 Discrete data: do the lines between mean anything?  When do you use area charts: does the area mean anything or is it for visual effect?  Stacked charts:

Slides:



Advertisements
Similar presentations
Surveillance and Social Control - 2 How monitored are we? Is Britain a Big Brother society?
Advertisements

Copyright © 2004 by Allyn and Bacon Chapter 5: Ethics This multimedia product and its contents are protected under copyright law. The following are prohibited.
Criteria For Approval 45 CFR CFR Minimized risks Reasonable risk/benefit ratio Equitable subject selection Informed consent process Informed.
INTERNET SAFETY.
“zone of inaccessibility” Edmund Byrne, 1998 “The right to be alone” Warren and Brandeis, 1890.
Ethical Issues concerning Internet Privacy 1.  Personal information on the Internet has become a hot commodity because it can be collected, exchanged,
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
“zone of inaccessibility” Edmund Byrne, 1998 “The right to be alone” Warren and Brandeis, 1890 COMP 381.
Chapter 10 Privacy and Security McGraw-Hill
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
Privacy Chris Kelly iLaw July 5, 2002.
Privacy 2. Additional references
CS294-1 Deeply Embedded Networks Privacy Discussion 11/25/03 David Culler University of California, Berkeley.
6 December Privacy. Presentations News: Tega Scott Peterson trial: Stephen.
1 Good Security and Privacy Things Steven M. Bellovin
Review 23 April. Group exercise  What lessons have you learned?  Write full sentences until I tell you to stop.  Examples: Code can affect behavior.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Behind the Machine “The Good, The Bad, and the Ugly” Copyright © 2008 by Helene G. Kershner.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
Internet Ethics Presented by: Daniel Wu Kalven Wu.
“Ethics Online” Shaping social behavior online takes more than new laws and modified edicts. Deborah G. Johnson Communications of the ACM Vol. 40, No.
3 Ethics and Privacy.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Ethics in Business Research
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
“Big Brother” and You: Who’s Watching Who? Tom Hurlbutt Program in Writing and Rhetoric 3-15 November 21, 2002.
Controlling Your Social Networking Privacy Settings Stay safe online!
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Module 3 – Security and Privacy SOCIAL MEDIA IN BUSINESS.
Monitoring Employees on Networks: Unethical or Good Business?
Types of privacy (Solove, Understanding Privacy)
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
17 April Reverse Engineering Ethics Privacy Introduction.
6 Ethics and Privacy.
5 December Introduction to Privacy. Term Project Changes Feedback on outlines is on its way Change: not being graded Papers due date Moved to Wednesday.
…refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected and stored.
17 March Privacy (finish) Consumer. Privacy Data & informational privacy One should ask: Who has ACCESS? Who should have ACCESS? Need to know? Why? Keep.
Privacy and Data Mining What Do “They” Know About You?
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
CHAPTER 5 ETHICS & PRIVACY.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Lecture 19 Page 1 CS 236 Online Privacy Privacy vs. security? Data privacy issues Network privacy issues Some privacy solutions.
Whose Life is It Anyway? Serving and Supporting At-Risk Seniors with Compassion not Control THE DEMENTIA & ALZHEIMER’S RESOURCE COMMITTEE OF ST. CLAIR.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Creating a Culture of Privacy Michael Kaiser Executive Director National Cyber Security
Privacy and the Law.
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
Privacy and Confidentiality in Research
Privacy given away We accept lost of privacy in exchange for efficiency, convenience and small price discounts. No breakthrough, only a steady advance.
Privacy …refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
Privacy and confidentiality awareness
Privacy given away We accept lost of privacy in exchange for efficiency, convenience and small price discounts. No breakthrough, only a steady advance.
Privacy given away We accept lost of privacy in exchange for efficiency, convenience and small price discounts. No breakthrough, only a steady advance.
Behind the Machine “The Good, The Bad, and the Ugly”
A Gift of Fire Third edition Sara Baase
Privacy and Data Mining
Privacy and Data Mining
Privacy Privacy vs. security? Data privacy issues
STRUCTURE OF THE CHAPTER
It matters By: Nina Fehrenbach
Presentation transcript:

 Discrete data: do the lines between mean anything?  When do you use area charts: does the area mean anything or is it for visual effect?  Stacked charts: only if equivalent numbers  Axes: log, change values  Titles and labels

“The right to be alone” Warren and Brandeis, 1890 “zone of inaccessibility” Edmund Byrne, 1998

 “All this secrecy is making life harder, more expensive, dangerous …” Peter Cochran, BT Research  “You have zero privacy anyway.” Scott McNealy, Sun  “By 2010, privacy will become a meaningless concept in western society” Gartner report

 Secrecy › Limiting dissemination of information  Anonymity › Protection from undesired attention  Solitude › Lack of proximity Ruth Gavison 1984

 Deception  Crime  Isolation  Lack of Support

 Extrinsic loss of freedom › Ability of others to control our behavior › Coercion or imposition of others’ wills  Intrinsic loss of freedom › Changes how we behave › “anticipatory conformity”  Autonomy requires privacy

 In order to trust others, need to know something about them › Privacy impedes  In order to build STRONGEST trust between two people, need to create a bond › Requires privacy

Privacy and relationships How is it different from pre- computers/networks? –Electronic alter ego Identity convergence

–Privacy is not absolute in society … why ? –Willing to divulge SOME information in exchange for SOME economic or social benefit…. BUT reasonable expectation about how it’s treated…

My right to informational privacy vs. others’ right to know vs. security Does it have to be versus? Is it really a zero-sum game?

Shouldn’t I have a say? Why should I care? –Decisions made about us –Effect if data are Incomplete? Erroneous? Sensitive?

 Go to the court or town hall  Go through trash  Interview people  Eavesdrop/wiretap  Surveillance  Breaking and entering

 Public records easier to find  Publications spread faster  Surveillance  Keeping records of what you do on the web › Shopping › Surfing › Searching  Breaches

 The right to have information that you don’t expect to be available to others remain that way  On many sites, you give up your right to privacy  But there are also other more insidious ways  Google Dashboard

 Transparency and Control: knowing what is being collected  Anonymity  Security › Data breaches chronology Data breaches

 Cookies › Web site retaining cookies for 5 years  Sniffing, Snarfing, Snorting › Forms of capturing packets over network › Differ by how much info & what is done with it  Surveillance › Different forms? › Google Street View  Data collection and sharing

One should ask: Who has ACCESS? Who should have ACCESS? Need to know? Why? How long is the data kept?

 No Place to Hide No Place to Hide  Big Brother Big Business Big Brother Big Business