1 Ethics of Computing MONT 113G, Spring 2012 Session 29 Privacy.

Slides:



Advertisements
Similar presentations
Mobile Shelf Monitor Shop organization for profit maximization.
Advertisements

Background Credit reporting agencies are a key player, helping facilitate modern commerce Credit records help predict the risk of a transaction Credit.
Organizing Your Argument The Argumentative Essay.
Your Parents Can’t Fix Everything Your credit history Begins now—when you choose and use credit cards Includes your missteps for as long as 7 years.
Privacy CS 195 Social Implications of Computers. Privacy as Instrumental Good Avoid discrimination based on, e.g., HIV status. Allow anonymous political.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Electronic Commerce Semester 1 Term 1 Lecture 22.
1 Knowledge Management Session 4. 2 Objectives 1.What is knowledge management? Why do businesses today need knowledge management programs and systems.
Ethics in a Computing Culture
Chapter 12: Web Usage Mining - An introduction
Chapter 10 Privacy and Security McGraw-Hill
Privacy Chris Kelly iLaw July 5, 2002.
Mailing Lists Should we invest more in new customers or in building better relationships with our existing customers?
Business Intelligence Andrew Davis Andria Zippler Jana Krinsky Tiffany Ferris.
3 Ethics and Privacy.
Knowledge is Power Marketing Information System (MIS) determines what information managers need and then gathers, sorts, analyzes, stores, and distributes.
Chapter 9 e-Commerce Systems.
Organizing Your Job Search
Case 1 – WingspanBank.com
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Data Privacy and Security Prof Sunil Wattal. Consumer Analytics  Analytics with consumer data to derive meaningful insights on actions and behaviors.
CONVIO TRAINING 2 Constituent 360 & TeamRaiser. Agenda 1)CRM vs. eCRM 2)What we Migrated and what we didn’t 3)Roles – 2 Logins 4)Duplicate cleanup 5)Security.
1 Knowledge and Learning PG Diploma in Hospitality Management Customer Service and Quality Systems – Session 3.
 CONVENIENT  HELPS YOU KEEP TRACK OF MONEY: USING THE CHECK REGISTER OR ONLINE BANKING  SAVES YOU MONEY – EXPENSES ARE LESS THAN MONEY ORDERS.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
Mindwrap inc. Wireless Solutions Presentation. 2 Mobile Access to Corporate Document Repositories Available for the Palm VII and other wireless Palm-OS.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Privacy Privacy as a personal preference Is there such a thing as too much privacy? What will be discussed  Why privacy is an issue  Dangers of lack.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Ch5 1 ETHC303 Chapter 5- Privacy Instructor: Dr. Hassan Ismail Abdalla Room: E236.
Marketing Research Marketing Information Systems.
The Getting Complete Guide to Started Day 1 Finding & Analyzing Deals Day 2 Choosing A Profit Strategy Day 3 Putting It All Together.
Business Administration term project 2 (25%) financial Management Systems Debit card and credit card payments By Ashleigh Gray.
Information Anxiety By Meghan Randinelli. Introduction Greatest problem concerning ethical information technology (IT) is personal privacy Greatest problem.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Database What is a database? A database is a collection of information that is typically organized so that it can easily be storing, managing and retrieving.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Chapter 12: Web Usage Mining - An introduction Chapter written by Bamshad Mobasher Many slides are from a tutorial given by B. Berendt, B. Mobasher, M.
Introduction  Today I’m going to look at some spreadsheets and analyse they show.  The two spreadsheets I’m looking at are Belgrave school’s test.
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
Chapter 4 CONSUMER AND BUSINESS MAILING LISTS. Consumer and Business Mailing Lists Three kinds of lists: House lists, which are the customer databases.
Copyright © 2004 Pearson Education, Inc. Slide 9-1 Chapter 9 Ethical, Social, and Political Issues in E-commerce.
What is Privacy?. 3 Types of Privacy 1.Accessibility Privacy 2.Decisional Privacy 3.Informational Privacy.
…refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected and stored.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 11 Democracy and the Internet Privacy.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Lecture 7 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS 1.
CHAPTER 5 ETHICS & PRIVACY.
DATA MANAGEMENT AND DATABASES. Data Management Data management is the process of controlling the information generated during a research project or transaction.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 13 Privacy as a Value.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
Management of Working Capital. Balance Sheet A financial statement that summarizes a company's assets, liabilities and shareholders' equity at a specific.
Turning Small Business into Big Business. © 2011 Biz2Credit, LLC. All Rights Reserved - Proprietary and Confidential Biz2Credit: In a few words… Biz2Credit.
Social Impacts of Data Mining 2004/12/30. Outline Is data mining a hype or a persistent growing business? Is data mining merely managers’ business or.
 Profiles are the basic building blocks of the Opera database for your hotel.  They can be simple, with a first and last name only, or complex with preferences,
1 Ethics of Computing MONT 113G, Spring 2012 Session 27 Ethics in IT Societies III Privacy.
How to prevent Identity Theft
PRIVACY.
Chapter # 1 Overview of Ethics
Computers and Data Collection
Privacy …refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
Other Sources of Information
Chapter 10: Privacy, Security, and Ethics
Session 25 INST 301 Introduction to Information Science
A Gift of Fire Third edition Sara Baase
INFS 452 – Computer Ethics & Society
IT and Society Week 2: Privacy.
Presentation transcript:

1 Ethics of Computing MONT 113G, Spring 2012 Session 29 Privacy

2 Privacy in IT societies What's new? What's different about information flow in IT societies from previous societies? Previous modes of information flow: Typewriters Cash Registers U.S. Mail Paper hard to store and search Characteristics of IT information flow: Flows quickly and easily Reproducible Personal information is recorded, tracked and spread Difficult to remove information Easy to store and search

3 What Else is New? Tools for Data Mining and Managing Databases. Did not emerge in a vacuum (technological determinism) Emerged in response to government and corporate interests. New Kinds of information. Transaction generated information (TGI) Examples: Credit card Clickstream

4 Merging and Mining Data When different types of information is merged and then mined for patterns, this can produce new types of information. Examples: Clickstream profile Amazon.com recommendations Facebook friends--gaydar

5 Other Issues Distribution of information is broader and more extensive than before. Example: Credit rating. Once on a server, information can be bought, sold, given away or stolen. Information endures. Example: Images on Facebook. Errors are very hard to correct.

6 IT Societies are Surveillance Societies IT allows people to be easily tracked and monitored. Examples? Data can be used to create profiles of individuals. The data can be "mined" for patterns of behavior. Questions raised: What is the value of privacy? How does surveillance affect us and our society?

7 Why Worry About Privacy? Arguments for not worrying about privacy: 1.If you aren't doing anything wrong, you don't need to worry. Counter-arguments?

8 Privacy is Overrated Arguments for not worrying about privacy. 2) People easily trade away personal information for benefits. Therefore they don't value privacy much. Counter-arguments?

9 Information gathering is good for you Arguments for not worrying about privacy. 3) Information gathering is good for companies and their customers. Companies can offer products tailored to customer's likes and dislikes. Example: Mortgage lender can determine whether a person is likely to pay back a loan. Companies can target ads or discount offers. Counter-arguments?

10 Privacy as an Individual Good The "right to privacy" is legally complicated. Based on 1st and 4th amendments Protects citizens from intrusion by governments Corporations treated like persons How do we protect individual's privacy from corporations? Privacy act of 1974 legislates some rights.

11 Privacy as a Value Is privacy an intrinsic or instrumental value? Fried (1968): Friendship, intimacy and trust cannot develop in societies under constant surveillance. (E.g. Orwell's 1984) Rachels (1975): Privacy is required for diversity of relationships. Control of information about ourselves is important for our autonomy. Need to release information about ourselves in some contexts, but should have control over whether it flows to other places.