Presentation is loading. Please wait.

Presentation is loading. Please wait.

CmpE 25 10/25/2011 – 10/27/2011. Identity and Privacy How important is identity online? How important is identity online? Can you connect identity online.

Similar presentations


Presentation on theme: "CmpE 25 10/25/2011 – 10/27/2011. Identity and Privacy How important is identity online? How important is identity online? Can you connect identity online."— Presentation transcript:

1 CmpE 25 10/25/2011 – 10/27/2011

2 Identity and Privacy How important is identity online? How important is identity online? Can you connect identity online with face to face identity?Can you connect identity online with face to face identity? How do you define identity online? How do you define identity online?

3 Online Identity Most individuals have multiple identities online. Most individuals have multiple identities online. Our online identities identify us within a specific context. Our online identities identify us within a specific context. Passwords are about securing a specific identity.Passwords are about securing a specific identity.

4 Online Identity Does online identity go in two directions? Does online identity go in two directions? Who we areWho we are Who we are communicating withWho we are communicating with

5 Online Identity How important is it to secure a specific online identity? How important is it to secure a specific online identity? What elements are important within the context of our online identity? What elements are important within the context of our online identity? Examples age, credit card numberExamples age, credit card number To what lengths would you go through to secure your online identify? To what lengths would you go through to secure your online identify?

6 Online Identity Other types of online identity. Other types of online identity. Virtual identity; not connected to live person but consistent within the context.Virtual identity; not connected to live person but consistent within the context. Anonymous identity; not connected and not consistent.Anonymous identity; not connected and not consistent.

7 Online Identity How important is anonymous identity to empowerment? How important is anonymous identity to empowerment? Does anonymous identity cause issues? Does anonymous identity cause issues?

8 Privacy How is privacy defined? How is privacy defined? The right to be left alone.The right to be left alone. The right to control information about you.The right to control information about you. The right not to invade one’s space.The right not to invade one’s space.

9 Privacy Traditional notions of privacy are based on the idea of trespass. Traditional notions of privacy are based on the idea of trespass. Protections against government intrusions into your space. Protections against government intrusions into your space. Fourth AmendmentFourth Amendment Reasonable expectation of privacy.Reasonable expectation of privacy. Telephone Telephone Garbage Garbage Hair cut Hair cut

10 Privacy What protects one against intrusions of other individuals? What protects one against intrusions of other individuals? Laws against trespassLaws against trespass

11 Privacy What is your expectation of privacy? What is your expectation of privacy? Is that expectation reasonable? Is that expectation reasonable?

12 Privacy What do we expose online? What do we expose online? Our financial dataOur financial data Our locationOur location Our friends, likes, purchasesOur friends, likes, purchases Our interestsOur interests On what do we base our expectation of privacy? On what do we base our expectation of privacy? Hasn’t much of this data been exposed without being online? Hasn’t much of this data been exposed without being online?

13 Privacy While much of that data is exposed online, mobile technology has allowed us to take data that was protected in our homes and offices out in public. While much of that data is exposed online, mobile technology has allowed us to take data that was protected in our homes and offices out in public. Once in public do we have the same expectation of privacy? Once in public do we have the same expectation of privacy? Police searches of cell phones.Police searches of cell phones. Private searches of cell phones.Private searches of cell phones. If I read your email/text messages on a phone you left on your desk, but do not take the phone what crime have I committed? If I read your email/text messages on a phone you left on your desk, but do not take the phone what crime have I committed?

14 Privacy Much of the data that we expect to be private is no longer only kept in our homes and offices where the laws of trespass provides a degree of protection. Much of the data that we expect to be private is no longer only kept in our homes and offices where the laws of trespass provides a degree of protection. Data on smart phonesData on smart phones Digital camerasDigital cameras LaptopsLaptops

15 Privacy What is different is that without technology much of what we expose is useless. What is different is that without technology much of what we expose is useless. Technology provides: Technology provides: The ability to capture vast amounts of dataThe ability to capture vast amounts of data The ability to store vast amounts of dataThe ability to store vast amounts of data The ability to analyze that dataThe ability to analyze that data

16 Privacy Beside online intrusions technology provides: Beside online intrusions technology provides: Cameras, stop light camerasCameras, stop light cameras DNA scanningDNA scanning GPS trackingGPS tracking When we are in public to we have an expectation to privacy or to be anonymous? When we are in public to we have an expectation to privacy or to be anonymous?

17 Privacy When does data or information that is publicly available without any expectation of privacy become an invasion of privacy? When does data or information that is publicly available without any expectation of privacy become an invasion of privacy? What we buyWhat we buy Where we goWhere we go When was the last time you went to store and had to agree to terms of service that contains a privacy policy? When was the last time you went to store and had to agree to terms of service that contains a privacy policy?

18 Privacy With the ability to process vast amounts of data, individual pieces of data become much more valuable. With the ability to process vast amounts of data, individual pieces of data become much more valuable. With increased value comes a desire to collect more and more information. With increased value comes a desire to collect more and more information.

19 Privacy Do different generations have different expectations of privacy? Do different generations have different expectations of privacy? Can you identity the reasons behind the differences?Can you identity the reasons behind the differences? Should we just get over the lack of privacy? Should we just get over the lack of privacy?

20 Unit Test Review Empowerment Empowerment What does it mean?What does it mean? What has been accomplished?What has been accomplished? How can it be used responsibly?How can it be used responsibly? Net neutrality Net neutrality What does it mean?What does it mean? How might it affect you?How might it affect you?

21 Unit Test Review Social Network User’s Bill of Rights Social Network User’s Bill of Rights What is it?What is it? Is it important?Is it important? Why might there be different views on it’s importance?Why might there be different views on it’s importance?

22 Unit Test Review Access to the internet as a basic human right. Access to the internet as a basic human right. Why do many people believe it is a basic human right?Why do many people believe it is a basic human right? What are the issues in making it a basic human right?What are the issues in making it a basic human right?

23 Unit Test Review The Cyber Personality The Cyber Personality What changes in personality and behavior occur when one is online?What changes in personality and behavior occur when one is online? Do the changes continue when one is no longer online?Do the changes continue when one is no longer online?

24 Unit Test Review Social Interaction Social Interaction The use of Technology and Social Media have caused changes in the way we interact. What are those changes and what impact have they had on social relationships?The use of Technology and Social Media have caused changes in the way we interact. What are those changes and what impact have they had on social relationships?

25 Unit Test Review Online Identity Online Identity What are the elements that make up our on line identity?What are the elements that make up our on line identity? Does our online identity revile our total or true self? Does our online identity revile our total or true self? Are people honest in displaying their online self? Are people honest in displaying their online self? What are the benefits and issues with being anonymous online?What are the benefits and issues with being anonymous online?

26 Unit Test Review Privacy Privacy How does technology impact our expectation of privacy?How does technology impact our expectation of privacy? What makes data that is public information feel like an invasion of our privacy?What makes data that is public information feel like an invasion of our privacy? Is it really about privacy or being anonymous?Is it really about privacy or being anonymous?


Download ppt "CmpE 25 10/25/2011 – 10/27/2011. Identity and Privacy How important is identity online? How important is identity online? Can you connect identity online."

Similar presentations


Ads by Google