Presentation is loading. Please wait.

Presentation is loading. Please wait.

CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”

Similar presentations


Presentation on theme: "CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”"— Presentation transcript:

1 CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”

2 INTRODUCTORY PREVIEW TO THE DEVELOPMENTS, ISSUES, THEMES AND ETHICS. Chapter 2: Privacy 2

3 Outline Privacy and Computer Technology Terminology and principles for data collection and use Big brother is watching you Protecting Privacy 3

4 PRIVACY AND COMPUTER TECHNOLOGY 4

5 Introduction Three key aspects of privacy: 5 Freedom from intrusion (being left alone) Control of information about oneself Freedom from surveillance (being tracked, followed, watched)

6 New Technology, New Risks: 6 Government and private databases Incredible capacity at low cost Detailed information previously not collected Sophisticated tools for surveillance and data analysis Powerful search and analysis tools can use data to track movements and develop personal profiles Search query examples?

7 TERMINOLOGY AND PRINCIPLES FOR DATA COLLECTION AND USE 7

8 Invisible Information Gathering Collection of personal information about someone without the person’s knowledge Invisible information gathering is common on the Web: ISPs (Internet Service Provider) and websites can collects such details of the users online activities. 8

9 HTTP cookies web cookie, or browser cookie small pieces of textual information stored by websites on your computer login information, the contents of your basket on shopping sites, etc. the data stored in the cookie is sent back to the website by the browser authentication cookies are used by websites to know whether the user is logged in or not tracking cookies can compile long-term records of individuals' browsing histories 9

10 Secondary use Secondary use: Use of personal information for a purpose other than the one it was provided for. Info sold to marketers Organization member lists Vehicle registrations Data mining: Searching and analyzing masses of data to find patterns and develop new information or knowledge Large databases Use to develop business strategies 10

11 Secondary use Computer matching: Combining and comparing information from different databases Using social security number, for example, to match records Acts as primary key to identify your records in multiple databases Computer profiling: analyzing data in computer files to determine characteristics of people most likely to engage in certain behavior Valid / effective?? Identify “people to watch”? Data mining, computer matching, and computer profiling are examples of secondary use of personal information. 11

12 Principles for data collection and use Informed Consent: Tell people what you intend to do with their data Obtain consent, or not Opt-in and opt-out policies: Allow people to allow or deny use Opt-in: You have to say that you want in; Otherwise, by default, you are automatically out. Opt-out: You have to say that you want out; Otherwise, by default, you are automatically in. 12

13 Principles for data collection and use Fair Information Principles (or Practices) 13 Inform people when personal data is collected Collect only data needed Offer opt-out option for secondary uses of information Provide strong protection for sensitive data –i.e. medical info Keep data only as long as needed Maintain accuracy and provide means for correction Protect security of data from theft & accidental disclosure Develop policies for responding to law enforcement requests for data Inform people when personal data is collected Collect only data needed Offer opt-out option for secondary uses of information Provide strong protection for sensitive data –i.e. medical info Keep data only as long as needed Maintain accuracy and provide means for correction Protect security of data from theft & accidental disclosure Develop policies for responding to law enforcement requests for data

14 Discussion Topics What We Do Ourselves: Personal information in blogs and online profiles Pictures of ourselves and our families File sharing and storing National ID System Is privacy old-fashioned? –Young people put less value on privacy than previous generations –May not understand the risks

15 BIG BROTHER IS WATCHING YOU 15

16 Government Databases Government Databases: 16 Public library records Firearms permits Applications to gov’t programs Professional & trade licenses Bankruptcy records Arrest / criminal history records Taxes –employer, dependants, status Medical –Medicare, military Marriage / Divorce Property ownership Government aid –includes family info School records –includes psych tests Motor vehicle –personal info Small Sampling of Governments Databases with Personal Information

17 Government Databases Scope of government activities is ubiquitous Government & its agencies are coercive by nature “Requests” for info viewed more as demands Potential for abuse of info is high High standard of privacy protection seems appropriate? 17

18 Government Databases Privacy Act of 1974: Applies to agencies of the US federal government Enacted in response to government abuse of personal information Provisions include: Collect only data “relevant & necessary” to authorized purpose Publish notice of database existence in Federal Register Allow review and correction of errors Responsible for ensuring the security of data Prohibit disclosure without consent (with exceptions) 18

19 Government Databases Burden of proof and "fishing expeditions”: Traditionally: crime > evidence > suspect Probable cause required for search Database searches identify “suspicious” people, then look for crime Presumption of guilt VS presumption of innocence? Data mining and computer matching to fight terrorism After 9-11, people more willing to trade privacy for safety. Government given more access to personal information for data mining and profiling 19

20 PROTECTING PRIVACY Technology, Market, Rights, and Laws 20

21 Technology and Markets Privacy-enhancing technologies for consumers: Cookies disablers and alerts Block pop-ups software Free anti-Spyware. Anonymizer. Websites restrictions options (family, friends). 21

22 Self-destructs email 22

23 Public-key cryptography Encryption: Transforms data into a form that is meaningless to anyone. Usually contains coding scheme and keys. Keys: wnbsuqiomnlpaevzrtycxjhgfd! More advanced mathematical technique 23

24 13.24 Digital Signature A digital signature needs a public-key system. The signer signs with her private key; the verifier verifies with the signer’s public key.

25 Technology and Markets Business tools and policies for protecting personal data A well designed database should have several features to protect against leaks, intruders, and unauthorized employee access: 25 A unique password and identifier for each person with authorized access Restricting users from performing certain operations. Audit trail: Keeps track of information about each access, including the ID of the person looking at record and the information viewed or modified.

26 Free Market View Freedom of consumers to make voluntary agreements Informed consent People should be allowed to “sell” their info, if they choose Expect consumer to exercise good judgment Assumes business will act responsibly Response of the market to consumer preferences 26

27 Consumer Protection View Consumers need protection from their own lack of knowledge, judgment, or interest We are easily deceived –protect us from our naivety Uses of personal information Unintended or secondary uses & their consequences Costly and disruptive results of errors in databases More stringent consent and regulation on collection and use of personal information Ease with which personal information leaks out 27

28 Discuss one of Topics w.r.t. Privacy Pros and Cons Targeted marketing Data mining Paying for consumer information Data firms and consumer profiles Credit cards Global Positioning Systems (GPS) -computer or communication services that know exactly where a person is at a particular time Cell phones and other devices are used for location tracking

29 Protecting Privacy Privacy Regulations in the European Union (EU): Data Protection Directive More strict than U.S. regulations Abuses still occur Puts requirements on businesses outside the EU


Download ppt "CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”"

Similar presentations


Ads by Google