CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.

Slides:



Advertisements
Similar presentations
Mobile technologies Bunch of disparate technologies Many cases of successful use in firms (000s) Costly to implement because mostly once off bespoke development.
Advertisements

CHAPTER 4 E-ENVIRONMENT
Ethical Issues concerning Internet Privacy 1.  Personal information on the Internet has become a hot commodity because it can be collected, exchanged,
Unit 7: Store and Retrieve it Database Management Systems (DBMS)
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
1. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 2 Technology in Action Chapter 1 Why Computers Matter to You: Becoming Computer.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Slides prepared by Cyndi Chie and Sarah Frye Modified for Auburn University by Cheryl Seals A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
Privacy & Personal Information -- Why do we care or do we?
CS4020 Privacy L. Grewe What We Will Cover Privacy and Computer Technology “Big Brother is Watching You” Privacy Topics Protecting Privacy Communications.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
IS 490 Notes for Baase Textbook, Chapter 2. Check the Homework Page for the weekly assignment (it's due next Monday). Go to the Angel Page for this course,
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.
Copyright © 2009 Pearson Education, Inc. Slide 6-1 Chapter 6 E-commerce Marketing Concepts.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Employee Guidelines for Acceptable Use of Technology Resources.
Virtual Business CREATING A WEB PRESENCE Copyright © Texas Education Agency, All rights reserved.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
Monitoring Employees on Networks: Unethical or Good Business?
EU Data Protection IT Governance view Ger O’Mahony 12 th October 2011.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
What is Privacy?. 3 Types of Privacy 1.Accessibility Privacy 2.Decisional Privacy 3.Informational Privacy.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
FriendFinder Location-aware social networking on mobile phones.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
FriendFinder Location-aware social networking on mobile phones.
Privacy and Data Mining What Do “They” Know About You?
Anika Massey.  There are three main types of business:  Traditional  Online  Transportation.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Privacy and the Law.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Societal Issues in Computing (COMP466)
Privacy and Information
A Gift of Fire Third edition Sara Baase
Other Sources of Information
A Gift of Fire Third edition Sara Baase
Privacy and Data Mining
Privacy and Data Mining
IT and Society Week 2: Privacy.
Presentation transcript:

CSE/ISE 312 Privacy (Part 2)

The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten

Marketing and Personalization One of the biggest uses of personal info. by org., political parties, and businesses Marketing: To find new customers/members/voters, and to retain the old ones; advertise products, services, causes, determine prices, discounts, when and to whom Data mining Targeted ads based on purchase histories and online activities – Gmail claims it displays no untargeted banner ads

Informed Consent Targeted, personalized marketing is not unethical Concern is how marketers get the data – Collecting using consumer data without consent was widespread until late 1990s – Now sites, businesses, orgs publish their policies – Still, data firms build and sell large consumer profiles, making consent unclear Proposals – “Do not track” button in browsers proposed – Inform and remind users of unobvious data collection

Paying for Consumer Info Fill out entry form to a contest Store cards: discounts for tracking purchases Free products and services for permission to send ads and collect data – Gmail, social networking, free video sites – Free computer, iPod, software, Britannica Do people understand the potential consequences?

Our Social and Personal Activity Social networks – Our responsibility: what we share may risk our and our friends’ privacy: opinions, gossip, pics – The company’s responsibility: new features with unexpected privacy settings. E.g., news feeds Personal information in blogs and online profiles – Pictures of ourselves and our families File sharing and storage, cloud computing – Convenience, ease from own backups, but also risks

Location Based Services Services after identifying the location of a mobile device (since 2001) Use signal time delay to mobile stations or to satellites Performance is improved with Assisted GPS in which calculations are done by a network server Economics encourage advertising Identification is important to advertising

Example Applications  Providing information about nearby commercial establishments  Locating a stolen vehicle  Alerting user if friends are nearby  Location identification with a 911 call  Locating people in rubble  Tracking children on a field trip

RFID RFID tags are small devices that contain a computer chip and an antenna – The chip stores ID data and does processing – It communicates to a RFID reader Many usages – Supply chain management – Electronic toll collection, public transit card, parking – Tracking patients, kids, farm animals Allow constant surveillance; Security risk, misuse

Children and Tools for Parents Children are not able to make decisions on when to provide information. Vulnerable to online predators Parental monitoring uses software to monitor web usage Web cams to monitor children while parents are at work GPS tracking via cell phones or RFID Pros and cons?

A Right to Be Forgotten The right to have material removed US and EU are promoting such a legal right Many practical, ethical, social, legal questions arise negative right (a liberty) positive right (a claim right) Possible conflict with free speech, free flow of information, and contractual agreements

Government Systems Federal and local government agencies maintain thousands of databases containing personal information Opportunity for misuse of information

Privacy Act of 1974 “No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains... except” For statistical purposes by the Census For routine uses within a U.S. government agency For archival and law enforcement purposes For congressional investigations and other admin purposes

Government Databases Government Accountability Office (GAO) Congress’ agency to monitor government's privacy policies, and enforces the Act Has noted numerous variations from the law; they do not adequately protect our data Rules for government use of commercial databases, or commercial search engine results are vague or missing Case studies: College student database, data mining and computer matching to fight terrorism

Public Record Data Public Records - records available to general public (bankruptcy, property, arrest records, salaries of government employees, etc.) Governed by the Freedom of Information Act (FOIA): rules on access to records held by government bodies – Basic principle – burden of proof falls on the body asked for information (not requester) – Act applies to federal agencies, but states have similar laws – Includes electronic access (1996) Electronic access creates new privacy issues Examples

National ID System Social Security Numbers – Increasingly used as a national ID from s – Easy to falsify/inadvertently disclose, fraud/id theft A new national ID system - Pros – would require the card – have to carry only one card – Reduce fraud, illegal workers, terrorists A new national ID system - Cons – Threat to freedom and privacy – Large amount data on it increase potential for abuse