Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 History and Philosophy Week.

Slides:



Advertisements
Similar presentations
Privacy Today Privacy Day January 28, 2008 International Association of Privacy Professionals.
Advertisements

Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Information for Students MGH Institute of Health Professions Use your down arrow or click your mouse to advance through the presentation.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
*Why should parents care about computers and the Internet? *Technology skills are crucial to childrenÌs future success *By 2000, about 60% of new jobs.
DO NOT USE THIS SPACE DO NOT USE THIS SPACE Internet Privacy How private is your identity? How private are your activities? Digital media ( , photos,
Conducting the Interview/Survey
Ethics, Privacy and Information Security
Google for Genealogists. Google's mission statement “Organize the world's information and make it universally accessible and useful."
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
Right to Privacy: The Unwritten Right
Netiquette Rules.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Fair Information.
“zone of inaccessibility” Edmund Byrne, 1998 “The right to be alone” Warren and Brandeis, 1890 COMP 381.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Privacy Law.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Engineering Privacy November 6, 2008.
Privacy 2. Additional references
CS294-1 Deeply Embedded Networks Privacy Discussion 11/25/03 David Culler University of California, Berkeley.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Web Privacy.
C MU U sable P rivacy and S ecurity Laboratory Philosophical definitions of privacy Lorrie Faith Cranor October 19, 2007.
Searching with Search Engines ATS 2004 Menchaca. Search Engines Collect Spiders Spiders Bots Bots Humans Humans.
Computers and Society Carnegie Mellon University Spring 2007 Cranor/Tongia 1 Regulating Online Speech / Privacy.
CyLab Usable Privacy and Security Laboratory 1 Privacy Policy, Law and Technology History and Philosophy of Privacy August 31 and.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Data Privacy.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 History and.
Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 1 Intellectual Property.
3 Ethics and Privacy.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology History and Philosophy of Privacy September.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
SOCIAL WELFARE POLICY Chapter 17 O’Connor and Sabato
Computer Ethics Using Internet efficiently and productively Plagiarism, Internet addiction, Game addiction.
INLS 200 today’s line-up online privacy short video discussion questions from you? ethics cases? Ulrich’s Guide to Periodicals.
Wasim Rangoonwala ID# CS-460 Computer Security “Privacy is the claim of individuals, groups or institutions to determine for themselves when,
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 History and Philosophy Week.
Anonymity, Security, Privacy and Civil Liberties
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Overview Week 1 - August.
Internet Searches The Basics for Effective Research Using the World Wide Web.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Current Best Practices and Precedents Existing UAV Guidelines/Best Practices.
Introduction To Internet
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Identity and biometrics.
Youtube, Facebook, My Space and Texting – Are the above Newfound communities or a diversion from healthy face-to-face relationships? By Kate Sweeting.
CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net.
Norton UniversityBusiness Concepts and Social Issues 1 PART TWO Business Concepts and Social Issues.
Networked Information Resources Online Retrieval.
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
Definition: Privacy Psychology: Selective access to oneself or one’s group. Legal: The right to be left alone What is the difference between privacy and.
1 Web Searching An Easy, Practical Guide for Parents.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 Current Issues Week 12 -
What is Google? Google is a popular web search engine— And learning techniques saves time and results in rewarding research.
Selected Internet Search Engines Search Engine Database Advanced/ Boolean Other search options Miscellaneous Google Google google.co m Advanced Search.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Goal: By the end of this lesson you should understand how social media are taking away your privacy rights.
HIPAA for Students Health Insurance Portability and Accountability Act.
Volunteer Training for Robertson County School Volunteers.
Privacy 2 (draft). Digital Dossier The data shadow The digital dossier Personal accountability.
Definition: Privacy Psychology: Selective access to oneself or one’s group. Legal: The right to be left alone What is the difference between privacy and.
Creating a Culture of Privacy Michael Kaiser Executive Director National Cyber Security
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Privacy and the Law.
Health Care: Privacy in a Digital Age
Digital Storytelling With Primary Sources.
CHAPTER 3 Ethics and Privacy.
IT and Society Week 2: Privacy.
Presentation transcript:

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 History and Philosophy Week 2 - September 7

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 2 Homework 1 Review ml ml Any highlights from the reading you want to discuss? Collages

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 3 Homework 2 ml ml

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 4 Finding info with search engines General purpose search engines Google, Yahoo, Altavista, A9, etc. Clustered searching Vivisimo, Dogpile Search CS research literature Research and Communication Skills

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 5 Advanced searching Boolean searching Operators: AND, OR, NOT, NEAR Implied operators: AND is often implied Parentheses for grouping Wildcards Quotes Getting to know the ins and outs of your favorite search engines Many search engines do not use pure boolean searching Most search engines have some special syntax Search engines use different algorithms to determine best match Research and Communication Skills

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 6 Advanced Googling See Google.html Google.html Ranks results using PageRank algorithm, taking into account popularity, importance, word proximity Special syntax intitle, inurl, site, intext, filetype, daterange, numrange Boolean operators: OR, - Fuzzy searching: ~,.., * Exact phrases: “” 10-term limit Special searches Definitions (define), calculator, area codes, flight searches, and more Research and Communication Skills

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 7 What is privacy? “Being alone.” - Shane (age 4)

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 8 Westin “Privacy and Freedom” 1967 “Privacy is the claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others” Privacy is not an absolute

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 9 Westin’s four states of privacy Solitude individual separated form the group and freed form the observation of other persons Intimacy individual is part of a small unit Anonymity individual in public but still seeks and finds freedom from identification and surveillance Reserve the creation of a psychological barrier against unwanted intrusion - holding back communication

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 10 Westin’s four functions of privacy Personal autonomy control when you go public about info Emotional release be yourself permissible deviations to social or institutional norms Self-evaluation Limited and protected communication

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 11 Information vs. decisional privacy Information privacy concerns the collection, use, and disclosure of personal information Decisional privacy concerns the freedom to make decisions about one's body and family

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 12 Different views of privacy Privacy as limited access to self the extent to which we are known to others and the extent to which others have physical access to us Privacy as control over information not simply limiting what others know about you, but controlling it this assumes individual autonomy, that you can control information in a meaningful way (not blind click through, for example)

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 13 Privacy as deprivation? Deprived of being heard and seen by others Deprived of being contacted by others Deprived of benefits that come as a result of your personal information being available to others

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 14 Privacy as animal instinct Eagles eating a deer carcass Is privacy necessary for species survival?

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 15 Information privacy In 17th century America, colonists began to collect information about each other Census, birth and death records, school records, tax records Informants reported people who behaved badly Disorderly children, nightwalkers, Sabbath breakers, atheists, drunks

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 16 Privacy of personal space Historically, depended a lot on the type and proximity of available housing In 18th century Europe, most people lived in cities where houses were close together, but small number of people lived in each house In 18th century America, people lived far away from each other but many people lived in each house and even shared beds

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 17 Communication privacy When all communication was oral, communication privacy depended on Communicating without someone overhearing Communicating with people who wouldn’t tell others Written communications brought new opportunities for privacy violations In 18th century America, postal mail was not necessarily private Sealing wax, basic encryption used to increase privacy Congress made it illegal to open other peoples’ mail Later the invention of the adhesive envelope increased communications privacy

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 18 Telegraph In the late nineteenth century the telegraph became a popular means of long distance communication Messages could be coded, but you could not recover damages due to transmission errors if the message was coded Telegraph operators were supposed to keep messages confidential Occasional subpoenas for telegraph messages

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 19 Cameras Cameras, especially portable “snap” cameras (1888), raised new privacy concerns Telephoto lenses Video cameras Hidden cameras Web cams Satellite images

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 20 Multiple facets of privacy How can posting personal information about myself on my web site result in a reduction of my privacy? How can it result in an increase in my privacy?

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 21 Privacy History References Robert Ellis Smith Ben Franklin’s Web Site: Privacy and Curiosity from Plymouth Rock to the Internet. Providence: Privacy Journal. Alan Westin Privacy and Freedom. New York: Atheneum.

Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 22 More homework 1 review Web cams Privacy in the news Issues privacy groups are working on Any questions about plagiarism?