The Primacy of Privacy: A survey of knowledge and opinions Prof. Masooda Bashir Kevin Hoff Gahyun Jeon.

Slides:



Advertisements
Similar presentations
Agrobiodiversity and Intellectual Property Rights: Selected Issues under the FAO International Treaty on Plant Genetic Resources for Food and Agriculture.
Advertisements

The Law of Privacy Prof. Michael Madison – University of Pittsburgh School of Law – January 22, 2004 [1] What is privacy? [2] What law regulates privacy?
BUSINESS B2 Ethics.
Human rights exploration
I consent: search, privacy, behavioural advertising and the Cookie Directive Andrew McStay School of Creative and Media Studies, Bangor University, UK.
© 2006 The McGraw-Hill Companies, Inc., All Rights Reserved.McGraw-Hill/Irwin 5-1 Chapter 5 Ethics in Business Research.
© 2012 Lathrop & Gage LLP Presented by: Lincoln D. Bandlow, Esq. Lathrop & Gage LLP 1888 Century Park East, Suite 1000 Los Angeles, CA
Measuring Ethno-Cultural Characteristics in Population Censuses United Nations Economic Commission for Europe Statistical Division Regional Training Workshop.
Ethical and Legal Implications of Practice Chapter 5.
Privacy Rights Under Pressure  Innovations in technology: photography, audio recording, motion pictures, computers, telecommunications, digital data,
הרשות למשפט, טכנולוגיה ומידע Israeli Law Information and Technology Authority Protecting Traditional Knowledge through IP – observations from data protection.
Privacy By Russell Andrews, Emily Gavin, Stephanie Engel, Su Kyung Jeon, and Sugene Park.
CS294-1 Deeply Embedded Networks Privacy Discussion 11/25/03 David Culler University of California, Berkeley.
C MU U sable P rivacy and S ecurity Laboratory Philosophical definitions of privacy Lorrie Faith Cranor October 19, 2007.
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 16 and 17: March 27 and 29, 2007 Solove’s taxonomy of privacy.
Ethics in Business Research
Ghina Anwar 1648 Mahak Tahir 1644 Fatima Asif 1643 Sana Hakeem 1641.
Class 13 Internet Privacy Law European Privacy.
CLU3M- Introduction Unit 1.
Basic Principles: Ethics and Business
C4- Social, Legal, and Ethical Issues in the Digital Firm
Oviedo Convention and Its Protocols – Impact on Polish Law International Bioethics Conference Oviedo Convention in Central and Eastern European Countries.
Arnold Bregt SDI as an organisational infrastructure: Policy & Legal issues 0.
The Bill of Rights.
E-COMMERCE AND PRIVACY LAWS IN THE UAE Rindala Beydoun Senior Legal Counsel Al Tamimi & Company.
Case Study: Pharmaceuticals Patrick F. Sullivan, Ph.D. 939 North Graham Avenue, Indianapolis, IN
Notice and Choice and Its Problems Robert Sloan Richard Warner.
Informed Consent to Address Trust, Control, and Privacy Concerns in User Profiling Thea van der Geest, Willem Pieterson, Peter de Vries.
GPDD/HI training Mozambique –February 22, 2010 Charlotte McClain-Nhlapo- Senior operations officer.
New Global Media and the Role of the State Book review of “ The handbook of new media” Qiong Tang Course: Internet and New Media.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
The Right to Privacy Jody Blanke, Professor Computer Information Systems and Law.
Norton UniversityBusiness Concepts and Social Issues 1 PART TWO Business Concepts and Social Issues.
Lesson Title: Privacy Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
D1 - 25/10/2015 The present document contains information that remains the property of France Telecom. The recipient’s acceptance of this document implies.
The Framework for Privacy Policies in the UK: Is telling people what information is gathered about them part of the framework? Does it need to be? Emma.
Types of privacy (Solove, Understanding Privacy)
SDI-policy and law By Jaap Zevenbergen and adapted by Arnold Bregt.
Methodological questions of migration and ethnocultural diversity in Population Censuses StatCapCA Training Workshop No 3 Dushanbe, March 2007 Werner Haug.
Confidentiality Toby L. Schonfeld, Ph.D. Department of Preventive and Societal Medicine
REPORT OF THE BJS/SEARCH NATIONAL TASK FORCE ON PRIVACY, TECHNOLOGY AND CRIMINAL JUSTICE INFORMATION May 31, 2000 Washington, DC Presented by Robert R.
McGraw-Hill/Irwin Business Research Methods, 10eCopyright © 2008 by The McGraw-Hill Companies, Inc. All Rights Reserved. Chapter 2 Ethics in Business Research.
. 5-1 Chapter 5 Ethics in Business Research. 5-2 Learning Objectives What issues are covered in research ethics The goal of “no harm” for all research.
LEARNING OBJECTIVES TO UNDERSTAND THE RELATIONSHIP OF ETHICS TO MANAGEMENT IN THE INFORMATION SOCIETY TO APPRECIATE THE MORAL DIMENSIONS INVOVED & THE.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Android Permissions Remystified: A Field Study on Contextual Integrity Presenter: Hongyang Zhao Primal Wijesekera (UBC) Arjun Baokar (UC Berkeley) Ashkan.
Genres and Generations of Internet Research Ethics Maria Bakardjieva University of Calgary.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Collective Information Practice: Exploring Privacy and Security as Social and Cultural.
Ethical Guidelines in Research Ethics refers to doing what is morally and legally right in conducting research. Research ethics deals primarily with the.
Ethics in Business Research
Jody Blanke, Professor Computer Information Systems and Law 1.
Defining the Research Ethics Research ethics involves the application of fundamental ethical principles to a variety of topics involving research, including.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
Library Patron Privacy in Jeopardy An analysis of the privacy policies of digital content vendors ASIS&T General Meeting 2015 April Lambert, Michelle Parker.
1 Purposes and Origins of Government What is the purpose of government? What is the purpose of government? How is government defined? How is government.
Privacy. Some Web Science Issues Kieron O’Hara 29 November 2011.
Consumer Information Federal Trade Commission Act grants Federal Trade Commission (FTC) responsibility regarding unfair methods of competition and unfair.
Definition Policy – a course of action that has been officially agreed and chosen by a political party, business or other organization (Longman Dictionary)
Consumer Health Informatics
Service Organization Control (SOC)
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Chapter 1: People and Government
The U.S. Economic System.
Professor at Kyung Hee Univ.
What is Research ?.
IT and Society Week 2: Privacy.
Ethics and Politics of Computational Social Science
Presentation transcript:

The Primacy of Privacy: A survey of knowledge and opinions Prof. Masooda Bashir Kevin Hoff Gahyun Jeon

Research Interests Humans and Society

What is “Cloud Computing?” Background  Privacy is a complex, multifaceted concept  Although privacy been an important topic throughout history, recent advances in information technology have raised levels of concern to an all-time high  Scholars have conceptualized “privacy” in many different ways:  “The right to be left alone” (Warren and Brandeis, 1890)  “A self-serving economic good” (Richard Posner, 1978)  “Contextual integrity” (Helen Nissenbaum, 2003)  A taxonomy of different, yet related problems (Solove, 2009)  Different conceptions of privacy  Privacy as a negative freedom – freedom from something, rather than a right to something else  Secrecy paradigm – privacy applies to things that are secret  Invasion paradigm – privacy violation is an invasion of a specific interest  Inaccessibility – privacy is where the subject is inaccessible to others  Privacy viewed as constitutional and human right  Decisional privacy, physical privacy, proprietary privacy, informational privacy

What is “Cloud Computing?” Research Background  In the U.S., the legal system surrounding information privacy is based on fair information practices (FIPs)  FIPs are an internationally recognized set of policies for collecting, managing, and distributing personal information  There are five main principles used in the U.S.: 1.Notice 2.Choice/Consent 3.Access to data/participation 4.Data Integrity/Security 5.Enforcement (i.e. self, third-party, or government regulation)  Today, cloud service providers claim that their customers are providing informed consent by accepting privacy policies and terms of service agreements  By clicking “accept”, consumers are providing cloud service providers with legal rights to use their information for a variety of purposes  Informed Consent- “the process by which a fully informed user participates in decisions about his or her personal data” (van der Geest et al., 2005, p. 7)  Five principles of informed consent: 1. Disclosure, Comprehension, Voluntariness, Competence, Agreement

What is “Cloud Computing?” Survey of Knowledge

What is “Cloud Computing?” Survey of Opinions