CS 6v81 003-Privacy Nothing to Hide? Dr.Murat Kantarcioglu Presentation based on “Database Nation”

Slides:



Advertisements
Similar presentations
Lessons for Biometrics from SSNs & Identity Fraud Peter P. Swire Ohio State University National Academy of Sciences March 15, 2005.
Advertisements

Credit and Credit Cards
Background Credit reporting agencies are a key player, helping facilitate modern commerce Credit records help predict the risk of a transaction Credit.
Protecting Society by Protecting Information Reducing Crime by Better Information Sharing Adam Shostack
PowerPoint Presentation Possible Topics Related to General Education Area VI Computer Science Appendix B.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Public Information Online. Timothy WhitneyCaroline Aaron.
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Role of Ethics in Business. It is classified as: 1. Role of Business Ethics in Finance: It covers areas like fairness in trading practices, trading conditions,
J. Chansavang. Use this Powerpoint to gain understanding about the main areas that are affected by computers and technology. Possible research topics.
IT security seminar Copenhagen, April 4th 2002 M. Jean-Michel HUBERT Chairman of the French Regulation Authority IRG Chairman.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Right to Privacy Crime and Law -- Nilsen. Privacy is: The right to be let alone.
CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal.
Ethics Applied to Computerized World “Privacy” (Morality and Machines S. L. Edgar) **** CS575 *** Jules R. NYA BAWEU.
Information Assurance... Smart Card Interoperability Steve Haynes Phone
C4- Social, Legal, and Ethical Issues in the Digital Firm
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
“Privacy and the Future of Justice Statistics” Peter P. Swire Chief Counselor for Privacy OMB/OIRA National Conf.on Privacy, Technology & Criminal Justice.
Track II: Introduction and Overview of Financial Services and Information Technology Privacy Policy: Synthesizing Financial Services Industry Privacy David.
Forum IIIB Group 7 Open Access to Personal Information Introduction- Steve Ayers Pros- Michelle Peterson Cons- Christie Christman Conclusion- Audrey Clausen.
PRIVACY Britt, Beattie and Amy. What are the issues regarding privacy on the internet? Privacy issues arise everyday. Examples of when privacy becomes.
THE SECURITIES CLEARING AND SETTLEMENT SYSTEM Information Systems in the Securities Market.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
Computer Legislation The need for computer laws Go to Contents.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CD5590.
Information Warfare Playgrounds to Battlegrounds.
IDENTITY THEFT OCCURS WHEN A CRIMINAL USES ANOTHER PERSON'S PERSONAL INFORMATION TO TAKE ON THAT PERSON'S IDENTITY. IDENTITY THEFT IS MUCH MORE THAN MISUSE.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Lesson Title: Privacy Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
Privacy by Design – Principles of Privacy-Aware Ubiquitous Systems Marc Langheinrich - Swiss Federal Institute of Technology, Zurich Whitney Hess.
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
CS 6v Privacy The end of Privacy ?? Dr.Murat Kantarcioglu.
Information Warfare Playgrounds to Battlegrounds.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Privacy: Biometric Technology and Civil Liberties Biometric technology is used because it relies upon “highly reliable” characteristics which cannot change.
1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2007 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CDT409.
4/17: Ethical & Social Issues in IS
Personal Privacy: Limited Disclosure using Cryptographic Techniques Mark Shaneck Karthikeyan Mahadevan SCLab.
Why Privacy & Security Awareness Training?. Why is privacy & security awareness training required?
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Chapter 6 Due Process and Other Protected Rights Section 2 Controversial Rights.
Lecture5 Privacy and the Government. Chapter Overview Introduction U.S. legislation restricting information collection Information collection by the government.
Chapter 11 Business and Technology Objective 2.04.
BTEC ICT Level 3 Unit 8 E-Commerce
Privacy and the Law.
Add video notes to lecture
Privacy and Information
Other Sources of Information
Chapter 11 Business and Technology
BTEC ICT Level 3 Unit 8 E-Commerce
Presentation transcript:

CS 6v Privacy Nothing to Hide? Dr.Murat Kantarcioglu Presentation based on “Database Nation”

CS 6v Privacy What Do We Mean By Privacy? Privacy is not just about hiding things Privacy is related to self-possession, autonomy, and integrity Privacy is about the woman who is afraid of to use the Internet to organize her community against a proposed toxic dump………..

CS 6v Privacy Privacy Under Attack In 1996, %24 of Americans has “personally experienced a privacy invasion” (%19 in 1978) Privacy vs. Convenience Trade off ?? –In 1960s, some said that polluting the environment is required for development Right to privacy “Right to be let alone”

CS 6v Privacy Role of Government Privacy is not a priority of the Government Regulations are needed for privacy. –Fair Credit Reporting Act Code of Fair Information Practices: –No secret personal data storage –Individual’s right to know what is stored –No unintended use without consent –Right to correct or amend stored data –Reliable and Correct Data Storage

CS 6v Privacy Public Concerns Over Privacy Lotus Development Corp and Equifax’s “Lotus marketplace: Households” –Project Canceled Lexis-Nexis display of SSN –Due to protests, it took 11 days to change SSA’s tax information publishing –Service Shut Down

CS 6v Privacy Challenges The end of due process The fallibility of biometrics –Remember the “Minority Report” The systematic capture of everyday events Constant surveillance The misuse of medical records

CS 6v Privacy Challenges Runaway marketing Personal information as a commodity Genetic information databases Anti-piracy systems Individual as Terrorist –Remember Benjamin Franklin Intelligent Computing

CS 6v Privacy Law of Unintended Consequences SSN was developed related to social security act SSN is even used for identifying students –I have your SSNs Cell phones are used for payments Lasers are used in DVD players What will be the DNA used for???

CS 6v Privacy Identity Theft Huge increase in identity thefts On average, it takes four years to clear your name No right to sue for personal suffering Market solutions do not work –No incentive for financial companies Simple solutions may help –NO INCENTIVE FOR COMPANIES!!!!