CptS 401 Adam Carter. For Tomorrow's In-Class Activity...  Form into groups of 4  Make sure someone in your group brings a digital camera to class!

Slides:



Advertisements
Similar presentations
CptS 401, Spring2011 2/3/2011 Chapter : Privacy II See Dilbert cartoons about privacy:
Advertisements

HISD Becoming #GreatAllOver. How many hours per day does the average child between the ages of 8 and 18 spend with media and technology? (this includes.
Organizing Your Argument The Argumentative Essay.
News Gathering & the Law The Role of the First Amendment The text of the First Amendment, by its terms, says nothing about a right to gather news or a.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
CptS 401 Adam Carter. Discuss Paper Question 4 Anonymizer.com provides tools and services to A. obtain a new identity. B. send and surf the web.
Privacy 2.3 CptS 401 Adam Carter. Quiz Question 1 Which of the three aspects of privacy discussed in the book does so-called targeted marketing potentially.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
CptS 401, Spring /25/2011 Chapter : Privacy I See Dilbert cartoons about privacy:
CptS 401, Spring /18/2011 Chapter : Themes and Ethics See Dilbert cartoon about questionable ethics:
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Chapter 4.1 – 4.3.3: Intellectual Property I
CptS 401, Fall /31/2010 Chapter : Ethics Case Studies See Dilbert cartoon about questionable ethics:
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
Ethics in a Computing Culture
Cyberculture and Privacy Baase, Chp 2. Cyberculture and Privacy A.Computers and Privacy Computers are not needed for the invasion of privacy. 1.Computers.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
3 Ethics and Privacy.
Scams Stevie's Scam School videos
Internet Filtering : Should libraries filter internet content? Paul M. Schoenhard ’00 CS 99, 00W 7 March 2000.
Privacy After Nixon's resignation, the govt took control of all of his presidential records, including the tapes, in the Presidential Recordings and Materials.
Slide 1 Tomorrow’s Technology and You Chapter 7 Databases and Privacy © 2006 Prentice-Hall, Inc.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
HISD Becoming #GreatAllOver. How many hours per day does the average child between the ages of 8 and 18 spend with media and technology? (this includes.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Privacy Scenarios Set 1 Class Work.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
CptS 401 Adam Carter Section 4.3.
Chapter 22 Issues on the Horizon. New Laws Needed? Technology changing Creating new legal issues Some foreseeable Some unimaginable Always the need to.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Keeping Kids Safe on the Internet John Minelli Educational Technology Specialist Hartford School District
Day 2 – Marketing Research…
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”
Public Records Overview and Case Update: September 11, 2015 presentation Patricia Gleason Special Counsel for Open Government.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
The DoubleClick controversy and other related issues pertaining to privacy on the Internet.
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
Digital Citizenship Project. Netiquette Do’s -Read before you post messages. -Try to keep your postings brief and easy to read. -Be kind when others make.
Information Anxiety By Meghan Randinelli. Introduction Greatest problem concerning ethical information technology (IT) is personal privacy Greatest problem.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Privacy Section 2.2 CptS 401 Adam Carter. Quiz Question 7 According to the book, the following is a provision of the Privacy Act of 1974: A.It requires.
CptS 401 Adam Carter. Question  Which of the following is commonly cited as a benefit to telecommuting? A. Increased productivity B. Higher job satisfaction.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
CptS 401 Adam Carter. Quiz Question 1 According to the book, if we increase the privacy and security of computer technology, we also decrease : A. freedom.
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
Privacy 2.4 CptS 401 Adam Carter. Discuss position paper rubric.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
Databases and Privacy Storing, Organizing and Retrieving Data.
Managing the Information Copyright © Texas Education Agency, All rights reserved.
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
What is Privacy?. 3 Types of Privacy 1.Accessibility Privacy 2.Decisional Privacy 3.Informational Privacy.
CptS 401 Adam Carter. Final Review  Similar structure to the midterm: Multiple choice Matching (probably quotes from Daemon) Essay  Most questions will.
Personal Privacy and the Public Internet John E. Carter Kennesaw State University IT 3700.
Ethical Questions Issues in IT Ethics. What Do You Think? Spammers are just exercising their free speech rights.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
Jessica Prochut Unmanned Aerial Vehicles "Drones".
Ashdell Safer Internet Evening 2014 Prepared and presented by Dawn Pooley.
Importance of Privacy Internet Safety
Societal Issues in Computing (COMP466)
Computers and Data Collection
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Chapter 10: Privacy, Security, and Ethics
A Gift of Fire Third edition Sara Baase
IT and Society Week 2: Privacy.
Presentation transcript:

CptS 401 Adam Carter

For Tomorrow's In-Class Activity...  Form into groups of 4  Make sure someone in your group brings a digital camera to class! Your group can’t get credit for the activity without one. 2

Quiz Question 1 Which of the following is a key aspect of privacy, according to the book: A. Freedom from surveillance B. Control of information about oneself C. Freedom from intrusion D. All of the above 3

Quiz Question 1 Answer D: All of the above (p. 45, 3 bullet points) 4

Quiz Question 2 In a court case discussed in the book, the government asked Google to release people’s search queries in order to crack down on material deemed harmful to minors. Was this be a violation of privacy? A. No, because the search queries can be released without identifying information (“anonymized”) B. No, because it is impossible to link a search query to the person who made the search. C. Yes, because even if the search queries are stripped of identifying information, it is still possible to link some of the queries to the people who made them. D. None of the above. 5

Quiz Question 2 Answer/ Quiz Question 3 (C): “It was not difficult to deduce the identity of some people, especially those who searched on their own name or address. A process called identified others” (p. 49). In this process, one identifies the individual from a set of anonymous data. A. Identity trackingB. Re-identification C. Identity deductionD. Unanonymizing 6

Quiz Question 3 Answer (B) “Re-identification means identifying the individual from a set of anonymous data” (p. 49). 7

Quiz Question 4 According to the book, the collection of personal information about a person without the person’s knowledge is known as A. Invisible information gathering B. Personal data scraping C. Private data surveillance D. Data Mining E. None of the above 8

Quiz Question 4 Answer/ Quiz Question 5 (A): Invisible information gathering (p. 50) Which of the following is a technique used for invisible information gathering? A. Internet Service Provider data logs B. Cookies C. Supermarket club cards D. Event data recorders in cars E. All of the above 9

Quiz Question 5 Answer E: All of the above (see p. 51). Now let’s focus on online behavior… 10

Is Our Online Behavior Private? (Small Group Exercise)  Anything we do online is recorded, at least briefly, and linked to our computer, if not our name.  With your group, identify the benefits and drawbacks of this.  Do you want your online data to be tracked? Is there a way you can prevent your online behavior from being tracked?  Be prepared to discuss your conclusions 11

Online Invisible Information Gathering In the News! Many phone manufacturers (Apple, Google, Microsoft) track and store your location. Is this an invasion of privacy? 12

Quiz Question 6 The following privacy policy requires businesses to obtain explicit consent from a person for each use of the person’s personal information (by, e.g., checking a box): A. Informed consent B. Implied consent C. Opt in D. Opt out E. None of the above 13

Quiz Question 6 Answer C: Opt-in (p. 53). What about when people use an internet site that provides a free service with no explicit end-user agreement? What would be a reasonable business policy in this case? 14

Privacy Case Study 1 (Clicker) Ex. 2.9, p. 130: A company that supplies filtering software to schools to block access to objectionable websites sold statistical data about the websites visited by school children. The data did not identify the children or individual schools. Was this a privacy violation? A. Yes B. No C. Unsure Why or why not? Discuss with group for 5 min.; apply ethical frameworks and privacy principles on p

Privacy Case Study 2 (Clicker) Ex. 2.14, p. 130: People who fled hurricane Katrina left behind and lost important documents and records such as birth certificates, credit cars, property records, and employment records. A U.S agency proposed a new database where people could voluntarily store essential personal records in case of natural disasters. Is this a good idea? A. Yes B. No C. Unsure Discuss pros and cons with group for 5 min.; apply ethical frameworks and privacy principles on p

Privacy Case Study 3 (Clicker) Ex. 2.16, p. 131: A city government wants to track down people who run small businesses and do not pay the city’s $125 business license fee. The city hired a private detective to obtain IRS tax records of city residents and determine who has reported small- business income to the IRS but paid the license. Should this action by the city be permitted? A. Yes B. No C. Unsure Discuss arguments for and against with group for 5 min.; apply ethical frameworks and privacy principles on p

Case Study: Warfare with Unmanned Drones One of the segments in Digital Nation explored the U.S. military’s use of unmanned drones to carry out military operations overseas. From the comfort of a sophisticated control room on a military base on U.S. soil, pilots carry out reconnaissance missions and bomb targets overseas. Drones have been known unintentionally to strike innocent people. Is it ethical for the military to operate unmanned drones? 18

Case Study: Unmanned Drones (Clicker Poll) Is it ethical for the military to operate unmanned drones? A. Yes B. No C. Not sure 19

Case Study: Computer Game Addiction As reported in Digital Nation, many youths in spend inordinate amounts of time playing video games. They play so much that their educations and social relationships suffer. Should the government establish restrictions on gaming for minors? If so, what kinds of restrictions? How would they be enforced? 20

Case Study: Computer Game Addiction (Clicker Poll) Should the government establish restrictions on gaming for minors? A. Yes B. No C. Not sure 21

Case Study III (Discuss with Group) 1. A man sued his health insurance company because it would not pay for Viagra, a drug for treating male impotence. He argued that the insurer’s refusal to pay denied his right to a happy sex life. A. Negative (claim) right B. Positive (liberty) right C. A mix of the two 22

Case Study IV (Discuss with Group) 2. Two legislators who ran for reelection lost. They sued an organization that sponsored ads criticizing their voting records. The former legislators argued that the organization interfered with their right to hold office. A. Negative (claim) right B. Positive (liberty) right C. A mix of the two 23