Presentation is loading. Please wait.

Presentation is loading. Please wait.

컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.

Similar presentations


Presentation on theme: "컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology."— Presentation transcript:

1 컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과

2 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology “Big Brother is Watching You” Consumer Information More Privacy Risks Protecting Privacy: Education, Technology, and Markets Protecting Privacy: Law and Regulation

3 컴퓨터와 사회 프라이버시와 개인 정보 3 The Impact of Computer Technology Computers are not needed for the invasion of privacy. Computers simply make new threats possible and old threats more potent. Privacy can mean: Freedom from intrusion Control of information about oneself Freedom from surveillance

4 컴퓨터와 사회 프라이버시와 개인 정보 4 The Impact of Computer Technology Invisible Information Gathering Examples: Satellite surveillance Caller ID 080- or 900-number calls Loyalty cards Web-tracking data; cookies Peer-to-peer monitoring Others… Q : Recall an example of invisible information gathering about you.

5 컴퓨터와 사회 프라이버시와 개인 정보 5 The Impact of Computer Technology Secondary Use Using information for a purpose other than the one for which it was obtained. A few examples: Sale (or trade) of consumer information to other businesses Credit check by a prospective employer Government agency use of consumer database Q : Recall an occasion when a secondary use of your personal information was made.

6 컴퓨터와 사회 프라이버시와 개인 정보 6 The Impact of Computer Technology Computer Matching Combining and comparing information from more than one database. Some examples: Sharing of government agencies’ databases to detect fraud by recipients of government programs Creating consumer dossiers from various business databases Q : Recall an example of computer matching that has appeared in the news.

7 컴퓨터와 사회 프라이버시와 개인 정보 7 The Impact of Computer Technology Profiling Using data in computer files to predict likely behaviors of people. Some examples: Businesses engage in profiling to determine consumer propensity toward a product or service. Government agencies use profiling to create descriptions of possible terrorists. Q : How might profiling be used with your personal information?

8 컴퓨터와 사회 프라이버시와 개인 정보 8 The Impact of Computer Technology Monitoring and Tracking Examples: GPS (global positioning system) Cell-phones Blackboxes in automobiles Other wireless appliances Q : What is the impact of GPS-equipped childrens’ wrist watches?

9 컴퓨터와 사회 프라이버시와 개인 정보 9 “Big Brother is Watching You” National Government Databases Purpose: Determine eligibility for jobs and programs Reduce waste Detect fraud Law enforcement Regulations: Privacy Act of 1974 Computer Matching and Privacy Protection Act of 1988 Q : Which government databases contains your personal information?

10 컴퓨터와 사회 프라이버시와 개인 정보 10 “Big Brother is Watching You” 4 th Amendment Expectation of Privacy: Government’s rights are limited. Government must have probable cause to search private premises or seize documents. Privacy Challenges: New sensing and surveillance technologies enable the government access to private premises without physical entry. New technologies provide the government with access to huge amounts of personal data in business databases. Courts allow some searches and seizures of computers without search warrants. Q : Has technology strengthened or weakened the spirit of the 4 th Amendment?

11 컴퓨터와 사회 프라이버시와 개인 정보 11 Consumer Information Consumer Databases Gathering Information: Warranty cards Purchasing records Membership lists Web activity Change-of-address forms Much more… Q : Recall ways in which you have contributed to consumer databases.

12 컴퓨터와 사회 프라이버시와 개인 정보 12 Consumer Information Consumer Databases (cont’d) Limiting Collection, Use, Sharing, and Sale of Personal Data: Consumers can take measures to restrict the use of their personal information. Some information sharing is prohibited by law. Some information sharing is prohibited by published, privacy policies. Q : What measures do you take to limit consumer information gathered about you?

13 컴퓨터와 사회 프라이버시와 개인 정보 13 Consumer Information Marketing: Using Consumer Information Trading/buying customer lists Telemarketing Data Mining Mass-marketing Web ads Spam (unsolicited e-mail) Q : How are children affected by marketers using consumer information?

14 컴퓨터와 사회 프라이버시와 개인 정보 14 Consumer Information Credit Bureaus Uses of consumer information: Evaluate credit risk of applicant. Marketing. Regulation: FCRA (Fair Credit Reporting Act) Self-regulated by privacy principles. Q : If you are denied credit, what are your rights based on the FCRA?


Download ppt "컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology."

Similar presentations


Ads by Google