Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Chapter 10 Privacy and Other Social Issues. Copyright © 2003, Addison-Wesley What Is Privacy? Freedom from observation, intrusion, or attention of others.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
NC1 WETZEL. Purpose  To revise policy and provide guidance for the establishment of a sexual assault prevention/victim assistance program within the.
Chapter 4 Personal Security
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
COMP6005 An Introduction to Computing An Introduction to Computing Privacy and Ethical Issues.
Business Plug-In B7 Ethics.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
E-Commerce: Regulatory, Ethical, and Social Environments
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
MKTG 476 SECURITY Lars Perner, Instructor 1 Internet Security  Servers  Hacking  Publicly available information  Information storage  Intrusion methods.
PROTECTING PEOPLE AND INFORMATION Threats and Safeguards
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Anonymity, Security, Privacy and Civil Liberties
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
Staying Safe Online Keep your Information Secure.
BA J. Galván1 PRIVACY and Other Social Issues.
Computer Legislation The need for computer laws Go to Contents.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Lesson 15 : Networks And The Internet
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
Chap 10: Privacy in Computing.  Privacy as an aspect of security  Authentication effects on privacy  Privacy and the Internet  Privacy implications.
Security in Computing  Privacy in Computing  Legal & Ethical Issues in Computer Security  Information Security Management and Security Controls.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Unlinking Private Data
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Privacy and the Law.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Chapter 10 Cyberlaw, Social Media, and Privacy
Secure Software Confidentiality Integrity Data Security Authentication
Security.
Chapter # 1 Overview of Ethics
Biometrics.
Legal and Ethical Issues
E-Commerce: Regulatory, Ethical, and Social Environments
Societal Issues in Computing (COMP466)
Learning Area 1 Information And Communication Technology and Society
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Biometrics.
CHAPTER FOUR OVERVIEW SECTION ETHICS
Personal Privacy and the Public Internet
Security in Computing, Fifth Edition
Presentation transcript:

Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9

Privacy in Computing What is privacy? Individual Control of personal information Right to declare certain information sensitive Privacy has a cost: giving – or not giving – certain information may have affect how we are treated Computerization did not invent privacy problems, nor will it solve them

Privacy in Computing Basic qualities/dimensions/tenets of privacy Consent of information collection Limited use Limited period of retention Limited disclosure Protection of collected information against inappropriate use Controlled access, logging Monitoring of use, logging Policies cannot be weakened once data items are collected.

Privacy in Computing Anonymity, pseudonymity, multiple identities Anonymity - meaning "without a name" or "namelessness". Pseudonymity - is a state of disguised identity.

Principles and Policies Fair information policies. Privacy Laws – Which Country nternational.org/repo rts/nepal

Authentication Of an: Individual Identity Attribute Anonymization Delivering unique identities from anonymized data Work of Anderson, Sweeney. In 2000, she showed that 87 percent of all Americans could be uniquely identified using only three bits of information: ZIP code, birthdate, and sex.uniquely identified using only three bits of information

Data Mining Privacy-preserving data mining Tradeoff between anonymity and identification for good purpose Joining databases on common data values Aggregating for study of trends, connections The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use.

Privacy on the Internet Finance Web payments Credit cards Anonymous payments Retained relationships Cookies Site logins Payments in cases of mutual distrust Impersonation Unannounced relationships (tracking)

Privacy on the Internet Tracking Web bugs Keystrokes logging Spyware and Adware hijacking

Secure No sender assurance; little ability to track the origin of a message Insecure channels Monitoring Anonymous and r ers Spoofing, spam

Emerging Technologies Examples RFID – Radio-frequency identification Definition Uses Misuses Electronic voting Far election principles Contrast to fairness of paper ballot, mechanical voting techniques Internet voting Voice over IP

Legal and Ethical Issues in Computer Security This is a very broad topic – some topics for class discussion based on case studies are: Determining current and national laws concerning personal privacy and computer records, computer fraud, or hacking, given that laws change frequently Review recent prosecutions of computer crime cases to see what laws where used for this prosecution

Legal and Ethical Issues in Computer Security How to address the international aspect of computer crime – i.e. when a criminal in one country commits a crime against a computer in another country - Whose law is broken? - Whose police and courts have jurisdiction? - How should the crime be investigated? - What if the transaction is passed through

Information Security Management and Security Controls Key area relating to ISO/IEC code of practice for information security management and security controls in terms of: general principles, best practice recommendations, established guidelines and any specific issues within this area

Thank You !