Cyberculture and Privacy Baase, Chp 2. Cyberculture and Privacy A.Computers and Privacy Computers are not needed for the invasion of privacy. 1.Computers.

Slides:



Advertisements
Similar presentations
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Advertisements

VassilevaCMPT Privacy 1 Privacy - Objectives 1.Define the right of privacy. 2.Why can IT be a threat? 3.Outline what information is collected by.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Internet Privacy & Security A Presentation to WPI Student Pugwash Michael J. Ciaraldi Professor of Practice, WPI Computer Science 2003/10/02.
PowerPoint® Slides to Accompany
Slides prepared by Cyndi Chie and Sarah Frye Modified for Auburn University by Cheryl Seals A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
A Gift of Fire Fourth edition Sara Baase
3 Ethics and Privacy.
Privacy & Personal Information -- Why do we care or do we?
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
IS 490 Notes for Baase Textbook, Chapter 2. Check the Homework Page for the weekly assignment (it's due next Monday). Go to the Angel Page for this course,
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
Anonymity, Security, Privacy and Civil Liberties
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Privacy Information: A Consumer Action Project information.org Workplace Privacy Your rights on the job © Consumer Action 2009.
The Patriot Act Protecting the US or Violating People’s Freedoms.
Forum IIIB Group 7 Open Access to Personal Information Introduction- Steve Ayers Pros- Michelle Peterson Cons- Christie Christman Conclusion- Audrey Clausen.
Privacy and Personal Information
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Free Cookies and Other Security and Privacy Issues.
What is Privacy?. 3 Types of Privacy 1.Accessibility Privacy 2.Decisional Privacy 3.Informational Privacy.
Teens lesson fourteen consumer privacy presentation slides 03/08.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
TASFAA 2016 Legacy of Leadership. TASFAA 2016 Legacy of Leadership Family Educational Rights and Privacy Act (FERPA) An Overview Molly Thompson Associate.
CHAPTER 2: PRIVACY By: Logan Sealover, Bradley Green, Logan Kallop.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Privacy 2 (draft). Digital Dossier The data shadow The digital dossier Personal accountability.
Lecture4 Information Privacy 1-1. Overview Introduction Perspectives on privacy Information disclosures Data mining 1-2.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Framework of engagement : big data for official use Roy D. Ibay AVP Regulatory PLDT – Smart.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
College lesson ten consumer privacy presentation slides 04/09.
privacy and information
Privacy and the Law.
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Societal Issues in Computing (COMP466)
Computers and Data Collection
Wiretapping and Encryption
Who Uses Encryption? Module 7 Section 3.
A Gift of Fire Third edition Sara Baase
Privacy and Information
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Other Sources of Information
Chapter 10: Privacy, Security, and Ethics
Teens lesson fourteen consumer privacy presentation slides 03/08.
Session 25 INST 301 Introduction to Information Science
A Gift of Fire Third edition Sara Baase
IT and Society Week 2: Privacy.
Presentation transcript:

Cyberculture and Privacy Baase, Chp 2

Cyberculture and Privacy A.Computers and Privacy Computers are not needed for the invasion of privacy. 1.Computers do make new threats possible and old threats more potent, however. 2.Privacy can mean: Freedom from intrusion into personal life. Control of information about oneself. Freedom from surveillance.

Cyberculture and Privacy B.Style 1.Primary Use Example: IRS data used to establish tax owed; 2.Secondary Use Using information for a purpose other than the one for which it was obtained. Some examples: Sale (or trade) of consumer information to other businesses. Credit check by a prospective employer. Government agency use of consumer database.

Cyberculture and Privacy C. Method: 1. Oblique Information Gathering: You are asked and willingly provide primary-use information; 2. Transparent Information Gathering: Satellite surveillance Caller ID Supermarket cards Web-tracking data; cookies. Peer-to-peer monitoring (remote desktop/ WMA licenses) 800- or 900- number calls (or the pizza place)pizza place

Cyberculture and Privacy C. Method: 3. Data Mining Accumulating massive amounts of information. Some examples: Sharing of business or government databases to detect fraud by recipients of government programs, or to analyze criminal background for elections. Ex: ChoicepointChoicepoint Choicepoint and the 2000 election Citibank (see handout)

Cyberculture and Privacy D. Uses: 1. Computer Matching Combining and comparing information from more than one database. Some examples: Sharing of government agencies’ databases to detect fraud by recipients of government programs. Creating consumer dossiers from various business databases. Sharing cross-state law enforcement info

Cyberculture and Privacy D. Uses: 2. Personal Profiling Using data in computer files to predict likely behaviors of people. Some examples: Businesses engage in profiling to determine consumer propensity toward a product or service. Government agencies use profiling to create descriptions of possible terrorists.

Cyberculture and Privacy D. Uses 3. Monitoring and Tracking Examples: GPS (global positioning system). Cell-phones. Black boxes in automobiles. Other wireless appliances.

Cyberculture and Privacy E.Big Brother i. Federal Government Databases Purpose: Determine eligibility for jobs and programs. Reduce waste. Detect fraud. Law enforcement: CARNIVORE (DCS1000); CALEACARNIVORECALEA Regulations: Privacy Act of 1974.Privacy Act of 1974 Electronic Communications Privacy Act of 1986.Electronic Communications Privacy Act of 1986 Computer Matching and Privacy Protection Act of 1988.Computer Matching and Privacy Protection Act of 1988

Cyberculture and Privacy E.Big Brother ii. 4 th Amendment4 th Amendment a. Expectation of Privacy: Government’s rights are limited. Government must have probable cause to search private premises or seize documents. b. Privacy Challenges: New sensing and surveillance technologies enable the government access to private premises without physical entry. New technologies provide the government with access to huge amounts of personal data in business databases. Courts allow some searches and seizures of computers without search warrants.searches and seizures of computers without search warrants c. Foreign Government Law ex: China and GoogleChina and Google

Cyberculture and Privacy E. Big Brother iii. National ID Card System (driver’s license, smart cards, e.g.)National ID Card System If implemented today, the card would contain your: Name. Address. Telephone number(s). Photo. SSN. The system could potentially allow access to your: Medical information. Tax records. Citizenship. Credit history. Much more…

Cyberculture and Privacy F.Privacy Enhancing Technologies Cookie/Adware disablers Opt-in/opt-out options Anonymous Web services PGP, Encryption, P3PPGP, EncryptionP3P ‘Good’ passwords (what makes one good?) Audit trails (particularly important for e-voting)