INLS 200 today’s line-up online privacy short video discussion questions from you? ethics cases? Ulrich’s Guide to Periodicals.

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
IDENTITY THEFT By Beaudan S and Tazwaar A. Identity Theft Identity theft is hard to protect against because hackers are getting better and better and.
David Abarca, Instructor Del Mar College Computer Corner Online Shopping.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
Security, Privacy, and Ethics Online Computer Crimes.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
6/10/2015Cookies1 What are Cookies? 6/10/2015Cookies2 How did they do that?
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy and Networks CPS 96 Eduardo Cuervo Amre Shakimov.
XP Tutorial 9 New Perspectives on JavaScript, Comprehensive1 Working with Cookies Managing Data in a Web Site Using JavaScript Cookies.
CS526Topic 9: Web Security (2)1 Information Security CS 526 Topic 9 Web Security Part 2.
COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Security of Cookies In A Public Computer Lab Setting Russell Fech November 30, 2000.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Robert Crawford, MBA West Middle School.  Summarize the danger of sharing personal information on the internet.  Explain how cookies and global unique.
Read to Learn Discuss the different types of checking accounts and how they work. Discuss other services and offerings that banks provide checking account.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Working with Cookies Managing Data in a Web Site Using JavaScript Cookies* *Check and comply with the current legislation regarding handling cookies.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
The Internet TCIP/IP  TCP/IP stands for Transmission Control Protocol/Internet Protocol, which is a set of networking protocols that allows two or more.
Chapter 8 Cookies And Security JavaScript, Third Edition.
UWCISA Symposium on Information Systems Assurance 2005 Internet Privacy Research University of Waterloo Efrim Boritz Won Gyun No R. P. Sundarraj Framework,
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
COOKIES. INTERNET COOKIES What are they Where are they found What should you do about them.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Protecting Students on the School Computer Network Enfield High School.
Patron Privacy Issues Cindy Cunningham – OHSU. Overview Balancing demands (academic environment) Privacy in Libraries System Privacy  Vendor  Institution/Library.
Ethical Internet Use TECH 503 By A. Greenwell. Ethics in the Virtual World We all grow up learning the rules, regulations, and laws of the real world.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Digital Communication and Networks. Go to this website 10 minutes looking Pick an article Prepare a 5 slide pp Take into account.
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
Online Journalism in Agricultural Communication Agricultural Communication and Leadership.
Cookies / Sessions Week 10 TCNJ Web 2 Jean Chu. Webpages have no memories.
Society & Computers PowerPoint
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Digital Communication and Networks. When people visit web sites their ◦IP address, ◦browser software, ◦operating system ◦viewing.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
COOKIES Gloria Soria Network Security COSC 356. What is a Cookie? A cookie is a piece of text that a Web Server can store on a user's hard disk. Cookies.
Facebook privacy policy
Shopping online tips Presented by: Wala Al-Zahrani
Hotspot Shield Protect Your Online Identity
Personal spaces.
SETTING UP OF E-COMMERCE WEBSITE
Internet and security.
COOKIES.
Guide: How to Set, Get, and Delete Cookies in WordPress? Guided By: wpglobalsupportwpglobalsupport.
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Unit 27 Web Server Scripting Extended Diploma in ICT
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
TITLE YOUR NAME.
Information Security CS 526 Topic 9
Business Zone - Clearing your Cache
Lesson Plan Safe Data Part 2 Duration: 50 Mins.
Presentation transcript:

INLS 200 today’s line-up online privacy short video discussion questions from you? ethics cases? Ulrich’s Guide to Periodicals

What do we mean by privacy? Louis Brandeis (1890) – “right to be left alone” – protection from institutional threat: government, press Alan Westin (1967) – “right to control, edit, manage, and delete information about themselves and decide when, how, and to what extent information is communicated to others”

Privacy vs. security Security helps enforce privacy policies Can be at odds with each other – e.g., invasive screening to make us more “secure” against terrorism Privacy: what information goes where? Security: protection against unauthorized access

Privacy-sensitive information Identity – name, address, SSN Location Activity – web history, contact history, online purchases Health records …and more

Tracking on the web IP address – Number identifying your computer on the Internet – Visible to site you are visiting – Not always permanent Cookies – Text stored on your computer by site – Sent back to site by your browser – Used to save prefs, shopping cart, etc. – Can track you even if IP changes Internet

al_media_likes_say_more_than_you_might_think#t-2006

privacy / security balance for you? cost – benefit: – What are you willing to share? – What do you expect in return? Ethics – Who/what should moderate this balance if anything?

by DisciplineAlphabetical list: “U”Ulrich’s Web Online

Pecha kucha presentation