CISB 412 Social and Professional Issues Understanding Privacy.

Slides:



Advertisements
Similar presentations
What is. Digital Certificate It is an identity.
Advertisements

Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
What is identity theft, and how can you protect yourself from it?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
1.3 Control of Information In this section you must be able to: Describe the legal rights and obligations on holders of personal data to permit access.
Privacy Chapter 5 James Balestrery Joshua Moulton Inesa Diaz.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Chapter 5: Privacy Ethics for the Information Age Fourth Edition by Michael J. Quinn Copyright © 2011 Pearson Education, Inc. Publishing as.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Chapter 5: Information Privacy
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Chapter 9: Network and Internet Security. Overview This chapter covers: – Security concerns stemming from the use of computer networks and the Internet.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Key to the Future Chapter 2, Lesson 2 Warm-Up Questions CPS Questions Note for teacher: Use “Pick a Student” button in CPS.
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 5: Privacy Ethics for the Information Age Forth Edition by Michael J.
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
Identity theft By: Blake D uncan.
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
Anonymity, Security, Privacy and Civil Liberties
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
CISB 412 Social and Professional Issues Professional Ethics.
Chapter 5 In-Class Notes. Background on Credit Types of credit: instalment and revolving open-end credit There are advantages and disadvantages to using.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
CISB 412 Social and Professional Issues Understanding Privacy.
Security, Social and Legal Issues Regarding Software and Internet.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
Revision. The Paper Watch out for … Identify and explain Explain with examples Compare and contrast Discuss and justify Marks – figure out the marks.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
Jeff loses his identity! Lesson 8: Identity Theft.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
CISB 412 Social and Professional Issues Final Discussion.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
CISB 412 Social and Professional Issues Understanding Intellectual Property.
Cybersecurity Test Review Introduction to Digital Technology.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
S2 PSE Relationships Lesson 1 Values Rights Responsibilities.
Key Knowledge Confidentiality Year 4 Medical Ethics and Law Thread Course The Ethox Centre, University of Oxford.
Jeff loses his identity! Lesson 5: Identity Theft.
Lecture4 Information Privacy 1-1. Overview Introduction Perspectives on privacy Information disclosures Data mining 1-2.
Christian Citizenship in a Digital World Lesson 2: Personal Identity: Your brand and reputation Your brand and reputation.
Identity Theft It’s a crime!
Security, Social and Legal Issues Regarding Software and Internet
Add video notes to lecture
Chapter 5 Privacy.
Digital Citizenship Middle School
Wiretapping and Encryption
Personal Safety Online
IT and Society Week 2: Privacy.
Presentation transcript:

CISB 412 Social and Professional Issues Understanding Privacy

Reference Materials used in this presentation are extracted mainly from the following texts, unless stated otherwise. Michael J. Quinn “Ethics for the Information Age”, 3 rd edition. Pearson 2009

Learning Outcomes At the end of this lesson you should be able to – Explain the perspectives of privacy – Describe ways privacy can be compromised through the usage of technology – Apply the ethical principles on the issues of privacy to establish morality of the action

Defining Privacy Discussions about privacy revolve around the concept of ‘access’ Access can be seen from 2 perspectives: – Physical proximity to a person – Knowledge about a person You exercise your privacy when you : – lock the door behind you when using a restroom – choose not tell the clerk at the video shop your mobile number

Defining Privacy Social arrangement that allows individuals to have some level of control of who is able to gain access to their physical selves and their personal information. Violating someone’s privacy is considered an insult to the person’s dignity.

Harms of Privacy People may take advantage of privacy to plan and cover up illegal or immoral activities Examples: – Family violence – Social and economics inequities A challenge in parenting duties Love thy neighbour – who is my neighbour?

Benefits of Privacy Individual growth, individual responsibility – a way society acknowledge and communicates to an individual that he/she is responsible or his own development as a unique person Freedom to be yourself, allow us to remove our public persona Shut out the world, be more creative Development of loving, trusting, caring, intimate relationships – privacy ladder

Privacy and Trust Trusting is easier a couple of centuries ago Greater emphasis on community, lesser on individual Pressure to conform

Privacy and Trust Modern life more private Challenge: living among strangers How can we be sure that … – Taxi driver will get us to our destination without hurting us? – The teachers at school are not child molesters? – Bank knows that if it loans someone money, it will be repaid?

Privacy and Trust In order to trust, we must rely on the reputations This was easier in the past. Today’s society must get information out of people to establish reputation: – Through ordeal e.g. lie detector, drug test – Through issuing/requesting credentials e.g. drivers license, badge, id, degree transcript etc Establishing reputation  reducing privacy

Disclosing Information Public record Contains information about an incident or action reported for the purpose of informing the public E.g. » Birth certificates, death certificates, criminal records, police report » Census Record » Internal Revenue (Taxation)

Disclosing Information Public information – Information you have provided to an organization that has the right to share it with other organization – E.g. Listing in phone directory Rewards, Loyalty Programs Digital Video Recorder Automobile Black Box Implanted Chips Spyware, Cookies

Disclosing Information Personal information – undisclosed information, will remain personal information as long as you never disclose to a party that has the right to share with others – E.g. Your religion, your mobile number Types of disclosures – Voluntary (e.g. form filling) – Involuntary (e.g. CCTV) – Statutory (e.g. obtaining license, loan)

Data Mining Data mining – Searching for patterns or relationships in one or more databases – Way to generate new information Secondary use: information collected for one purpose used for another purpose Information about customers is a valuable commodity

Ownership of Transaction Information Who controls transaction information? – Buyer? – Seller? – Both? Opt-in: consumer must explicitly give permission for the organization to share info Opt-out: consumer must explicitly forbid an organization from sharing info

Identity Theft Identity theft: misuse of another person’s identity to take actions permitted to the owner Credit card fraud #1 type of identity theft – Ease of opening accounts contributes to problem – 10 million victims in 2004 alone

Identity Theft Not necessary the result of IT, information can also be obtained through low-tech method : dumpster diving, shoulder surfing Example of high-tech method : use of skimmer/wedges at ATM, credit card machines, phishing

Encryption The process of transforming a message in order to conceal its meaning A valuable tool for maintaining privacy Information can be deemed worthless unless it can be decoded

Symmetric Encryption Single key used to encrypt and decrypt a message Both sender and receiver must have the key Problem: How does sender get key to receiver? If bad guy gets key, security is broken

Public Key Encryption An example of asymmetric encryption Each person has two keys: public and private To send R a message, encrypt it with R’s public key R decrypts message with R’s private key No need to communicate keys Strong encryption: virtually impossible to figure out private key.

Try this Is privacy a negative right or a positive right? What is the difference between a public record and a public information Which is easier to control: public records or public information? List five pieces of information about a person that are public records Name 2 ways criminal can steal information at ATMs Should parents implant microchip s in their children? Why? Video surveillance is used widely at public places. Do you agree with this approach of ‘maintaining public safety’? What is the advantages and disadvantages.

Questions?