…refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected and stored.

Slides:



Advertisements
Similar presentations
The right to privacy: should people have complete privacy, or should the state be able to investigate their private communication, or their employers?
Advertisements

Our Digital World Second Edition
Chapter 21 Copyright ©2012 by Cengage Learning Inc. All rights reserved 1 21 Customer Relationship Management (CRM) Professor Close.
4-1. Business in a Changing World McGraw-Hill/Irwin Copyright © 2009 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 4 Managing Information.
 In some countries, not-for-profit organizations are permitted to run advertisements through certain media outlets free-of-charge if the message contained.
Basics of Privacy TC 310 June 16, Protections of Privacy Not explicitly protected (by Right)‏  Fourth Amendment is closest Penumbra Protection.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Review 23 April. Group exercise  What lessons have you learned?  Write full sentences until I tell you to stop.  Examples: Code can affect behavior.
Hidden Apps Carrier IQ and Privacy in Mobile Devices.
3 Ethics and Privacy.
Direct and Online Marketing: The New Marketing Model
1- Introduction 2- The Purpose Of The Project 3- Information Society 4-The Framework Of Information Society 5- The Basic Electronic indicators.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Ethics …is a branch of philosophy that deals with issues of morality—consideration of which human actions and reactions are morally right and wrong. In.
Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
Should they be used?. The facts  What: Scientists and engineers have recently developed a new type of unmanned aircraft: Drones. Drones can be used in.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
CHAPTER 4 Marketing Information and Research: Analyzing the Business Environment Off-line and Online M A R K E T I N G.
Computer Legislation The need for computer laws Go to Contents.
Chapter 12 Copyright ©2012 by Cengage Learning Inc. All rights reserved 1 Lamb, Hair, McDaniel CHAPTER 21 Customer Relationship Management (CRM)
Dangers of Social Media
Mass Surveillance and the Private Sector Understanding Corporate Responses to Government Surveillance Regimes Professor Kirstie Ball.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Indecent Exposure – Are Your Private Parts Truly Private? (Privacy and Technology) Barbara Buckett Barbara Buckett & Associates 27 August 2008.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Steve Wicker Cornell University 1 TRUST Autumn 2011 Conference.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
CS2190 Discussion Topic: Governments, Companies, and User Privacy.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
Monica Sowell EDCI Jul 14. Content Vocabulary History Current Legislation USA PATRIOT Act Resources.
6 Ethics and Privacy.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Mohammad Dastbaz, Eddie Halpin, Steve Wright Chapter 10 - Emerging Technologies and the Human Rights Challenge.
RFID and Public Policy Elliot Maxwell Fellow, Communications Program, Johns Hopkins University and Distinguished Research Fellow, Pennsylvania State University.
Digital citizenship is appropiate behavior in internet. Its responsible for the technology use. Have its own limitations to safety of internet.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Privacy and Data Mining What Do “They” Know About You?
1 Ethics of Computing MONT 113G, Spring 2012 Session 29 Privacy.
28/01/20161 The Future of Online Privacy: Online advertising and behavioral targeting Kristina Irion Third Internet Governance Forum Thursday, 5/12/2008.
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Privacy Lost: How Technology is Endangering Your Privacy CS Final Paper Presentation By: Christina Sulfaro.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
Deep Packet Inspection. Definition Uses Privacy Concerns Neutrality Concerns.
E-GOVERNMENT INITIATIVES IN ROMANIA AND BUCHAREST Mirela MINCA Head of International Programs and Cooperation BUCHAREST.
Creating a Culture of Privacy Michael Kaiser Executive Director National Cyber Security
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
DRONES IN AERIAL SURVEILLANCE WHAT IS A DRONE ?  A drone, in a technological context, is an unmanned aircraft.  Drones are formally known as unmanned.
National Security Agency (NSA) Surveillance Christopher Boyd.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
Dangers of Social Media
Social Media as Instruments of Control and Consensus Making
E-Commerce: Regulatory, Ethical, and Social Environments
Privacy …refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
Privacy given away We accept lost of privacy in exchange for efficiency, convenience and small price discounts. No breakthrough, only a steady advance.
Chapter 10: Privacy, Security, and Ethics
Privacy Issues part 4 Information/data privacy
A Gift of Fire Third edition Sara Baase
Privacy and Data Mining
IT and Society Week 2: Privacy.
It matters By: Nina Fehrenbach
Presentation transcript:

…refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected and stored about yourself. In this section: U.S. Privacy-Protective LawsBehavioral Targeting U.S. Privacy-Invasive LawsTraffic Shaping SurveillanceTransparency Issues > Privacy Privacy

U.S. privacy-protective laws refer to legislation designed to protect the private information of U.S. citizens. U.S. Privacy-Protective Laws The right to privacy has been a hotly debated topic in countries around the world for generations. Many recent privacy laws focus on digital technology issues. Issues > Privacy > U.S. Privacy-Protective Laws Links: Video: Domestic Drones to Patrol Streets of Seattle

U.S. privacy-invasive laws refer to legislation that is invasive to individual privacy for a perceived greater good of the country. U.S. Privacy-Invasive Laws Links: Video: Patriot Act Presentation Issues > Privacy > U.S. Privacy-Invasive Laws

Surveillance is the close monitoring of behavior through electronic technologies such as wiretapping, data mining, remote video and audio monitoring, GPS, and RFID. Surveillance Links: Video: The Surveillance Society Video: The Surveillance Hummingbird Who is monitoring those individuals doing the monitoring? Will the information gathered in electronic surveillance be used to invade our privacy? Issues > Privacy > Surveillance

Behavioral targeting uses information about a person’s behavior to inform businesses and marketers so that they can offer products that are likely to be of interest to that person. Behavioral Targeting Links: Video: Ads That Track Your Web Activity Video: Ordering Pizza in the Future Much of the information gathered about individuals is collected without their knowledge. Issues > Privacy > Behavioral Targeting

Traffic shaping refers to controlling the flow of network traffic in order to optimize performance by delaying some data packets in favor of others. Traffic Shaping The practice of traffic shaping impacts users in different ways. All users should be concerned about how traffic shaping is implemented and if any private information is being gathered in the process. Links: Video: Internet Traffic Shaping Issues > Privacy > Traffic Shaping

Transparency is when a person, business, organization, or government keeps little or nothing secret from the world – an approach that is supported by technologies such as lifestreaming, geo-location, and microblogging. Transparency So what is the danger in having other people know about your life, the intricacies of your day-to-day dealings, and your secret thoughts? If you aren’t doing anything illegal, why should you care what other people know about you? Some individuals subscribe to this philosophy, have abandoned concerns over privacy, and are leading a transparent lifestyle. Links: Video: The narcissism is eating my soul Issues > Privacy > Transparency

Terms Privacy U.S. Privacy-Protective Laws U.S. Privacy-Invasive Laws Surveillance Wiretapping Data mining Video and audio surveillance GPS and RFID surveillance Behavioral Targeting Onsite behavioral targeting Network behavioral targeting Traffic shaping Transparency Lifestream Issues > Privacy > See your eBook for more information about these terms Privacy