COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.

Slides:



Advertisements
Similar presentations
Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
Learning to Hide in the Digital Age Can you completely remove your online identity?
JCSD-aw Citizenship in an e-World Johnston Community School District.
Security, Privacy, and Ethics Online Computer Crimes.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
Introduction To Privacy Law Richard Warner. Informational Privacy Our focus will be on informational privacy. Informational privacy consists in the ability.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Issues Raised by ICT.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
INLS 200 today’s line-up online privacy short video discussion questions from you? ethics cases? Ulrich’s Guide to Periodicals.
Social Networking Privacy Xintao Wu University of North Carolina at Charlotte Nov 2012.
Cyber Crimes.
Digital Citizenship By: Miranda Scorver.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Computer Programming I
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
E-IDENTITY: RESPONSIBILITY OR COMMODITY? Dina Crnec Anita Salopek Ph.D. Sanja Seljan, assistant professor Ph.D. Hrvoje Stančić, assistant professor Faculty.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Computer Legislation The need for computer laws Go to Contents.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Web-site Design Strategy.  For P4, learners are required to design a website for LocalBiz - Manningham, this is for a specified purpose and a defined.
Digital Citizenship: Active Participants in a Digital World.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
KYLE GEORGE JULY 3 RD 2014 EDU-384. DO NOT SHARE ANY PERSONAL INFORMATION ONLINE: NAME, ADDRESS, CITY, STATE OR PHONE NUMBER SOCIAL SECURTIY NUMBER ANY.
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Internet Safety Presentation by Diahn Hess. Overview Internet Safety Private and personal information Meeting people online Safe interactions Cyberbullying.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
Digital Citizenship Merlyne Kittrell Technology and Education ED SP2OL.
Internet Dangers Technology Communication Tools E-Literate.
Computer crimes.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Robert Crawford, MBA West Middle School.  Describe ways criminals obtain passwords  Discuss ways to protect your computer from being accessed by others.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Social Networking in Politics Alejandro Mandujano.
Unlinking Private Data
Take Charge of your Finances
Social and environmental impact
Hotspot Shield Protect Your Online Identity
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Chapter 17 Risks, Security and Disaster Recovery
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Information Security Footprint.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
– Communication Technology in a Changing World
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Presentation transcript:

COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy

Introduction Lauren Milisits

What is PRIVACY? The ability to seclude information and oneself  Possible violations of privacy:  Cookies  Google Maps (street view)  Criminal Registration  Criminal justice & inmates

Background Information Erika Tang

History of Information Protection Pre-Digital Era primary modes of communication and exchange had physical evidence (i.e. paper trails) hard to invade a person's privacy without finding tangible records of personal information Dawn of the Digital Age new modes of communication and exchange  social networking sites   on-line shopping greater avenues for the violation of privacy  identity theft, fraud,etc.  no longer need paper trail to invade privacy

Positive Aspects and Benefits Emerson Hum

Positive Aspects of Having Sufficient Privacy Individual can do work in seclusion without revealing certain information about themselves Individual has a level of security and confidentiality when on the computer Individual has protection in conducting interactions with others such as payment transactions or chatting

Steps Taken to Improve Privacy and Lessen the Effects of Privacy Invasion Using non-common passwords HTTPS connections provide security to servers Ability to remove cookies Avoiding sites that seem unreliable or fishy Privacy invasion laws specific for computer crimes Internet regulation to prevent others committing frauds/scams to steal information

Criticism Like Li

IN SUPPORT OF IN OPPOSITION OF Users should be able to know exactly how their data is being used Users should be able to express their views completely anonymously on the Internet Government intervention to protect consumer privacy would stifle innovation Having some way to track users decreases threats to safety (i.e. Internet stalkers, criminals, etc.) Increased Internet Privacy?

Opinion Lauren Milisits

What do we think?