COMP 381. Exercise: Data Collection 1.Who are the “fact collectors”? (make a list—be specific) 2.What KINDS of ‘facts’ are stored about you/us? (make.

Slides:



Advertisements
Similar presentations
( · ). Unit 3 Welcome to the unit A world of connections.
Advertisements

Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Mobile Shelf Monitor Shop organization for profit maximization.
UnFriendly: Multi-Party Privacy Risks in Social Networks Kurt Thomas, Chris Grier, David M. Nicol.
The Internet.
The End of Anonymity Vitaly Shmatikov. Tastes and Purchases slide 2.
Learning to Hide in the Digital Age Can you completely remove your online identity?
CREDIT. ADVANTAGES OF CREDIT advantages: o Able to buy needed items now o Don’t have to carry cash o Creates a record of purchases o More convenient than.
CALM.  Able to buy needed items now and pay later.  Don’t have to carry cash  Creates a record of purchases  More convenient than writing cheques.
“zone of inaccessibility” Edmund Byrne, 1998 “The right to be alone” Warren and Brandeis, 1890.
Lathrop Intermediate School Cyber Savvy Week December 1 – December 5, 2014 Be RespectfulBe ResponsibleBe Safe ELA & Reading Intervention Classrooms Monday,
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
Internet/Cyber Stalking AND HOW TO AVOID BEING A VICTIM.
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
Nicole Burkhard, Nova Scotia Agriculture November 13 th, 2011 ACORN.
Privacy 2. Additional references
17 April Using Technology. Where Can You Use Technology? Product Sales Marketing Operations Finances Salaries Inventory Logistics Analysis Market Customer.
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
 Use to clarify, not obfuscate  Be gentle on the eyes  Need to print?  Use differentiable colors and symbols.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
{ Internet influence… Reasons of internet usage. How does it influence us? Yessenzholova Akbota, 11a Yessenzholova Akbota, 11a 2014y. 2014y.
Electronic Portfolios DIGITAL CITIZENSHIP & THE CREATION OF E-PORTFOLIOS.
English Language (1) for Computer Students “ENG 126”
Contents  What is Cyber Bullying?   Credit Card  Social Networking Sites  Phones  End Slide.
Class 6 Internet Privacy Law Social Media Privacy.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Consumer Reports & Scores Quiz Game Test your knowledge A Consumer Action Training Game © 2010.
The Internet By: Sarah T. Bui. What is the internet?  “ an extensive computer network linking thousands of smaller”
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Information Anxiety By Meghan Randinelli. Introduction Greatest problem concerning ethical information technology (IT) is personal privacy Greatest problem.
2011 Burlington/Plattsburgh Area Consumer Research Presented By: WPTZ-TV Internet Presentation.
ONLINE SERVICES. DEFINITION An online service provider can for example be an internet service provider, a business, real time information, a government.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
College lesson four about credit.
Are you a Digital Native?
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
Business Course Offerings Period 6 Consumer Education Economics Savings Credit Taxes Transportation Insurance Housing Budgeting.
Online Services By Lauren Hull. What are online services Online services are services provided by the internet, there are many types of online services.
Privacy and Data Mining What Do “They” Know About You?
Teens Credit- Day 3 Independent Living December 2, /09.
Chapter 1 Overview of Real Estate Finance. Chapter 1 Learning Objectives Understand the relationship between finance and real estate Understand the relationship.
Teens lesson seven credit presentation slides 04/09.
DATA MINING It is a process of extracting interesting(non trivial, implicit, previously, unknown and useful ) information from any data repository. The.
IT has had a big impact social in many different ways. Facebook is a social networking site that allows people to communicate and stay in touch with friends.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Privacy 2 (draft). Digital Dossier The data shadow The digital dossier Personal accountability.
MIS2502: Data Analytics Association Rule Mining David Schuff
Christian Citizenship in a Digital World Lesson 1: Online Privacy.
ZS Financial Group. What is a Financial Group ? A Financial Group is a collection of less than 100 individuals who meet for the purpose of pooling money.
Facebook privacy policy
Cyberbullying BY LORD MUSHANGO.
How to Protect Yourself from ID Theft and Social Engineering
Application of the Internet
Big Data Considerations
Lecture 27: Privacy CS /7/2018.
MIS2502: Data Analytics Association Rule Mining
IGraphic Social impacts of IT
Privacy and Data Mining
Privacy and Data Mining
18734: Foundations of Privacy
Information & Democracy
Information & Democracy
Information & Democracy
Democracy and Information
Democracy and Information
Information & Democracy
Presentation transcript:

COMP 381

Exercise: Data Collection 1.Who are the “fact collectors”? (make a list—be specific) 2.What KINDS of ‘facts’ are stored about you/us? (make a list—be specific)

Fact Collectors (class list) government census taxes work cars, houses, real estate voting record and party affiliation bank accounts medical records criminal history; civil suits guns birth/death insurance schools grades finances address family background SSN medical/mental health salary degrees/education schedule on-campus purchases access to buildings/dorms computer usage/printing activities criminal records employers conflict of interest investments political activities knowledge websites phone calls purchases SSN companies that I buy from buy sites credit ratings address & phone other companies purchased info from other companies info based on IP address public info (see above) Google family and friends

Data & informational privacy One should ask: Who has ACCESS? Who should have ACCESS? Need to know? Why? How long is the data kept?

Question  Is there a problem with a search engine monopoly (or oligolopy)?  Mowshowitz and Kumar, And Then There Were Three Mowshowitz and Kumar, And Then There Were Three

Search Engine US Market Shares (December 2010)  Google 66.6  Yahoo 16.0  Microsoft12.0  Ask 3.5  AOL 1.9 Source: Global

Video Entertainment  No Place to Hide No Place to Hide  Big Brother Big Business Big Brother Big Business

Data Mining Biometrics I believe you have the right to privacy, but not the right to anonymity -No Place To Hide The laws haven’t caught up to the technology -Big Brother Big Business

Grocery Store Receipts eggs milk bread cheese plates napkins trash bags eggs cheese sour cream bread chips soup milk eggs bread butter cheese gum soda bread eggs milk cheese diapers juice Diapers and beer? Super Bowl Sunday?

 Clique = a tightly-knit group of people  Clique = a set of vertices in a graph that are all connected to each other by edges of the graph  Maximal Clique = a clique that is not a subset of a larger clique Friend Grouper: Definitions Alice Bob Eva David Carol

 online social network is rarely a perfect representation of the real social network new member “acquaintances” or “friends” Friend Grouper: Problem Addressed Real LifeOnline AliceBob Eva David Carol Alice Bob Eva David Carol

Triangle Closure  Nodes = People  Edges = Social Relationships  Individuals with common friends are more likely to become friends Leads to “people you may know”

 BabyNames BabyNames  Pandora Pandora  Half.com Half.com Innocuous

 Recommending Movies  Predicting Ratings  Data-Mining Contest: Release rating data, sans “identifying information” Prize awarded Additional contests: canceled ○ Borderline: Netflix

 “people you may know” Ex-boyfriend/girlfriend you don’t want to talk to…EVER Person who used to bully you  “reconnect” Person in coma in Australia Borderline: Facebook

Types of Invasions  Individual Cameras  Governmental Snuggly bear on warrantless wiretapping Snuggly bear  Institutional Privacy and social networks