PRIVACY AND SECURITY (CCI410) PERTEMUAN 5 IR. NIZIRWAN ANWAR, MT

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Ethics in Information Technology, Fourth Edition
Chapter 4 Privacy.
Ethics in Information Technology, Second Edition Updates by Carlotta Eaton, NRCC.
Back to Table of Contents
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Ethics in Information Technology, Second Edition
Ethics in Information Technology Privacy Ethics in Information Technology N. Mlambo 2012.
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
3 Ethics and Privacy.
1 Business Ethics and Technology Chapter 9 Professor Craig Diamond BA 385 October 28, 2009.
INTERNET and CODE OF CONDUCT
Business and Society: Ethics and Stakeholder Management, 5E Carroll & Buchholtz Copyright ©2003 by South-Western, a division of Thomson Learning. All.
E-Commerce: Regulatory, Ethical, and Social Environments
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
CHAPTER 4 Marketing Information and Research: Analyzing the Business Environment Off-line and Online M A R K E T I N G.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
Day 2 – Marketing Research…
Ethics in Information Technology, Second Edition 1 Computer & Society Week 5 Marwan Al-Namari.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
The DoubleClick controversy and other related issues pertaining to privacy on the Internet.
Monitoring Employees on Networks: Unethical or Good Business?
Information Anxiety By Meghan Randinelli. Introduction Greatest problem concerning ethical information technology (IT) is personal privacy Greatest problem.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Managing the Information Copyright © Texas Education Agency, All rights reserved.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Privacy and the Law.
Chapter 9: Internet Law, Social Media, and Privacy
Network and Internet Security and Privacy
Add video notes to lecture
MGMT 452 Corporate Social Responsibility
Chapter 10 Cyberlaw, Social Media, and Privacy
DISTRIBUTED DATABASE TOP DOWN & DESIGN PERTEMUAN 3
PROGRAM STUDI TEKNIK INFORMATIKA FAKULTAS ILMU KOMPUTER
Chapter # 1 Overview of Ethics
Ethics in Information Technology, Second Edition
OFFSHORING ETHICAL ISSUE (CCI410) PERTEMUAN 11 IR. NIZIRWAN ANWAR, MT
DISTRIBUTED DATABASE BOTTOM UP & DESIGN PERTEMUAN 4
MAIL AND SECURITY PERTEMUAN 13
Ethics in Information Technology
PROGRAM STUDI TEKNIK INFORMATIKA FAKULTAS ILMU KOMPUTER
E-Commerce: Regulatory, Ethical, and Social Environments
Societal Issues in Computing (COMP466)
Network and Internet Security and Privacy
SECURITY POLICIES, LAWS AND COMPUTER CRIMES (CCI410) PERTEMUAN 12
ETHICAL ISSUES IN INFORMATION TECHNOLOGY (CCI410) PERTEMUAN 7
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
Essentials of the legal environment today, 5e
Customer Service in a Virtual World
Computer and Internet Crime Privacy
INFS 452 – Computer Ethics & Society
IT and Society Week 2: Privacy.
Presentation transcript:

PRIVACY AND SECURITY (CCI410) PERTEMUAN 5 IR. NIZIRWAN ANWAR, MT PROGRAM STUDI TEKNIK INFORMATIKA FAKULTAS ILMU KOMPUTER

Privacy and Security Systems collect and store key data from every interaction with customers to make better decisions Many object to data collection policies of government and business Privacy Key concern of Internet users Top reason why nonusers still avoid the Internet Reasonable limits must be set Historical perspective on the right to privacy Fourth Amendment reasonable expectation of privacy

Privacy and Security Definition of privacy “The right to be left alone—the most comprehensive of rights, and the right most valued by a free people” Information privacy is a combination of: Communications privacy Ability to communicate with others without being monitored by other persons or organizations Data privacy Ability to limit access to one’s personal data by other individuals and organizations in order to exercise a substantial degree of control over that data and its use

Key Privacy and Anonymity Issues Identity theft Electronic discovery Consumer profiling Treating customer data responsibly Workplace monitoring Advanced surveillance technology

Identity theft Theft of key pieces of personal information to impersonate a person, including: Name Address Date of birth Social Security number Passport number Driver’s license number

Electronic discovery Collection, preparation, review, and production of electronically stored information for use in criminal and civil actions Quite likely that information of a private or personal nature will be disclosed during e-discovery Federal Rules of Procedure define e-discovery processes E-discovery is complicated and requires extensive time to collect, prepare, and review data

Consumer profiling Companies openly collect personal information about Internet users Cookies Text files that a Web site can download to visitors’ hard drives so that it can identify visitors later Tracking software analyzes browsing habits Similar controversial methods are used outside the Web environment

Treating customer data responsibly Strong measures are required to avoid customer relationship problems Companies should adopt: Fair Information Practices 1980 OECD privacy guidelines Federal Trade Commission responsible for protecting privacy of U.S. consumers Chief privacy officer (CPO) Executive to oversee data privacy policies and initiatives

Workplace monitoring Employers monitor workers Protect against employee abuses that reduce worker productivity or expose employer to harassment lawsuits Fourth Amendment cannot be used to limit how a private employer treats its employees Public-sector employees have far greater privacy rights than in the private industry Privacy advocates want federal legislation To keep employers from infringing upon privacy rights of employees

Advanced surveillance technology Camera surveillance Many cities plan to expand surveillance systems Advocates argue people have no expectation of privacy in a public place Critics concerned about potential for abuse Global positioning system (GPS) chips Placed in many devices Precisely locate users Banks, retailers, airlines eager to launch new services based on knowledge of consumer location

KEMAMPUAN AKHIR YANG DIHARAPKAN [1] Mahasiswa diharapkan secara aktif, kreatif dan dapat membangun inovasi dalam menanyakan (diskusi) dalam mengerti dan memahami tentang Privacy and Security