Presentation is loading. Please wait.

Presentation is loading. Please wait.

“zone of inaccessibility” Edmund Byrne, 1998 “The right to be alone” Warren and Brandeis, 1890 COMP 381.

Similar presentations


Presentation on theme: "“zone of inaccessibility” Edmund Byrne, 1998 “The right to be alone” Warren and Brandeis, 1890 COMP 381."— Presentation transcript:

1 “zone of inaccessibility” Edmund Byrne, 1998 “The right to be alone” Warren and Brandeis, 1890 COMP 381

2 Views on Privacy  “All this secrecy is making life harder, more expensive, dangerous …” Peter Cochran, BT Research  “You have zero privacy anyway.” Scott McNealy, Sun  “By 2010, privacy will become a meaningless concept in western society” Gartner report

3 Aspects of Privacy  Secrecy Limiting dissemination of information  Anonymity Protection from undesired attention  Solitude Lack of proximity Ruth Gavison 1984

4 Historical Basis of Privacy  Code of Hammurabi 1760 BCE crime to break a hole through the wall of another’s house  Justice of Peace Act England 1361 Peeping Toms and eavesdroppers

5 Current Basis of Privacy  Universal Declaration of Human Rights Universal Declaration of Human Rights United Nations 1948 Article 12  European Convention on Human Rights European Convention on Human Rights European Council 1950 Article 8  US Constitution: Bill of Rights US Constitution: Bill of Rights Evolution from property rights Amendment IV

6 Without Privacy  Extrinsic loss of freedom Ability of others to control our behavior Coercion or imposition of others’ wills  Intrinsic loss of freedom Changes how we behave “anticipatory conformity”  Autonomy requires privacy

7 Privacy and Identity  Identity sense of self distinct personality of an individual an individual's comprehension of him or herself as a discrete, separate entity  What defines your identity?

8 Privacy and Trust  In order to trust others, need to know something about them Privacy impedes  In order to build STRONGEST trust between two people, need to create a bond Requires privacy

9 Importance of Privacy  Privacy and relationships  How is it different from pre- computers/networks? Electronic alter ego  Identity convergence Identity convergence

10 Everyone Agrees  Privacy is not absolute in society … why ?  Willing to divulge SOME information in exchange for SOME economic or social benefit….  BUT reasonable expectation about how it’s treated…  What is known about you?

11 Controversy & Challenge  My right to informational privacy vs. others’ right to know vs. security  Does it have to be versus?  Is it really a zero-sum game?

12 My rights  Shouldn’t I have a say?  Why should I care?  Decisions made about us  Effect if data are Incomplete? Erroneous? Sensitive?

13 Legal Realities of Privacy  Self-regulation approach in US, Japan  Comprehensive laws in Europe, Canada, Australia  European Union Limits data collection Requires comprehensive disclosures Prohibits data export to unsafe countries ○ Or any country for some types of data

14 Privacy Impingement In the Past  Go to the court or town hall  Go through trash  Interview people  Eavesdrop/wiretap  Surveillance  Breaking and entering

15 … and Today  Public records easier to find  Publications spread faster  Surveillance  Keeping records of what you do on the web Shopping Surfing Searching  Breaches

16 Privacy on the Web  The right to have information that you don’t expect to be available to others remain that way  On many sites, you give up your right to privacy  But there are also other more insidious ways  Google Dashboard

17 Aspects of Privacy  Transparency and Control: knowing what is being collected  Anonymity  Security Data breaches chronology Data breaches Mike Reiter lecture in 2 weeks

18 Impediments to Privacy  Cookies Web site retaining cookies for 5 years  Sniffing, Snarfing, Snorting Forms of capturing packets over network Differ by how much info & what is done with it  Surveillance Different forms? Google Street View  Data collection and sharing

19 What’s Coming: Web 3.0  Semantic Web Assign meanings -> further connections

20 Identity Theft  “crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception”  Identity Theft is a Federal Offense  Crimes of Persuasion Crimes of Persuasion  Commercial Commercial

21 (Stop Internet Fraud and Identity Theft)

22 And a final note… Pizza ParlorPizza Parlor knows all


Download ppt "“zone of inaccessibility” Edmund Byrne, 1998 “The right to be alone” Warren and Brandeis, 1890 COMP 381."

Similar presentations


Ads by Google