CptS 401, Spring 2011 1/25/2011 Chapter 2.1-2.2: Privacy I See Dilbert cartoons about privacy:

Slides:



Advertisements
Similar presentations
“How Can Research Help Me?” Please make SURE your notes are similar to what I have written in mine.
Advertisements

CptS 401, Spring2011 2/3/2011 Chapter : Privacy II See Dilbert cartoons about privacy:
 After the 7 transactions, the ledger looks like Page 105 Figure 4.5. (Show On the White board)  There are 10 accounts in the ledger.  How do you calculate.
CptS 401, Spring, /17/2011 Chapter : Freedom of Speech II See Dilbert cartoons about freedom of speech:
Privacy 2.3 CptS 401 Adam Carter. Quiz Question 1 Which of the three aspects of privacy discussed in the book does so-called targeted marketing potentially.
CptS 401, Spring2011 2/7/2011 Chapter : Privacy II See Dilbert cartoons about privacy:
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Chapter 9: Privacy, Crime, and Security
CptS 401, Spring2011 1/27/2011 Chapter : Privacy I See Dilbert cartoons about privacy:
CptS 401 Adam Carter. For Tomorrow's In-Class Activity...  Form into groups of 4  Make sure someone in your group brings a digital camera to class!
Chapter 4.1 – 4.3.3: Intellectual Property I
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
PRIVACY: What does it mean?? Molly, Julia, Erin and Andrew Project.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.
CptS 401, Spring /15/2011 Chapter : Freedom of Speech I See Dilbert cartoons about freedom of speech:
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
CptS 401, Spring /10/2011 Chapter : Freedom of Speech I See Dilbert cartoons about freedom of speech:
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
3 Ethics and Privacy.
Privacy & Personal Information -- Why do we care or do we?
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Privacy Scenarios Set 1 Class Work.
An Educational Computer Based Training Program CBTCBT.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Computer Ethics.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Digital Citizenship Project. Netiquette Do’s -Read before you post messages. -Try to keep your postings brief and easy to read. -Be kind when others make.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Privacy Section 2.2 CptS 401 Adam Carter. Quiz Question 7 According to the book, the following is a provision of the Privacy Act of 1974: A.It requires.
User Behavior Analysis of Location Aware Search Engine Third international Conference of MDM, 2002 Takahiko Shintani, Iko Pramudiono NTT Information Sharing.
© 2015 albert-learning.com Unavoidable ethical questions about search engines UNAVOIDABLE ETHICAL QUESTIONS ABOUT SEARCH ENGINES.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
ITGS Databases.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Privacy 2.4 CptS 401 Adam Carter. Discuss position paper rubric.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
Computer Ethics Chapter 14 – Computers: Understanding Technology.
6 Ethics and Privacy.
Managing the Information Copyright © Texas Education Agency, All rights reserved.
What is Privacy?. 3 Types of Privacy 1.Accessibility Privacy 2.Decisional Privacy 3.Informational Privacy.
In order to be eligible for federal funding for technology students EGUSD must receive instruction in "Digital Citizenship" These mini-lessons will be.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
CHAPTER 5 ETHICS & PRIVACY.
Databases vs the Internet. QUESTION: What is the main difference between using library databases and search engines? ANSWER: Databases are NOT the Internet.
What’s the Big Deal about Internet Privacy Marrs Computer Club.
Digital Images / Write Copy CUFIMA01A Produce And Manipulate Digital Images CUFWRT05A Write Content And/Or Copy Week 4.
4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not.
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Societal Issues in Computing (COMP466)
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Chapter 10: Privacy, Security, and Ethics
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
A Gift of Fire Third edition Sara Baase
Presentation transcript:

CptS 401, Spring /25/2011 Chapter : Privacy I See Dilbert cartoons about privacy: 1

CptS 401, Spring /25/2011 Quiz Question 1 Which of the following is a key aspect of privacy, according to the book: A.Freedom from surveillance B.Control of information about oneself C.Freedom from surveillance D.All of the above 2

CptS 401, Spring /25/2011 Quiz Question 1 Answer D: All of the above (p. 45, 3 bullet points) 3

CptS 401, Spring /25/2011 Quiz Question 2 Suppose that, for a he government requestsBecause of the possibility of, privacy violations can occur even if a search engine company does not associate queries with people’s names. 4

CptS 401, Spring /25/2011 Quiz Question 2 In a court case discussed in the book, the government asked Google to release people’s search queries in order to crack down on material deemed harmful to minors. Was this be a violation of privacy? A.No, because the search queries can be released without identifying information (“anonymized”) B.No, because it is impossible to link a search query to the person who made the search. C.Yes, because even if the search queries are stripped of identifying information, it is still possible to link some of the queries to the people who made them. D.None of the above. 5

CptS 401, Spring /25/2011 Quiz Question 2 Answer/ Quiz Question 3 (C): “It was not difficult to deduce the identity of some people, especially those who searched on their own name or address. A process called identified others” (p. 49). In this process, one identifies the individual from a set of anonymous data. A. Identity trackingB. Re-identification C. Identity deductionD. Unanonymizing 6

CptS 401, Spring /25/2011 Quiz Question 3 Answer (B) “Re-identification means identifying the individual from a set of anonymous data” (p. 49). 7

CptS 401, Spring /25/2011 Quiz Question 4 According to the book, the collection of personal information about a person without the person’s knowledge is known as A.Invisible information gathering B.Personal data scraping C.Private data surveillance D.Data Mining E.None of the above 8

CptS 401, Spring /25/2011 Quiz Question 4 Answer/ Quiz Question 5 (A): Invisible information gathering (p. 50) Which of the following is a technique used for invisible information gathering? A. Internet Service Provider data logs B. Cookies C. Supermarket club cards D. Event data recorders in cars E. All of the above 9

CptS 401, Spring /25/2011 Quiz Question 5 Answer E: All of the above (see p. 51). Now let’s focus on online behavior… 10

CptS 401, Spring /25/2011 Is Our Online Behavior Private? (Small Group Exercise – 5 minutes) “Anything we do online is recorded, at least briefly, and linked to our computer, if not our name. With your group, identify the benefits and drawbacks of this. Do you want your online data to be tracked? Is there a way you can prevent your online behavior from being tracked? Be prepared to discuss your conclusions 11

CptS 401, Spring /25/2011 Online Invisible Information Gathering In the News! Can anyone tell us about an announcement that was made yesterday that could impact your privacy on the web? (Marketplace 1/24/11 Podcast: 3:32) 12

CptS 401, Spring /25/2011 Quiz Question 6 The following privacy policy requires businesses to obtain explicit consent from a person for each use of the person’s personal information (by, e.g., checking a box): A.Informed consent B.Implied consent C.Opt in D.Opt out E.None of the above 13

CptS 401, Spring /25/2011 Quiz Question 6 Answer C: Opt-in (p. 53). What about when people use an internet site that provides a free service with no explicit end- user agreement? What would be a reasonable business policy in this case? 14

CptS 401, Spring /25/2011 Quiz Question 7 According to the book, the following is a provision of the Privacy Act of 1974: A.It requires private sector companies to publish notice of their record systems B.It allows disclosure of a person’s information without his or her consent C.It allows people to access their records and to correct inaccurate information D.All of the above E.None of the above 15

CptS 401, Spring /25/2011 Quiz Question 7 Answer/ Quiz Question 8 C: See third bullet in Figure 2.3, top of p

CptS 401, Spring /25/2011 Quiz Question 8 According to the book, surveillance cameras have the following documented outcomes: A.They have helped reduce all types of crime B.They have helped reduce vehicle crime C.They have achieved face-recognition accuracy in excess of 80 percent D.All of the above E.None of the above 17

CptS 401, Spring /25/2011 Quiz Question 8 Answer B: In 2005, the British government found that “the only successful use of [surveillance] cameras was in parking lots where they helped reduce vehicle crime” (p. 74). Can you think of another successful use of surveillance cameras? 18

CptS 401, Spring /25/2011 Quiz Question 9 The supreme court case Katz v. United States (1967) clarified the Fourth Amendment by ruling that A.It applies to wiretaps B.It applies only to physical intrusion and search and seizure of physical items C.It requires a court order to access personal items available through technological means D.It applies to conversations held in public places in some situations E.None of the above 19

CptS 401, Spring /25/2011 Quiz Question 9 Answer D: “In Katz v. United States, the Supreme Court…ruled that the Fourth Amendment does apply to conversations and that it applies in public places in some situations. What about Kyllo v. Unitied States (2001)? What did it say about the use of thermal imaging devices to identify pot plants? 20

CptS 401, Spring /25/2011 Quiz Question 10 The following was a key provision of the USA PATRIOT Act: A.It allowed the FBI to obtain various kinds of records using documents called National Security Letters (NSLs). B.It significantly expanded the FBI’s authority to issue NSLs. C.It allowed recipients of NSLs to disclose that they have received them. D.It prevented NSLs from soliciting a person’s credit report E.None of the above 21

CptS 401, Spring /25/2011 Quiz Question 10 Answer B: “The PATRIOT Act significantly expanded FBI authority to issue NSLs” (p. 71). 22

CptS 401, Spring /25/2011 Privacy Case Study 1 (Clicker) Ex. 2.9, p. 130: A company that supplies filtering software to schools to block access to objectionable websites sold statistical data about the websites visited by school children. The data did not identify the children or individual schools. Was this a privacy violation? A.Yes B.No C.Unsure Why or why not? Discuss with group for 5 min.; apply ethical frameworks and privacy principles on p

CptS 401, Spring /25/2011 Privacy Case Study 2 (Clicker) Ex. 2.14, p. 130: People who fled hurricane Katrina left behind and lost important documents and records such as birth certificates, c4redit cars, property records, and emplyment records. A U.S agency proposed a new database where people could voluntarily store essential personal records in case of natural disasters. Is this a good idea? A.Yes B.No C.Unsure Discuss pros and cons with group for 5 min.; apply ethical frameworks and privacy principles on p

CptS 401, Spring /25/2011 Privacy Case Study 3 (Clicker) Ex. 2.16, p. 131: A city government wants to track down people who run small businesses and do not pay the city’s $125 business license fee. The city hired a private detective to obtain IRS tax recors of city residents and determine who has reported small-business income to the IRS but paid the license. Should this action by the city be permitted? A.Yes B.No C.Unsure Discuss arguments for and against with group for 5 min.; apply ethical frameworks and privacy principles on p

CptS 401, Spring /25/2011 Team Building You must be on a team of 4, and have a topic, by the time you leave class today! On the white board, I have written 26 numbers corresponding to the 26 topics listed on the term project description document Go to the number corresponding to the topic you would like to select, or pitch an idea now When you have found a team and a topic, write your team name, members’ names (with team leader designated), and topic down on a sheet of paper and hand to instructor 26

CptS 401, Spring /25/2011 For Thursday In-Class Activity... Make sure someone in your group brings a digital camera to class! Your group can’t get credit for the activity without one. 27