Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.

Slides:



Advertisements
Similar presentations
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Emerging Trends and Technologies: Business, People,
Advertisements

1. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 2 Technology in Action Chapter 1 Why Computers Matter to You: Becoming Computer.
9 Lecture The Wireless Revolution. Identify the principal wireless transmission media and devices, cellular network standards and generations, and standards.
Privacy 2. Additional references
COMP6005 An Introduction to Computing An Introduction to Computing Privacy and Ethical Issues.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
1. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 2 Technology in Action Chapter 1 Why Computers Matter to You: Becoming Computer.
3 Ethics and Privacy.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Big Brother is watching.  1. Would you ever consider letting a TV crew come into your life to document everything? Why or why not?  Big Brother, Kardashians,
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Presented by Allyson Medina, RN
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
RFID in the Military Rana, Mohammed,Trandel, Ahmed.
ICT at Work Global Communication.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Review. Definition Big Brother is the term used for a person or organization exercising total control over people’s lives.
FlipFlop PD June 12, 2012 Stephanie Dixon, EBRPSS What’s in Your Digital Dossier?
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
Privacy Information: A Consumer Action Project information.org Workplace Privacy Your rights on the job © Consumer Action 2009.
Privacy and Personal Information
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
1 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1 What Is Computer Literacy? To be computer literate, you must: –Understand a computer’s.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Indecent Exposure – Are Your Private Parts Truly Private? (Privacy and Technology) Barbara Buckett Barbara Buckett & Associates 27 August 2008.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Ethics and Privacy in Cyberspace Lesson 20. Privacy and Other Personal Rights Thomas J. Watson, Chairman of the Board for IBM, once stated: Today the.
Law Practice Management Problem Philip Coffaro, Brad Kimber, Christian Pipas.
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
 Data or instructions entered into memory of computer  Input device is any hardware component used to enter data or instructions 2.
PRESENTATION In a modern society there are different types of surveillance systems from cctv cameras to biometric readers. In this power point presentation.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
Free Cookies and Other Security and Privacy Issues.
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
CS 6v Privacy The end of Privacy ?? Dr.Murat Kantarcioglu.
© McGraw-Hill Companies, Inc., McGraw-Hill/Irwin Chapter 9 Emerging Trends and Technologies.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Mohammad Dastbaz, Eddie Halpin, Steve Wright Chapter 10 - Emerging Technologies and the Human Rights Challenge.
BETTER SAFE THAN SORRY Unit 6. Which item do you think is the most/least useful? How often do you/your parents use these items? What other pieces of equipment.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Ethical Questions Issues in IT Ethics. What Do You Think? Spammers are just exercising their free speech rights.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Principles of AAVTC Ethics & Copyright Copyright © Texas Education Agency, All rights reserved. Images and other multimedia content used with permission.
Monitoring By Krystal Thousand. What is Monitoring in the Workplace? record and review their employees' communications and activities on the job, including.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Computer Applications I I dentify alternative input devices and techniques.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
Privacy 2 (draft). Digital Dossier The data shadow The digital dossier Personal accountability.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
McLean HIGHER COMPUTER NETWORKING Lesson 10 Ethical Implications Description of ethical implications of networks: Personal privacy Censorhip.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Enhanced Interlock Technology Christopher Morris, Virginia Dawn Blake, Washington.
Iot in the Retail industry
Ethics & Copyright.
Privacy and Information
A Gift of Fire Third edition Sara Baase
IT and Society Week 2: Privacy.
Presentation transcript:

Privacy 2

Digital Dossier The data shadow The digital dossier Your own diary of recordable events

Persistence of Information Communication modes –Writing –Speech –Electronic forms V-mail IM –Images The presumption of truth

Information Trails The present The future Examples –DEA sweeps –Borked! Pervasive record keeping Data retention

Privacy Legislation The Video Protection Act –Is this a good law? Is it justified? –What caused it to be enacted? Free market and self regulation – Does this work for privacy? Government regulation –Enacting laws does not equal enforcing them

Building a Datasphere 1)Make data collectible 2)Make data machine readable 3)Build a big database

Check Digits VIN check digit kdig.htmlhttp:// kdig.html

RFID Definition – Radio Frequency Identification, the use of radio waves to automatically identify individual items by means of a microchip capable of transmitting identifying information. Applications – product identification in stores, warehouses, medical facilities, warranties, identification of animals, people via implanted chips Privacy issues – tracking individuals through their product purchases and uses, scope creep, location tracking of individuals

One Big Happy Database Thomas Watson’s 1940s estimate on the need for computers joke What’s on the web? Search engines and their ilk Your defense

Data Quality Large databases and data accuracy –Credit Reporting data –NCIC The web

A Personal Question Would you run for public office if you knew that everything you had ever said or done could be held up for public scrutiny? What happens in Vegas stays in Vegas

Satellite Imagery Do satellite images violate privacy? Are they illegal? Resolution Applications –Tax collections –Political claims

Ground Surveillance Surveillance cameras –In malls –ATMs –“The End of Violence” –Traffic violation control

Bayes Theorem and Surveillance Facial identification systems – Tampa Superbowl Fingerprint ID systems mlhttp://members.aol.com/johnp71/bayes.ht ml

Personal Systems Webcam Nanny cam Steve Mann Webcam Nanny cam Steve Mann

Low Cost Personal Devices Tracking devices (location) Keystroke capturers Recording devices Tracking devices (location) Keystroke capturers Recording devices

Employee Monitoring Various means are being employed: e- mail, phone, video, drug testing, psychological profiling Is it legal? Is it ethical? Should Fair Information Practices be applied to employee monitoring?

Surveillance Systems What questions could be asked about them? –Should they be permitted or banned? –Are they effective? –Do they create additional problems? –What restrictions should be placed on their use? –What restrictions should be placed on the data they generate? –Who should watch the watchers?