P RIVACY 1 Dr. Hassan Abdalla College of Computer and Information Sciences King Saud University, Semester 1, 2010/2011.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
MODULE TWO Ethical and Legal Issues. Objectives: Particpants will: Understand privacy, confidentiality and ethics as they relate to being a volunteer.
ICT Ethics 2 ICT 139.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Internet Ethics Presented by: Daniel Wu Kalven Wu.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
3 Ethics and Privacy.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Computer and Ethics. Ethical Problems Proliferation of computers and their networks have created new ethical problems The ACM has issued a Code of Ethics.
Spring 2010 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering Privacy Concerns (Chapters [B]) Spring.
Philosophy A philosophy is a system of beliefs about reality.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
The Philosophy of Exotischism Ignorance Is No Excuse 1 Most of us have heard the old expression "ignorance is no excuse for breaking the law". If courts.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Chapter 10: Authentication Guide to Computer Network Security.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Basic Principles: Ethics and Business
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Anonymity, Security, Privacy and Civil Liberties
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Professional Ethics in Computing Dr. David Sinclair L253
S OFTWARE E NGINEERING C ODE O F E THICS A ND P ROFESSIONAL P RACTICE Software Engineering Ethics and Professional Practices © 1999 by the Institute of.
Protecting Your Private Parts Tracy Ann Kosa. Protecting Your Private Parts TASK Meeting, 27 February 2008 Objectives  Terminology  Privacy & Security.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Ch5 1 ETHC303 Chapter 5- Privacy Instructor: Dr. Hassan Ismail Abdalla Room: E236.
Privacy BBA361 Business Ethics and Corporate Governance Lecture 4 Department of Business Administration Chapter 6, “Ethics and the Conduct of Business”,John.
Philosophy 223 Technology in the Workplace: The Concern for Privacy.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
ETHICS and COMPUTERS An Overview 23/04/2017.
MODULE TWO: Ethical and Legal Issues. Objectives: Students will: Understand privacy, confidentiality and ethics as they relate to being a volunteer. Define.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Mohammad Dastbaz, Eddie Halpin, Steve Wright Chapter 10 - Emerging Technologies and the Human Rights Challenge.
PO :Physical Therapy Administration. Learning Objectives The physical therapy technician will participate as a member of the physical therapy administration.
Information Systems Unit 3.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 11 Democracy and the Internet Privacy.
1 Ethics of Computing MONT 113G, Spring 2012 Session 29 Privacy.
Computer Security By Duncan Hall.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
What’s the Big Deal About Internet Privacy?. Today’s Objective I can explain to Mr. Bates why companies collect information about visitors on their websites.
Basic Principles: Ethics and Business
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Information Security and Privacy in HRIS
Privacy and the Law.
Add video notes to lecture
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Societal Issues in Computing (COMP466)
Privacy Dr. Hassan Abdalla
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Good Spirit School Division
IT and Society Week 2: Privacy.
Presentation transcript:

P RIVACY 1 Dr. Hassan Abdalla College of Computer and Information Sciences King Saud University, Semester 1, 2010/2011

T HE Q UESTIONS What information should one be required to disclose about one's self to others? Under what conditions? What information should one be able to keep strictly to one's self? These are among the questions that a concern for privacy raises today more than ever before. Cautious citizens must be asking these questions. 2

W HAT IS P ERSONAL P RIVACY Privacy is a concept that is neither clearly understood nor easily defined. Sometimes we speak of one’s privacy as something that has been: "lost," "diminished," "intruded upon," "invaded," "violated," "breached," and so forth. 3

T HE RIGHT OF PRIVACY Privacy is human value consisting of four rights: Solitude: the right to be alone without disturbances Anonymity: the right to have no personal identity in public Intimacy: the right to do something privately Reserve: the right to control personal info about oneself The problem of piracy involves the following areas: Territorial Privacy: limiting intrusion into domestic envts Location Privacy: managing geolocation technologies (GPS) Bodily Privacy: respecting the integrity of individual’s body Personal Privacy: protection against undue interferences Communication Privacy: privacy of s, voice telecom Information Privacy: concerned with the collection and compilation of personal info like credit card & medical info 4

T HREE T HEORIES OF P RIVACY Accessibility Privacy Privacy is defined in terms of one's physically "being let alone," or freedom from intrusion into one's physical space. Decisional Privacy Privacy is defined in terms of freedom from interference in one's choices and decisions. Informational Privacy Privacy is defined as control over the flow of one's personal information, including the transfer and exchange of that information.

T WO S CENARIOS Scenario 1: Someone walks into the computer lab and sees you using a computer. Your privacy is lost but not violated. Scenario 2: Someone peeps through the keyhole of your apartment door and sees you using a computer. Your privacy is not only lost but is violated. 6

T WO F ORCES T HREATEN O UR P RIVACY 1. The growth of information technology (IT), with its enhanced capacity for observation, communication, computation, storage, and retrieval. 2. The increased value of information in decision making. Information is increasingly valuable to policy makers; they want it even if acquiring it invades other's privacy. 7

M ETHODS OF PRIVACY VIOLATION Intrusion & misuse of information Wrongful entry or acquiring of other’s info for illegal use & unauthorized purposes - Interception of info - Cookies unauthorized access by a third party to a private communication. Cookies are files that Web sites send to and retrieve from the computer systems of Web users. Data Merging A data-exchanging process in which personal data from two or more sources is combined to create an image of an individual that would not be possible if the pieces of data was scattered. Data Matching A technique in which two or more unrelated pieces of personal information are cross- referenced and compared to generate a match or "hit," that suggests a person's connection with a specific group. Data Mining Compiling of masses of data into one or more databases to extract new information or knowledge that were previously hidden (KDD).

S URVEILLANCE TECHNOLOGIES Database Surveillance: Blacklist databases & data theft Internet Surveillance: Tracking users’ info through cookies Video Surveillance: CCTV cameras to discourage criminals Satellite Surveillance: GPS take images of our personal lives Mobile Surveillance: 3G mobiles with video camera & internet ID Cards Surveillance: ID cards include microchips with personal & biometric info of user’s authentication 9

I NFORMATION G ATHERING Computers make it possible to gather detailed information about individuals to an extent never possible before Government agencies now maintain extensive records of individual behavior When individuals believe they are being watched, they are compelled to behave differently than they might if they weren't being observed. Record-keeping is far from a new phenomenon 10

I NFORMATION G ATHERING – CONT. Computer technology has changed record- keeping activities in a number of undeniable and powerful ways: First, the amount of information gathering has changed. Second, the kind of information that can be gathered has changed. Third, the speed of exchange of information has changed enormously Forth, the duration of time in which the information can be retained 11

I NFORMATION G ATHERING – CONT. Technology no longer limits what can be done Now only time and money and perhaps, human capabilities impose limits on the quantity of information that can be gathered and processed. The kind of information that is now possible to collect and use is also novel to researchers One particularly important new form of information is referred to as transaction generated information (TGI) 12

I NFORMATION G ATHERING – CONT. TGI seems to be fragmented and, therefore, seems not to pose the threat of Big Brother As far as the technology goes, the distribution of information can take place with or without the knowledge of the person whom the information is about It can take place intentionally as well as unintentionally When computers are connected via telecommunications lines, the possibilities of data being tampered with or stolen are increased 13

A CCURACY Misinformation has a way of messing up people's lives, especially when the party with the inaccurate information has an advantage in power and authority. Consider the difficulty of John A. Smith's 14

R ECORD -K EEPING In summary, while record-keeping is, by no means, a new-activity, it appears that computer and information technology has changed record- keeping activities in the following ways: (1) it has made a new scale of info gathering possible (2) it has made new kinds of information possible, especially transaction generated information; (3) it has made a new scale of information distribution and exchange possible (4) the effect of erroneous information can be magnified (5) information about events in one's life may endure much longer than ever before These five changes make the case for the claim that the world we live in is more like a panopticon than ever before. 15

I S IT COMPUTERS PROBLEM ? You may be tempted to say that computers are not really the problem or the cause of the problem. It is individuals and organizations that are creating, gathering, exchanging, and using information. Computers, according to this argument are simply tools. If someone to be blamed, it is the people who use computers, not the computers themselves. 16

THE BALANCING SCALES Personal privacy is generally put on the other side of the balancing scales. The issue is framed so that we have to balance all the good things that are achieved through information gathering and exchange against the desire or need for personal privacy. From a legal and constitutional point of view, we have, at most, a limited and complex right to privacy. 17

P OSSIBLE C OUNTERARGUMENTS The case for privacy seems powerful and suggests that there are serious dangers with the amount and kind of data gathering that now goes on. However, some people may still not be convinced that there is much of a problem based on the following arguments: 1. That the situation is not so bad. Individuals who have done nothing wrong, have nothing to fear. This argument might even go as far to say that privacy only protects people who have something to hide. Unfortunately, this argument does not work because erroneous information can dramatically affect your life (e.g. stolen car case). 18

P OSSIBLE C OUNTERARGUMENTS – CONT. 2. Individuals in our society do have some power to control their relationships with private and public organizations. Many have simply opted to give up their privacy. They could refuse to give out information about themselves. This argument contains a little of truth, but hides a much more complicated situation. Yes, I can choose not to do any thing that might disclose my privacy e.g. not to buy using credit card so that there is no information gathered about my buying activities However, I will have to give up a great deal; I have to pay a high price for my privacy. 19

P OSSIBLE C OUNTERARGUMENTS – CONT. 3. Finally, someone might still insist that we have nothing to worry about because we are protected by a wide array of legislation against abuses of information. Moreover, you could argue that we have voluntarily given up our privacy by supporting legislators who believe we prefer less privacy to better law enforcement and more efficient organizations. This argument raises the question of whether the legislation system we have today is good enough. 20

P ROTECTING PRIVACY With regard to the storage of personal data, individuals should be aware of the following questions: 1. Collection of data: who collects the data and using which methods 2. Integrity of data: is the storage of data accurate and verified? How regularly updated and checked? 3. Access of data: can individuals access, change or correct their personal data? 4. Protection of data: are data secured from unauthorized access and use? And how reliable the security procedures are? 21

R OLE OF C OMPUTER P ROFESSIONALS Computer professionals can play an important role, individually and collectively. First and foremost, individual professionals must not wash their hands off privacy issues. A computer professional can point out privacy matters to clients or employers when building databases containing sensitive information. 22

R OLE OF C OMPUTER P ROFESSIONALS – CONT. The original ACM Code of Professional Conduct (passed by the ACM Council in 1973) specified that: An ACM member, whenever dealing with data concerning individuals shall always consider the principle of the individuals‘ privacy and seek the following: To minimize the data collected. To limit authorized access to the data. To provide proper security for the data. To determine the required retention period of the data. To ensure proper disposal of the data. 23

R OLE OF C OMPUTER P ROFESSIONALS – CONT. The Guidelines ACM Code of Ethics explain that: "It is the responsibility of the professionals to maintain the privacy and integrity of data describing individuals". This includes taking precautions to ensure the accuracy of data, as well as protecting it from unauthorized access or accidental disclosure to inappropriate individuals. 24