Computer Privacy Paul “The No-Show” Chen Tatsumi Tagawa.

Slides:



Advertisements
Similar presentations
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
Advertisements

Data Mining Finding Useful Patterns in Big Data. What is Data Mining? Looking for useful patterns in large data sets Combines fields like computer science/engineering.
Back to Table of Contents
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
Ethics in a Computing Culture
Lecture to Carleton University, Center for European Studies, December 1, 2010.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
Electronic EDI e-EDI. The EDI has been in use since 1999 using a paper-based system and computerized spreadsheets to collect and manage EDI data. Over.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
How It Applies In A Virtual World
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
Topic: Security / Privacy “Your Apps Are Watching You” Source: The Wall Street Journal Online Presented By: Corey Campbell.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
+ Privacy in the Information Age Year 12, 2012 Lesson 3 January
ITIS 1210 Introduction to Web-Based Information Systems Chapter 43 Shopping on the Internet.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Computer Ethics.
Nilsa Polanco CMP 230 LA01 Meta Search Engine Presentation.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Florida Information Protection Act of 2014 (FIPA).
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
Created by, Author Name, School Name—State FLUENCY WITH INFORMATION TECNOLOGY Skills, Concepts, and Capabilities.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
The DoubleClick controversy and other related issues pertaining to privacy on the Internet.
Module 3 – Security and Privacy SOCIAL MEDIA IN BUSINESS.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Josh Schmoldt The Data Mining Experts. My project is an investigation of data mining and Google. Hal Niedzviecki’s book “The Peep Diaries: How We’re Learning.
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
Social Media And Ethics It is a choice of Professionalism.
Summary: Social Network Data Mining Privacy Community Team CBC News Posted: Nov 27, :55 PM ET Presented by: Group 16.
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
CHAPTER 5 ETHICS & PRIVACY.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
1 Targets and Waste Social Profiling and Your Role as the Consumer.
Patient Portal Website Patient Training Powered by the.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
Goal: By the end of this lesson you should understand how social media are taking away your privacy rights.
KIARA MARSHALL SEMESTER PROJECT EIS 3302 Ethical Problems in E- Businesses.
By Samantha Kozar.  What are social networks?  What is Facebook?  What is Gowalla?  What are the capabilities of these sites?  Privacy Settings 
An objective Cashcrate Review. Can I make money with Cashcrate?
Lecture4 Information Privacy 1-1. Overview Introduction Perspectives on privacy Information disclosures Data mining 1-2.
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Framework of engagement : big data for official use Roy D. Ibay AVP Regulatory PLDT – Smart.
Facebook privacy policy
Take Charge of your Finances
Privacy and the Law.
The Internet Industry Week Two.
Florida Information Protection Act of 2014 (FIPA)
Take Charge of your Finances
Shavonne Henry, Nikia Clarke, David Heymann, Brandon Knight
Legal and Ethical Issues
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Florida Information Protection Act of 2014 (FIPA)
Google Privacy Policy Karen Tao.
Take Charge of your Finances
Presentation transcript:

Computer Privacy Paul “The No-Show” Chen Tatsumi Tagawa

How much information is out there? Let’s search Tatsumi Tagawa in Google and see what shows up

What is Privacy?

Definition of Privacy Privacy is the subjective condition a person experiences when two factors are in place. He or she must have the power to control information about him or herself. He or she must exercise that control consistent with his or her interests and values. Definition from Privacilla.org

Erasing David

"If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place” Eric Schmidt (ex-CEO, Chairman of Board of Google) December 2009 Source: Huffington Post

Surveillance and Data Collection Three arguments made against privacy rights. If you are doing nothing wrong, you shouldn’t worry. Privacy is Overrated. Privacy is no longer valued nor valuable. Collected information have enormous benefits.

Case Study: Medical Technology NASA developed a bio-capsule, which is inserted into your body. It monitors body chemistry and automatically release therapeutic molecules to treat ailments. University of Illinois Urbana-Champaign developed elastic electronics, which can wrap around organs and monitor its status. Both operates without the users’ knowledge. Data can be wirelessly transferred to your doctor. Enormous benefit to your health. But what are the consequences? Source:

Is Privacy a Right? Not mentioned in the Constitution of the US The Fourth Amendment stops the police and other government agents from searching our property without “probable cause.” Does this extend to privacy? Privacy Act of 1974 defines the privacy rights in the US. Does privacy right need to be specifically defined by law? Other Acts, such as the PATRIOT Act, gives government power not allowed by the Privacy Act.

Before we get started today…… A Quote from a Big Name in Computer Privacy

“The problem everyone realized later was the notion that security and privacy were never taken into account back then. Security wasn’t in the original design, so now we’re trying to retrofit something new onto an older system” Eric Santanen (Associate Professor at Bucknell) Fall 2011 Source: Gleisser, Benjamin. “A Case of Taken IDentity” Bucknell Magazine. Bucknell Press. Fall 2011

A couple privacy issues addressed in the media since our last class. “Social apps 'harvest smartphone contacts’” – Twitter and Path admits copying entire address books from smartphones without users knowledge. – It was an “industry best practice” and will “update its privacy policy.” – Other apps (ex. Facebook, Yelp, Foursquare) access the address book. Source: BBC News (Accessed 2/19/2012)

“Google's iPhone Tracking” Google took advantage of a loop-hole in Apple’s Safari browser on Mac and iPhone. Placed tracking cookies by circumventing the default privacy settings in the browser. No indication that any of the sites knew of the code. Google states it was an accident and unintentional. Code originally to provide better Google+ experience. Google blames Safari’s limited functionality. Source: Google's iPhone Tracking. Wall Street Journal. (Accessed 2/19/2012)

This is only some of privacy related news since last week

COMPUTER PRIVACY AND ETHICS

Whose Responsibility? Is the user responsible to know about privacy policies of various services? Are companies responsible to protect consumer privacy? Should the government enact laws protecting them?

Utilitarianism Recap: – Importance of intrinsically valuable goods. – Action is right if it produces an increase in happiness, the ultimate intrinsic good, and wrong if it does not. – Emphasis in the community, not individual

Is Privacy an Instrumental or Intrinsic Good? Is privacy good because of what it leads to? Or Is it good in itself? James Rachel’s argues privacy is instrumental to a diversity of relationships. Changes in the nature of the relationship are a function of the amount of information you exchange to one another.

Social Contract Theory Recap: – State of nature as a state of insecurity and uncertainty. – Human beings “make a contract” with others and give up some of their freedoms in exchange for benefits of cooperation. – Contract must be formed behind a “veil of ignorance.” – Each person should have an equal right to the most extensive basic liberty compatible with a similar liberty for others.

Kantianism Recap: – People in powerful positions should “act so as to treat human beings always as ends and never merely as means”

Case Study: Data collection by Target Target collects information purchases of all customers. All customers are given a Guest ID. Tracked if you use debit/credit card, personalized coupons, etc.) Data is analyzed. Targeted coupons and ads are sent to customers. Target sent a coupon booklet to a teen girl for baby goods based on the pregnancy score; statistical analysis predicts if somebody is pregnant based on their purchase behavior. Girl’s father found out she was pregnant because of it. Data gathering can be beneficial to many people because they would receive coupons for items they intend to purchase & save money Source: How Companies Learn Your Secrets. NYT (Accessed 2/19/2012) How Target Figured Out a Teen Girl was Pregnant Before Her Father. Forbes (Accessed 2/19/2012)

A Peak into Google Privacy Policy Some interesting tidbits: “We may combine the information you submit under your account with information from other Google services or third parties in order to provide you with a better experience and to improve the quality of our services. For certain services, we may give you the opportunity to opt out of combining such information.” Record “information such as your web request, your interaction with a service, Internet Protocol address, browser type, browser language, the date and time of your request and one or more cookies that may uniquely identify your browser or your account,” and “information about your actual location… … or information that can be used to approximate your location.” Google may use these information to “Provide, maintain, protect, and improve our services (including advertising services) and develop new services.”

“People have really gotten comfortable not only sharing more information and different kinds, but more openly and with more people. That social norm is just something that has evolved over time.” Mark Zuckerberg (CEO of Facebook) January 2010 Source: ReadWriteWeb

Is the Age of Privacy Over? We have lost control of our information. Once it resides in a database anywhere, it is impossible to control. It is convenient to have our information accessible in some cases.

There are various practices consumers and service providers can do to control our information better.

Providing transparency Most users are unaware, must be made apparent. Do users care? Make various privacy policies opt-in, not opt-out.

Opt-in vs Opt-out In 2009, Facebook changed the default status to public for those who newly joined. Facebook have an opt-out policy regarding privacy. An opt-in policy gives control to the user. They can click a box called “public” if they want to make their profile public.

Companies adhere to Fair Information Practices Professionalism by IT administrators. An collective commitment to protecting privacy. Adopting a more protective behavior by all IT users. Is this enough? Additional Practices