PRIVACY AND RELATED ISSUES IN IT. Main points  What is privacy?  Privacy harms and benefits  Privacy right  Protecting privacy: Technology, markets,

Slides:



Advertisements
Similar presentations
Part I: Making Good Online Choices
Advertisements

Gallup Q12 Definitions Notes to Managers
Back to Table of Contents
Ethical Issues concerning Internet Privacy 1.  Personal information on the Internet has become a hot commodity because it can be collected, exchanged,
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
A Gift of Fire, 2edChapter 10: Professional Ethics and Responsibilities1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues.
Professional Ethics and Responsibilities
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 9: Professional Ethics and Responsibilities.
A Gift of Fire Third edition Sara Baase
3 Ethics and Privacy.
Ethics in Information Technology, Second Edition 1 Chapter 1 An Overview of Ethics.
Chapter 5: Information Privacy
Professional Codes of Ethics Professionalism and Codes of Ethics.
Employee Engagement Survey
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
CISB 412 Social and Professional Issues Understanding Privacy.
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
Basic Principles: Ethics and Business
C4- Social, Legal, and Ethical Issues in the Digital Firm
Anonymity, Security, Privacy and Civil Liberties
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Technology in Focus: Information Technology Ethics
Purchasing Ethics and Vendor Relations
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
CHAPTER 1 Managing Human Resources
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Unit 2- Ethical Theories and Obligations
Business Ethics Lecture Rights and Duties 1.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Business Management.
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
ETHICS and COMPUTERS An Overview 23/04/2017.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Legal and Ethical Issues Counseling Children. Child and Adolescent Clients Counselors who work with children and adolescents under the age of 18 may experience.
CSE/ISE 312 Ethics Do the Right Thing
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
CISB 412 Social and Professional Issues Understanding Privacy.
 the study of the rightness or wrongness of human conduct.  In any situation involving two or more individuals, values may come into conflict and ethical.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 9: Professional Ethics and Responsibilities.
Social Media And Ethics It is a choice of Professionalism.
After today’s lesson I will be able to: Explain Kant’s theory on moral ethics Explain the term ‘categorical imperative’ Understand the phrase 'Duty and.
My Digital Footprint By Alanya Davignon.
Impacts of I.T. Ethical, Social, legal and economic impacts on I.T.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
Professional Ethics and Responsibilities
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Mrs. Ransey Business Essentials
Basic Principles: Ethics and Business
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
Digital Footprints By: Devon Nicholson. What is a digital footprint? A digital footprint is an online footprint in which people can look at what you have.
Lecture4 Information Privacy 1-1. Overview Introduction Perspectives on privacy Information disclosures Data mining 1-2.
ETHICS Internet And Online Community Week 10.
PowerPoint® Slides to Accompany
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Internet And Online Community Week 10
A Gift of Fire Third edition Sara Baase
Digital Citizenship and Social Media
Common Ethical Considerations in Pharmaceutical Care Practice
A Gift of Fire Third edition Sara Baase
Communication Technology in a Changing World
INFS 452 – Computer Ethics & Society
IT and Society Week 2: Privacy.
Presentation transcript:

PRIVACY AND RELATED ISSUES IN IT

Main points  What is privacy?  Privacy harms and benefits  Privacy right  Protecting privacy: Technology, markets, Rights, And Laws  Perspectives on Privacy  Information disclosures  Data mining

Why discussing Privacy?  Use of digital technology has made new threats possible and old threats more potent.  Computer technologies—databases,digital cameras, the Web, smartphones, and global positioning system (GPS) devices, among others—have profoundly changed what people can know about us and how they can use that information. Understanding the risks and problems is a first step toward protecting privacy. For computer professionals, understanding the risks and problems is a step toward designing systems with built-in privacy protections and less risk.

The too much information Age (Quinn, C5) ACCESS...either physical proximity to a person or knowledge about person You have privacy to the extent that you can cntrol who is allowed into yr zone of inaccessibility “ Privacy is social arrangement that allows people to have some level of control over who is able to access their physical selves and personal info” “zone of inaccessibility” that surround a person From the point of view of an individual want to restrict access, privacy is :

Do have any privacy in this information age????????  Do you want to know  where i live/phone/personal life ? Whitepages.com Zillow.com Facebook Google map..... “you have zero privacy anyway...” (Scott McNealy, former CEO of Sun Microsystems)  Cant deny computers, databases and Internet....make it easier than ever to get lots of info about strangers.... Is it possible to maintain Privacy in Information Age?

privacy  Privacy as good or bad thing?????  People have right to keep outsiders from knowing what is private for them Sth shouldn't be known : Avert yr eyes when yr friend typing his password  too much privacy??? society can be harmed..... info exchange among a group for business deals

Harms & benefits of privacy  Harms Plan And Do Illegal And Immoral Activities  Not ask for help, Problems in families remain unknown, until injured  Benefits  Privacy is necessary for an individual to develop his characteristic as an individual  lets us to be ourselves.... True freedom  Lets us remove our public persona hard time with a client...In a privacy of home.....blow off steam  A “moral capital”...to build relationships Respect, love, friendship and trust  Control over who knows what about us “Ladder of privacy” Level of information we share with people

There are three key aspects of privacy:. Freedom from intrusion—being left alone. Control of information about oneself. Freedom from surveillance (from being followed, tracked, watched, and eavesdropped upon)

Right to privacy?  Every person has certain natural rights:  Right to life, liberty...  Is there a natural right to privacy?  Many philosophers think privacy principles should be based on fundamental principle that each person is worthy to respect  no overall agreement on : privacy as a right...but most agree privacy is a Prudential right: Rational agents would agree to recognize some privacy rights, because granting these rights is to the benefit of society.

Privacy And Trust  “one of the key factors affecting growth of e-commerce is the lack of internet user’s trust in online sellers”  Not confident in online information privacy  To trust others.... Rely on their reputation...e-Word of mouth  Need : new laws, technical solutions and privacy policies  Reasonable limits must be set on government and business access to personal information  New communication techs must be designed to protect rather than diminish privacy

 Privacy  Key concern of Internet users  Top reason why nonusers still avoid the Internet

Case study  Sullivans Family hire nanny to keep baby  Worry about put baby alone with nanny  Install “Live security watch” on laptop  Nany doesn't know. Is it wrong that parents secretly monitor behaviour of nanny?

Rule Utilitarian evaluation  Benefits: If all parents monitored their nannies or child care providers and took actions when warranted, such as firing nannies who did not perform well, it is unlikely such monitoring would remain a secret for long  nannies would be much more careful to be on their best behavior  have the long-term effects of reducing the instances of inappropriate behavior with child  Harms:  Increasing the stress and reducing the job satisfaction of, who wants to be monitored constantly??!  These negative aspects of the job could lead to an increased turnover rate of nannies. Less experienced nannies might well provide lower quality care to the babies they tend.  Results The harms of having all parents monitoring their nannies or child care providers appear to be greater than the benefits. Hence, we conclude it is wrong for the Sullivans to secretly monitor their nanny

Social contract theory evaluation Social contract theory emphasizes: “the adoption of rules that rational people would agree to accept because they are to everyone’s mutual benefit, as long as everyone else follows the rules as well” privacy is a prudential right  It is reasonable for society to give privacy to people in their own homes, and it is also reasonable for family members within each home to give each other some privacy as well.  The nanny wouldn’t expect her interactions with the baby in a park or a grocery store to be private, but it is reasonable for her to expect privacy when taking care of the baby inside the Sullivans’s home. Hence, the Sullivans’ decision to secretly monitor the nanny was wrong because it violated her right to privacy

KANTIAN EVALUATION Let’s consider the morality of acting according to the rule: “An employer may secretly monitor the work of an employee who works with vulnerable people.” To evaluate the rule using the first formulation of the Categorical Imperative, we universalize it.  evaluate this situation using the second formulation of the Categorical Imperative.  As parents, the Sullivans are responsible for the well-being of their baby.  In order to be more confident that their baby is safe in the care of the nanny, they choose to secretly observe the behavior of the nanny.  The observation is the means to their desired end of having their baby well cared for.  The nanny naturally assumes that her interactions with the baby in the Sullivan residence are private.  By not disclosing to the nanny the fact that she is being watched remotely, the Sullivans have treated the nanny as a means to an end. Hence, the action of the Sullivans is wrong.

summary From the points of view of rule utilitarianism, social contract theory, and Kantianism, we have concluded that it is wrong for the Sullivans to secretly monitor how well their nanny takes care of their baby. Does this mean that the Sullivans must throw up their hands and simply hope for the best with regard to the quality of their child’s care? No. They do have several morally acceptable options that do not involve deceit.  They could conduct a more comprehensive interview of the nanny, they could more thoroughly check the nanny’s references, or one of them could spend a day or two a home observing the nanny from a distance as she interacted with the baby.  The Sullivans could also be clear with the nanny; they could inform her that they would like to install software on their laptop computer that allows them to see and hear what is happening in the apartment. That course of action would  respect the autonomy of the nanny and give her the freedom to agree to the monitoring, negotiate a different arrangement, or quit.

Privacy threats  Intentional, institutional uses of personal information (in the government sector primarily for law enforcement and tax collection, and in the private sector primarily for marketing and decision making)  Unauthorized use or release by “insiders,” the people who maintain the information  Theft of information  Inadvertent leakage of information through negligence or carelessness  Our own actions (sometimes intentional trade-offs and sometimes when we are unaware of the risks)

Information disclosure  Private and governmental organizations, maintain extensive record of our records and activities  Public record:  Birth certificates, marriage license, automobile record, crimina;lrecords.....  Private records:  Information about purchases....

New techs, new risks  A variety of ways in which private organizations collect and use personal information:  Facebook tags  Enhanced 911  Loyalty programs  Body scanners  RFID Tags  Implanted chips  Onstar  Automobile black list  Medical record  Digital video recorder  Cookies and flash cookies  Data mining ...

Information disclosure  Secondary use of data  use of information for a purpose other than for which the person supplied it  examples of Secondary use of data:  Google search track search query/web pages clicked--- return related result Baas--- music/ fishing?  Data mining Grocery store loyalty card ----to create more personal relationship  Collaborative filtering Predict preferances by tracking purchases ----make recommendatio

Information disclosure Many comapnies that collect info about customer activities ----use the info to provide more personalized services - Do the comapnies have the right to buy and sell information about their customer’s transactions? - Or should the person buying a product/service have the right to control the info about that transaction? - What rules should govern sharing of info collected by organizations??

personal information & ethic  The first principle for ethical treatment of personal information is informed consent  When a business or organization informs people about its data collection and use policies or about the data that a particular device or application collects, each person can decide, according to his or her own values, whether or not to interact with that business or organization or whether to use the device or application

Privacy principles for personal information  Invisible information gathering describes collection of personal information without the person’s knowledge.  The important ethical issue is that if someone is not aware of the collection and use, he or she has no opportunity to consent or withhold consent  A company offered a free program that changed a Web browser’s cursor into a cartoon character. Millions of people installed the program but then later discovered that the program sent to the company a report of the websites its users visited, along with a customer identification number in the software.

Information disclosure Opt-in Vs opt-out policy  Opt-in:  require the consumer explicitly give permission to org to share info with another orgs  Opt-out:  Require the consumer explicitly forbid org from sharing info with other orgs  direct marketing associations prefer opt-out policy, becuase opt-in is a barrier for new businesses  Opt-out policyies more common that opt-in policy

Ethics in Information Technology, Second Edition 25 Manager’s Checklist for Treating Consumer Data Responsibly

More discussion?  Protecting privacy in data mining ?is it possible?  customer-oriented privacy policy  Law and privacy protection  Tools to protect privacy on web  Methods a business cab use to reduce risk of unauthorized release of personal information by employees

حریم خصوصی  حمایت قانونی از حریم اشخاص در فضای سایبر؟  با ذکر مشخصات دقیق منابع به پرسشهای زیر پاسخ دهید :  چه قوانيني با چه عناویني در ایران از حریم شئصي حمایت مي كنند؟ در چه مواردی؟ و چه نقاط قوت و ضعفي دارند؟