It appears at BERLIN — Germans have long harbored an obsession about protecting privacy, with memories of Nazi-era denouncements of neighbors and East German secret police snooping still alive. Now they have found a new target for their fears: Google "Street View." Under strong government pressure, the Internet giant made Germany the only country where people can request to have images of their homes deleted from the project before it goes online in November, along with other concessions. It has all stirred debate about how to define and defend privacy in the digital age and revealed a yawning generational divide between those old enough to recall invasive past regimes and those who have grown up with the Internet. "There is a fear of becoming a 'See-through Citizen' in a totalitarian surveillance state," said Jesko Kaltenbaek, a professor of psychology at Berlin's Freie University. "Both under the Nazis and in the former East Germany, the exact knowledge of citizens' lives served as a decisive instrument of power for government leaders." At the heart of the debate That concern lies at the heart of the current debate, where politicians have been criticizing Google for allegedly trampling the rights of citizens who are disturbed by the idea that "Street View" might help strangers locate them in their homes. Germany's Consumer Protection Minister Ilse Aigner has repeatedly called for Google to reveal more about the information that it holds and how it is collected. 18

Poll Regarding Privacy II Case Study: Google Street View (Clicker) Should people have the right to request that images of their homes be deleted from Google Street View? A.Yes B.No C.Not sure Discuss pros and cons with group for 5 – 10 min. Apply “free market” and “consumer protection” views of privacy to case. A group spokesperson should be prepared to share results of discussion with class 19