BA 572 - J. Galván1 PRIVACY and Other Social Issues.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Breaking Trust On The Internet
Ethical Issues concerning Internet Privacy 1.  Personal information on the Internet has become a hot commodity because it can be collected, exchanged,
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Chapter 10 Privacy and Other Social Issues. Copyright © 2003, Addison-Wesley What Is Privacy? Freedom from observation, intrusion, or attention of others.
Chapter 10 Privacy and Other Social Issues. Old Florida saying Only two things in the water after dark. Gators and gator food.
Chapter 17 Legal, Ethical, and Social Impacts of EC.
Copyright © 2004 Pearson Education, Inc. Slide 7-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
August 15 click! 1 Basics Kitsap Regional Library.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property,
Chapter 11 Security and Privacy: Computers and the Internet.
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
Cyber Crimes.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
C4- Social, Legal, and Ethical Issues in the Digital Firm
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Ethical and Legal Issues in Educational Technology Professional Educator Diploma Graduate School of Education – American University in Cairo (AUC) Spring.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Security Privacy Relationship Which FIPs may be relevant to security breaches of customer privacy information? –Must be accountable for all PII in its.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Any criminal action perpetrated primarily through the use of a computer.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Privacy and Other Social Issues
Network and Internet Security and Privacy
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
Chapter 10 Cyberlaw, Social Media, and Privacy
Legal and Ethical Issues in E-Commerce
CHAPTER 33 Cyberlaw.
Societal Issues in Computing (COMP466)
Network and Internet Security and Privacy
Chapter 10: Privacy, Security, and Ethics
Computer Programming I
Protecting Yourself from Fraud including Identity Theft
A Gift of Fire Third edition Sara Baase
Presentation transcript:

BA J. Galván1 PRIVACY and Other Social Issues

BA J. Galván2 WHAT IS PRIVACY? Freedom from observation, intrusion, or attention of others Society’s needs sometimes trump individual privacy Privacy rights are not absolute Balance needed  Individual rights  Society’s need Privacy and “due process”

BA J. Galván3 PRIVACY AND THE LAW No constitutional right to privacy  The word “privacy” is not in the Constitution  Congress has passed numerous laws Not particularly effective Issue is pace of change Privacy is a function of culture Privacy means different things in different countries and regions  Serious problem on global Internet

BA J. Galván4 SOME U.S. PRIVACY LAWS. Year Title Intent 1970Fair Credit Reporting Act Limits the distribution of credit reports to those who need to know. 1974Privacy ActEstablishes the right to be informed about personal information on government databases. 1978Right to Financial Privacy Act Prohibits the federal government from examining personal financial accounts without due cause. 1986Electronic Communications Privacy Act Prohibits the federal government from monitoring personal without a subpoena. 1988Video Privacy Protection Act Prohibits disclosing video rental records without customer consent or a court order. 2001Patriot ActStreamlines federal surveillance guidelines to simplify tracking possible terrorists.

BA J. Galván5 Collecting Personal Information (e.g., your address => spam) Notice/awareness  You must be told when and why Choice/consent  Opt-in or opt-out Access/participation  You can access and suggest corrections Integrity/security  Collecting party is responsible Enforcement/redress  You can seek legal remedies

BA J. Galván6 AMAZON.COM’S PRIVACY POLICY.

BA J. Galván7 DELL DISPLAYS THE BBB SEAL. Seal of approval  BBB  TRUSTe  WebTrust Enhances Web site ’ s credibility

BA J. Galván8 COLLECTING PERSONAL INFORMATION Often voluntary  Filling out a form  Registering for a prize  Supermarket “Rewards” cards Legal, involuntary sources  Demographics  Change of address  Various directories  Government records

BA J. Galván9 ONLINE PERSONAL INFORMATION.

BA J. Galván10 COMPLETING THE PICTURE Aggregation  Combining data from multiple sources  Complete dossier  Demographics Finding missing pieces  Browser supplied data – TCP/IP  Public forums – monitoring  Samurai

BA J. Galván11 CAPTURING CLICKSTREAM DATA Record of individual’s Internet activity  Web sites and newsgroups visited  Incoming and outgoing addresses Tracking  Secretly collecting clickstream data  ISP in perfect position to track you All transactions go through ISP  Using cookies  Using Web bugs

BA J. Galván12 TRACKING WITH COOKIES. 1.Client requests Acme page 2.Acme returns page 3.Client requests embedded banner from Gotcha 4.Gotcha returns banner and cookie

BA J. Galván13 TRACKING WITH WEB “PIXEL SPYWARE” Web pixel spyware – single-pixel clear GIF  Image reference buried in HTML  Browser requests image  Server returns bug plus cookie  Request provides clickstream data  Difficult to spot a Web pixel spyware Web pixel spyware in HTML formatted  Secret return receipt

BA J. Galván14 A DEMONSTRATION WEB SPYWARE. This Web bug is designed to be seen

BA J. Galván15 A WEB PIXEL SPYWARE BURIED IN AN MESSAGE. Again, this one is designed to be seen

BA J. Galván16 SURVEILLANCE AND MONITORING Surveillance  Continual observation  Tampa – facial scanning at Super Bowl  Packet sniffing Monitoring  The act of watching someone or something  Web bugs  Workplace monitoring is legal

BA J. Galván17 SURVEILLANCE AND MONITORING TOOLS Spyware  Sends collected data over back channel Snoopware  Records target’s online activities  Retrieved later Screen shots, logs, keystrokes Other surveillance/monitoring sources  OnStar and GPS tracking  E-ZPass systems (road toll system in USA)  Phone calls and credit card purchases

BA J. Galván18 SPAM Electronic junk mail Spammers use anonymous r ers Mailing list sources  Online personal information services  Dictionary attack software Do not respond in any way!

BA J. Galván19 ANONYMOUS R ERS Some good FAQs  An example  What they know about you Not an endorsement

BA J. Galván20 THIS BANNER AD MIMICS A DIALOG BOX. DO NOT CLICK “OK”. Fake banner ads like this one are very annoying Spawner – spawns its own pop-up ads Mouse-trapper  Turns off browser ’ s Back button  Disable pop-ups ad ’ s close button  No way to close ad – must reboot Spam is a source of spawners and mouse-trappers

BA J. Galván21 FRAUD The crime of obtaining money or some other benefit by deliberate deception. Most common forms of IT fraud  Identity theft  Credit card fraud  Scammers and con artists  Financial swindles

BA J. Galván22 PROTECTING YOUR ONLINE PRIVACY Implement appropriate security measures Get a copy of your credit report Use:  Junk account  Anonymous r er  Stealth surfing service  Common sense Deal with recognized, trusted e-retailers Keep important numbers and passwords secret Use good passwords If your computer acts strangely, find out why

BA J. Galván23 How to build a parking ticket