COMM 226 Information Privacy: A personal and societal perspective Chitu Okoli Associate Professor in Business Technology Management John Molson School.

Slides:



Advertisements
Similar presentations
Criticisms of US “Democracy”
Advertisements

Electronic Privacy Does it exist?. Issue: Privacy concerns with library and bookseller records continue due to the reauthorization of Section 215. The.
… and why you should care. Sarah Harvey {CrySP, Information Retrieval} group University of Waterloo
COMM 226 Database and content management Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University,
COMM 226 Procurement BPMN exercise
COMM 226 Software Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1.
COMM 226 ERD case: School of Business
COMM 226 Assignment 1 Part B: Clarifications and tips
National Disaster Recovery Framework Overview Presented By: Ken Rathje Federal Disaster Recovery Coordinator FEMA Region III.
USA Patriot Act FBI Public FISA Foreign policy ExecutiveCongressSupreme Court Government agencies International surveillance.
COMM 226 Networks and collaboration Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University,
COMM 226 IS project cases Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal.
Forensic Surveillance techniques Profiling techniques
COMM 226 E-Commerce, Social Networking and Web 2.0 Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
BTM 382 Database Management Chapter 14: XML and cloud databases Chapter 9: Database design Chapter 15: Database administration Chitu Okoli Associate Professor.
The Declining Half Life of Secrets & the Future of Signals Intelligence Peter Swire Huang Professor of Law and Ethics Security & Human Behavior Conference.
Elements of an Argument. What exactly is an argument? An argument involves the process of establishing a claim and then proving it with the use of logical.
COMM 226 Productivity Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal.
I am Very Most Definitely Blacklisted Due to this Project Anyway......
LATIN AMERICAN CHILDREN´S VOICES Reccomendations for States, Schools, Families and Commitments as Digital Citizens.
Steve Wicker Cornell University 1 TRUST Autumn 2011 Conference.
NSA, exactly what was wrong? : Learning from Korea Case K.S. Park Professor, Korea University Law School Litigation Director, Open Net August 5, 2014,
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
INTELLIGENCE SERVICES. The Stratfor Advantage As the world’s leading private intelligence company, Stratfor is able to analyze and deliver timely, accurate.
Social Care Theory for Practice Values. A Definition of Values Values are part of our personality and direct how we behave, think and therefore how we.
COMM 226 Structure, Governance and Ethics Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University,
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
Social Networking Year 7. Starter List as many social networking sites you can think of or that you use or have used. GO!
BELL RINGER Week 9. 3/10/14  In the study of history, what are some examples of primary sources? Why are primary sources, like the photos from the Crimean.
Our Acceptable Use Policy An Overview What is an Acceptable Use Policy (AUP)?
BTM 382 Database Management Chapter 7 Introduction to Structured Query Language (SQL) Chitu Okoli Associate Professor in Business Technology Management.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Planning citizen participation Procida workshop 2007 Ida-Elisabeth Andersen Gy Larsen The Danish Board of Technology.
COMM 226 Using information systems to improve business processes Chitu Okoli Associate Professor in Business Technology Management John Molson School of.
BTM 382 Database Management Chapter Writing optimized SQL queries Chitu Okoli Associate Professor in Business Technology Management John Molson.
Ethical quandaries For the enterprising journalist.
Computer Networking - Ethical aspects of the Internet Dr Sandra I. Woolley.
Internet Safety Presentation by Diahn Hess. Overview Internet Safety Private and personal information Meeting people online Safe interactions Cyberbullying.
Internet crime By: Brandon Murphy & Cameron Martin.
Digital Footprint By: Ken Gabales. 1. Don’t post any personal information online like your address, address or mobile number. 2. Think carefully.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
COMM 226 Innovation and Strategy
Writing 1 and Writing 2—January 13, 2016 Journal #7: What do you think about ghosts or aliens or other supernatural occurrences? Do you believe in them?
Rachael Vanneste Marina Okray.  The right to not belief in all topics stated on the internet.
ERD case: School of Business Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal.
June 2010Stuxnet May 2011Implementing “Cookies” notification under the Privacy Directive Jan 2013ECC3 Feb 2013ISC Report on Access to.
E-Safety. When using computers, we need to keep our data safe. We also need to keep ourselves safe online. Data security is about making sure that data.
NSA Data Collection BY KEVIN WATSON. NSA Data Collection  Most of the concern involves the data collection program PRISM  Started in 2007  Is the.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Edward Snowden An Introduction.
IT’S RELEVANCE TODAY BILL OF RIGHTS (AND CONSTITUTION)
Ideal in addition to fast VPN Service Provider using Secure VPN Access.
National Security Agency (NSA) Surveillance Christopher Boyd.
EDWARD SNOWDEN IS HE A WORTHLESS HUMAN BEING OR AMERICAS HERO?
User Attitudes Toward the Inspection of Encrypted Traffic Scott Ruoti, Mark O’Neill, Daniel Zappala, Kent Seamons Brigham Young University.
LISTENING IN… Debating the Legitimacy of Eavesdropping on American Citizens With or Without Just Cause.
Information Protection & Cyber Security
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Verizon Support Number Any issue call Verizon Support Number for the best help and support. The care team have the best executives who are able to solve.
By: Conor Doherty and Kenneth Cabrera
The Societal Impact of Tor and Other Anonymizers
Brendan Foody, Sharon O’Malley, Ryan McGrane
The Bill of Rights: the iv amendment
Define the Problem Constant surveillance of citizens in our country
(Information) Privacy
The Rapid Loss of Privacy in the Era of the Internet
! Information you didn’t know
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
Presentation transcript:

COMM 226 Information Privacy: A personal and societal perspective Chitu Okoli Associate Professor in Business Technology Management John Molson School of Business, Concordia University, Montréal 1

About Edward Snowden and the United States National Security Agency (NSA) Edward SnowdenNational Security AgencyEdward SnowdenNational Security Agency Comprehensive overview of what it’s all about: –Everything you need to know about PRISM: All the leaked documents: –Snowden Archive:

How does the surveillance actually work?

Canada’s “NSA”: Communication Security Establishment Communication Security Establishment Communication Security Establishment

What do the implicated governments say? Intelligence expert: “NSA leak puts U.S. at risk” UK’s GCHQ explains what they do with this kind of information:GCHQ

In support of government surveillance: “We need protection from terrorists!” We Need an Invasive NSA – protect-us-cyber-attackshttp:// protect-us-cyber-attacks We Need NSA Surveillance – surveillance-gerald-walpinhttp:// surveillance-gerald-walpin Why we need government surveillance – snowden/ snowden/ NSA intelligence-gathering programs keep us safe – gathering-programs-keep-us-safe/2014/01/02/0fd51b e3-8b3f-b ca3b_story.htmlhttp:// gathering-programs-keep-us-safe/2014/01/02/0fd51b e3-8b3f-b ca3b_story.html

Which is more important? Source:

Why we should care about our government spying on us CRITICAL THINKING ALERT: Unabashedly one-sided opinion

What can you do about it? Stay informed and make your voice heard –OpenMedia is the leading Canadian non-profit organization that campaigns for citizen’s Internet privacy: OpenMedia International: How to use the Internet privately –Use https (secure versions of websites) when possiblewhen possible –Use VPN (virtual private networks)VPN –Use the Tor browser for almost complete anonymityTor browser