TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 3: Protecting Privacy: Name or Nym.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 6: Meeting People Online.
Cyber Safety Assessment Review
Social Media Pros & Cons for Parish Councils. What we’ll be covering… ➔ What is ‘social media’? ➔ Tuning in – what are the channels? ➔ Risk factors –
PORTFOLIO.  TYPE OF INTERNET TRANSACTION 1. ONLINE BANKING 2. ONLINE SHOPPING.
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Evelyn Stiller and Cathie LeBlanc Department of Computer Science and Technology Plymouth State University.
Legal, Social, and Ethical Issues
 IT pro’s work raises ethical issues involves privacy. Ex: Should company have right to monitoring employees’ ? Should company have right to log.
Privacy By Mohammed Al-Ghamdi. Outline Introduction Privacy How to Provide Privacy Ethics Summary.
VISD Acceptable Use Policy
 Digital marketing: Uses digital media to develop communications and exchanges with customers  Electronic media (E-marketing): Refers to the strategic.
Scenario 1 Project title: Rural experiences of 'gay' sexual identity. Research questions: What is the role of the internet in providing an outlet through.
COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.
INTERNET SAFETY Lynn W Zimmerman, PhD.  Hacking  Identity theft  Stolen passwords  Invasion of privacy POTENTIAL PROBLEMS  Stalking  Cyber-bullying.
E-Safety Challenge College. Learning Objectives To assess the risks faced when online and how to use the options available to protect yourself.
PREPARED BY : NURUL SHUHADA BINTI ASAT  E-commerce or online shopping means buying and selling of products or services over electronic system such as.
Safer Internet Day 2015 Let’s create a better internet together.
An Educational Computer Based Training Program CBTCBT.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
E-IDENTITY: RESPONSIBILITY OR COMMODITY? Dina Crnec Anita Salopek Ph.D. Sanja Seljan, assistant professor Ph.D. Hrvoje Stančić, assistant professor Faculty.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
A Boon or a Curse. What is the ‘Internet’?  It is a network of networks that consists of millions of private, public, academic, business, and government.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Class 6 Internet Privacy Law Social Media Privacy.
MIME Object Security Services (MOSS). Privacy Enhanced Mail (PEM) was the first Internet standard to address security in messages. The MOSS protocol.
Digital Citizenship WARREN HILLS REGIONAL MIDDLE SCHOOL.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
Technology Transfer, Technology Dumping Computer Freedom and Privacy Conference, Berkeley, April 20-23, 2004 Jagdish Parikh Human Rights Watch, New York.
Ethics. Ethics are the principles and standards we use to decide how to act.
Online Safety Issues in Our School Topics of Discussion All about Acceptable Use Policies Significance of Signatures on an AUP What is included in an.
Test Your Smartitude Computer Safety. Pick a box, any box… RulesVocabularySafe or Not Safe
Digital Responsibility Created by Ms. Madeley Digital Literacy Resource Teacher Welcome Back Assembly.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
Computer Issues Acceptable Use Policy Online Safety Photo Permission Forms Rachel Gorsuch Stephanie Herbin Natalie Wu Acceptable Use Policy Online Safety.
Internet Safety Presentation by Diahn Hess. Overview Internet Safety Private and personal information Meeting people online Safe interactions Cyberbullying.
Breaking the law. The danger Either knowingly or otherwise, children and young people can fall foul of the law or get into trouble with other Internet.
How To, When To and What To Do in Conducting an Investigation July 10, 2013 Chris M. Wright.
Digital Citizenship Unit 1 Review True/Not True. The agreement that’s students and parent’s sign that describes the school district’s online policy is.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
CYBER SAFETY do now… How is the internet used in your life? List at least 2 ways that you use the internet.
Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Digital Citizenship By Teneka Cannon. . Digital Etiquette also known as Netiquette Definition: a basic set of rule everyone should follow to make Internet.
Computer crimes.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Acceptable Use Policies and Internet Safety Melissa Borger Jamie Grauel Sam Westbrook Liz Robb Melissa Borger Jamie Grauel Sam Westbrook Liz Robb.
Kender Primary School E-Safety for Parents and Carers *Look at how children use the internet *Raise awareness of eSafety issues *Offer guidance on how.
Copyright Quiz How Well Do You Know Copyright?. Copyright Quiz: True or False Only materials with a copyright symbol,©, are protected. If it doesn’t have.
SAFETY, SECURITY, & PRIVACY IMPLICATIONS FOR THE CLASSROOM.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
CONDUCTING AN ETHICAL ONLINE STUDY Janet Salmons, PhD Chapter 5.
Data Protection Officer’s Overview of the GDPR
Digital Citizenship Grades 4-6
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
Are You and Your Students Responsible Digital Citizens?
Online Safety! By: Michelle Deng.
Freedom Independence Transition
IS4680 Security Auditing for Compliance
Fundamentals of Information Systems
انشاء موقع الكتروني.
Unit 1 Review True/Not True
Internet law Business law.
Participants’ Rights Participants of clinical trials have rights, and they are protected under law when participating in clinical trials. The informed.
– Communication Technology in a Changing World
Does It Matter Who Has Your Data?
Presentation transcript:

TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 3: Protecting Privacy: Name or Nym

Learning Module 3: Name or Nym?

Celebrity Factor What is a “celebrity”? Celebrities play a significant role in shaping our values. Technology has provided a means through which the public can learn more about the private lives of celebrities.

Celebrity Factor The desire to be “known” and to be popular is one of the benefits that you can experience online. When you disclose your personal information, you risk losing control of your privacy. How do you determine which information is OK to disclose to others and which you should keep private?

Pseudonymity Creating a “new” identity to avoid identification; masking your “true” identity. “NYM” – alternate identity, address, screen name.

Pseudonymity Pseudonymity allows you to maintain a sense of control over which parts of your identity are expressed to the public, while at the same time, allowing you to “try-on” new identities. Individuals using the Internet are vulnerable to losing control of their personal information. Creating an “Internet identity” might be one way to keep your personal information private.

Pseudonymity there are circumstances when the law requires that individuals identify themselves accurately. (ie. Contracts) Impersonating another person or providing false information in an agreement, contract, or even shopping online is against the law.

Privacy Policies Reading privacy policies can tell us for what purposes our personal information will be used.

Name or Nym: Summary Pseudonymity is a method of protecting privacy by creating a “new identity” through which to engage in online activities.

Name or Nym Summary It is important to distinguish between circumstances when it is permissible to use a pseudonym and times when it might be illegal. Privacy policies on websites outline the ways in which personal information will be used.

Name or Nym: Questions How does technology enable us to invade the private lives of celebrities? Do you think this is fair? What are some of the ways that new technologies can enable users to become “cyber-celebrities? What are the benefits of having a personal webpage, chatting online, or having a blog? What are the problems?

Name or Nym: Questions How can users protect their privacy while still enjoying many of the opportunities that the internet offers? How often do you read privacy policies on websites? What information on privacy would you like to see on websites?