C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Course Overview Conceptions of Privacy August.

Slides:



Advertisements
Similar presentations
Module 2 Acknowledging Sources
Advertisements

PLAGIARISM How to stay out of trouble! Developed for use by the Department of Computer Science Midwestern State University.
What are Documentation and Plagiarism?
Torch Policy on Plagiarism. Plagiarism at Torch Middle School will not be tolerated. Any student who knowingly violates this rule will receive no credit.
Citing Sources in a Research Paper MLA Format. What Is MLA? MLA is the Modern Language Association. MLA is the Modern Language Association.
PLAGIARISM, QUOTING, PARAPHRASING
Avoiding Plagiarism Tips on Citations, Direct Quotes, and Paraphrasing © 2011, Regis University.
Plagiarism and the IWU Student. … I’ve been hearing about plagiarism since I was in preschool! … of course I know it’s wrong and I could get in trouble.
Referencing, NOT Plagiarising!. Outline Referencing Citations Creating a reference list Plagiarism Recognising what it is How to avoid it.
CyLab Usable Privacy and Security Laboratory 1 Privacy Policy, Law and Technology History and Philosophy of Privacy August 31 and.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Conceptions.
APA Referencing Style Using Insert Citation in MS Word 2007
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 Overview Week 1 - August.
Thesis Statement Your thesis statement is the map to your essay. The points mentioned in your thesis statement are going to be topics you cover in your.
Avoiding Plagiarism giving credit where credit is due.
Writing Research Papers. Research papers are often required of students in high school and in higher education.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 History and Philosophy Week.
APA Citation Style & Avoiding Plagiarism Jennifer Adams Vaughan Memorial Library Room 425, 2 nd floor
W. Torres What is plagiarism?.
Introduction to Citations and Bibliographic Writing Formats.
Plagiarism What it is and how to avoid it Designed by Kristina Ryan Library & Learning Resources June 18, 2011.
Week 1: Find resources, Summarize, paraphrase, thesis, and outline Week 2: Research and Write, incorporate evidence and transitions (1/2 done) Week 3:
AVOIDING PLAGIARISM. Taking someone’s property without permission is stealing.
What is it? How do I avoid it?
References & Bibliographies. What you will learn: What are references & bibliographies. Why provide references & bibliographies. Different styles of references.
Citations Created by Cat Gomez, Librarian What Is a Citation? A citation contains important pieces of information about a primary or secondary.
Acknowledging Sources
To Cite, or Not to Cite? By Tabbitha Zepeda Plagiarism RWLC Workshop Fall 2010.
Business and Management Research WELCOME. Lecture 4.
PlagiarismPlagiarism Christine G. Balmes Cristian S. Mendoza Maika E. Laguartilla.
Citations and Works Cited Page Research Essentials.
Goggins  The accepted style of formatting and citation used by historians and social scientists in papers, manuscripts, etc. What is “Chicago.
LNW2204 Assignment March 2010 Explain what you understand by supply change management and its role in evolving over the logistic and warehousing functions.
Just the Facts: How to Successfully Incorporate Relevant Research into your Academic Writing Writing Specialist Jamie Patterson and Dissertation Editor.
Plagiarism 1.Failing to cite quotes and borrowed ideas 2.Failing to enclose borrowed text in quotation marks 3.Failing to put summaries and paraphrases.

Avoiding Plagiarism Quoting, paraphrasing and summarizing
AVOIDING PLAGIARISM.
CITATION vs. PLAGIARISM INTRODUCTION Citation is the act of identifying sources. There are two types of citation.  Citation as a note or reference  Citation.
STC1204 Assignment March 2010 Assuming you are an airline manager. Explain what data you need to keep and analyse and provide the rationales for this.
[View this presentation in Slide Show mode]. Outline of Presentation: Frequently Asked Questions 3 Steps in Referencing In-Text References: rules and.
Introduction to Research High-Intermediate English Language Program.
Referencing & Bibliography Guide. Referencing Citing in your coursework acknowledges the publications where you obtained information. A reference list.
What is Plagiarism?. What is plagiarism? Main Entry: pla·gia·rize 1 : to steal and pass off (the ideas or words of another) as one's own : use (another's.
Research Vocabulary. Research The investigation of a particular topic using a variety of reliable resources.
INTRODUCTION TO COLLEGE WRITING Writing Workshop September 24 & 25, 2015.
Introduction to Research Writing An introduction to explanatory and research writing.
Banda Ramadan - Citing and Referencing 1 Communication Skills (603281) Citing and Referencing.
Check with your teacher to find out what they want and what they want it called!
Plagiarism and the IWU Student
Writing Technical Reports
CSE594 Fall 2009 Jennifer Wong Oct. 14, 2009
APA Format Crediting sources
Whose Is It, Anyway?.
Avoiding Plagiarism, Using Citations and Quotations
Introduction to In-Text Citations
Proceed to Slide 2 to begin
Word Reports & works Cited
MLA Format MLA Format  Titles, Headings, Margins, In-text citations, Formatting Quotations and creating a Works cited .
What is Plagiarism? What is MLA Format?
What Is MLA Style? MLA Stands for “Modern Language Association”
Research and Documentation Workshop ASE 1 February 22, 2012
Overview August 28, 2007.
Creating a Bibliography
Plagiarism & Annotation
WRITING THE RESEARCH PAPER
Quotations Introduce Point Quote Reason for quote.
CSE594 Fall 2009 Jennifer Wong Oct. 14, 2009
TECHNICAL REPORTS WRITING
Presentation transcript:

C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Course Overview Conceptions of Privacy August 26 and 28, 2008

C MU U sable P rivacy and S ecurity Laboratory 2 Only a goldfish can live without privacy… / / / Privacy Policy, Law and Technology Fall 2008 Tuesday/Thursday 3-4:20 pm Instructor: Lorrie Cranor How can we preserve our privacy in an increasingly digital world? This course provides an in-depth look into privacy, privacy laws, and privacy-related technologies and self-regulatory efforts. Students will study privacy from philosophical, historical, legal, policy, and technical perspectives and learn how to engineer systems for privacy.

C MU U sable P rivacy and S ecurity Laboratory 3 Introductions  About me  About you –Name –Where are you from? –What program are you in? –Why are you taking this class –Make a name tag EPP

C MU U sable P rivacy and S ecurity Laboratory 4 Syllabus  privpolawtech-fa08/ privpolawtech-fa08/

C MU U sable P rivacy and S ecurity Laboratory 5 Course number  Course is cross-listed as / / / –8-733,19-608, and are 12 units –8-533 is 9 units  Please check which number you are signed up for and switch if necessary

C MU U sable P rivacy and S ecurity Laboratory 6 Cheating will not be tolerated  You must do your own homework  It is acceptable to discuss the reading assignments and general approaches to solving homework problems with your classmates  It is not acceptable to discuss detailed homework answers or to copy homework answers from other students  Hopefully you already knew this….

C MU U sable P rivacy and S ecurity Laboratory 7 Homework 1  All homework assignments will be linked from course web site  ech-fa08/hw/hw1.html ech-fa08/hw/hw1.html  Due September 4

C MU U sable P rivacy and S ecurity Laboratory 8 Course Preview Picture Tour

C MU U sable P rivacy and S ecurity Laboratory 9 What is privacy? What does privacy mean to you?

C MU U sable P rivacy and S ecurity Laboratory 10 Discussion questions  What does privacy mean to you? –How would you define privacy? –What does it meant to you for something to be private?  How has your privacy been invaded? –Describe an incident in which your privacy was invaded by a friend or family member –Describe an incident in which your privacy was invaded by a stranger –Describe an incident in which your privacy was invaded by an institution –What is the funniest invasion of privacy that ever happened to you or someone you know?

C MU U sable P rivacy and S ecurity Laboratory Discussion questions  Should everything be private all the time?  Should everyone have an absolute right to control what information about them is private?  What are the costs of privacy? –Personal costs? –Societal costs?

C MU U sable P rivacy and S ecurity Laboratory 12 Nothing to hide?  What is the “nothing to hide” argument?  How is it used to argue for limited privacy rights?  What counter-arguments are there? Solove, Daniel J., "'I've Got Nothing to Hide' and Other Misunderstandings of Privacy". San Diego Law Review, Vol. 44, 2007 Available at SSRN: “Privacy’s function…is not to protect the presumptively innocent from true but damaging information, but rather to protect the actually innocent from damaging conclusions drawn from misunderstood information.” -- Lawrence Lessig, Privacy and Attention Span 2001

C MU U sable P rivacy and S ecurity Laboratory 13 Britney Spears: “We just need privacy” “You have to realize that we're people and that we need, we just need privacy and we need our respect, and those are things that you have to have as a human being.” — Britney Spears 15 June 2006 NBC Dateline

C MU U sable P rivacy and S ecurity Laboratory 14 Only a goldfish can live without privacy… Is this true? Can humans live without privacy?

C MU U sable P rivacy and S ecurity Laboratory 15 Avoiding Plagiarism

C MU U sable P rivacy and S ecurity Laboratory 16 CMU Policy on Cheating and Plagiarism CMU Policy*: Plagiarism includes, but is not limited to, failure to indicate the source with quotation marks or footnotes where appropriate if any of the following are reproduced in the work submitted by a student: 1.A phrase, written or musical. 2.A graphic element. 3.A proof. 4.Specific language. 5.An idea derived from the work, published or unpublished, of another person. *

C MU U sable P rivacy and S ecurity Laboratory 17 This is serious  Consequences of plagiarism in this class range from zero credit for entire assignment to failing the course to recommendation of university disciplinary action  Publishers and professional societies have plagiarism policies too  The Internet makes it easy to plagiarize –Students are frequently cutting and pasting off the Internet without proper quotation and/or citations –Students are buying papers off the Internet  The Internet also makes it easy to catch plagiarism

C MU U sable P rivacy and S ecurity Laboratory 18 Avoiding plagiarism  If you use someone’s specific words, put them in quotes and cite the source  If you use someone’s ideas expressed in your own words, cite the source  If you paraphrase, summarize in your own words, but still cite source –Don’t use same sentence structure with a few word substitutions –If you use some of the source’s words, put them in quotes  When in doubt, put it in quotes and cite the source!

C MU U sable P rivacy and S ecurity Laboratory 19 Good resources on avoiding plagiarism  See list on course website athttp://cups.cs.cmu.edu/courses/privpola wtech-fa08/skills.htmlhttp://cups.cs.cmu.edu/courses/privpola wtech-fa08/skills.html

C MU U sable P rivacy and S ecurity Laboratory 20 Creating a Bibliography and Citing Sources

C MU U sable P rivacy and S ecurity Laboratory 21 Creating a bibliography and citing sources  Do you know how to create a properly formatted bibliography?  Why is a list of URLs not a proper bibliography?

C MU U sable P rivacy and S ecurity Laboratory 22 Citing sources  Whenever you take words, images, or ideas from another source you need to cite that source –Direct quotes and paraphrases –Images, photographs, tables, graphs –Ideas, measurements, computations  Also use citations as evidence to back up assertions  If you use somebody else’s words, you must quote them –Short excerpts appear in quotes –Long excerpts (3 or more lines) are introduced and then appear as indented text, often in a smaller font, single spaced –If you leave out words in the middle use … –If you leave out words at the end use …. –If you substitute or add words, put them in square brackets [] –If you add italics say [emphasis added]  Failure to cite sources = plagiarism

C MU U sable P rivacy and S ecurity Laboratory 23 Paraphrasing  Usually paraphrasing ideas is preferable to quoting unless –Exact wording is important –You are quoting famous words –You are critiquing or comparing specific words rather than ideas –The original words say what you want to say very well and succinctly  Usually paraphrasing lets you convey an idea more succinctly because you can focus on the part of the idea most relevant to your paper  If you end up using some of the original words in your paraphrase, use quotes around those words

C MU U sable P rivacy and S ecurity Laboratory 24 Forms of citation  Full bibliographic citation inline –Typically used on a slide  Footnote or endnote –Used in legal writing, many books, some conferences and journals  Inline short citation with bibliography, references cited section, or reference list –Used by most technical conferences and journals, some books, most dissertations

C MU U sable P rivacy and S ecurity Laboratory 25 Citations in text  Format depends on style you are using –Usually a number or author and date, sometimes a page number reference too  Citation usually goes at the end of the sentence –Privacy is not “absolute,” (Westin 1967). –Privacy is not “absolute,” [3].  If Author is mentioned, in sentence, name does not appear in citation –Westin (1967, p. 7) claims that individuals must balance a desire for privacy with a desire to participate in society.  Multiple citations can appear together –[3, 4, 5] –(Westin 1967; Cranor 2002)

C MU U sable P rivacy and S ecurity Laboratory 26 Footnotes  Used heavily in legal writing  Usually used sparingly in technical writing  Each footnote appears only once  If you reference the same source multiple times you must repeat the reference information, however you can abbreviate it on second and subsequent references and use ibid to indicate same as previous reference

C MU U sable P rivacy and S ecurity Laboratory 27 Creating a bibliography  Similar rules apply to other forms of citation (footnotes, etc.)  Pick an appropriate style and use it consistently throughout your paper –Most conferences and journals have style requirements –Popular styles: Chicago/Turabian, MLA, APA, APSA, ACM, IEEE  Complete bibliographic entry includes author, title, date, publisher, place of publication, pages, volume number, etc.  Bibliographic entries should be ordered - usually either alphabetically or in order referenced in the text

C MU U sable P rivacy and S ecurity Laboratory 28 Word processing tools  Microsoft Word –Word has built in support for footnotes and endnotes –Use cross reference feature for numbered reference lists –Third party bibliographic add-ons may be useful –Latest version of Word has built-in bibliography support  LaTeX –Built in support for footnotes and endnotes –Use Bibtex!