On-Line Privacy: A Study of the DoubleClick Case Mark Banner Computer Science 99 February 23, 2000.

Slides:



Advertisements
Similar presentations
UNIVERSITÀ DEGLI STUDI DI PAVIA
Advertisements

Respect for All: Digital Footprint. Lesson Objectives: Students will be able to …  Define the term digital footprint and understand how their actions.
Chapter 15: Making Decisions about Computers, Information, and Society Invitation to Computer Science, Java Version, Third Edition.
Invitation to Computer Science 5th Edition
Ethical Issues concerning Internet Privacy 1.  Personal information on the Internet has become a hot commodity because it can be collected, exchanged,
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
17 April Using Technology. Where Can You Use Technology? Product Sales Marketing Operations Finances Salaries Inventory Logistics Analysis Market Customer.
Internet Cookies: Changing Internet Use and Privacy Lindsay Maidment & Katherine Hollander November 8, 2006.
Cloud Computing Lecture #6 Information Policy Jimmy Lin The iSchool University of Maryland Wednesday, October 7, 2008 This work is licensed under a Creative.
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
Cloud Computing and Information Policy: Computing in a Policy Cloud? Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009 This work is.
Toward A Reasonable Programmer Standard Responsibility and Negligence in Software Design.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Chapter 5 E-environment
Data Privacy and Security Prof Sunil Wattal. Consumer Analytics  Analytics with consumer data to derive meaningful insights on actions and behaviors.
Your Apps Are Watching You CS Elliott Peay.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.1 Chapter 3 The Internet macro-environment.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Social Networks Cyberbullying Techno Addiction Digital footprint Spam Internet shopping The positive side Netiquette.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –
Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective.
Read to Learn Define advertising. List types of media that businesses use to reach potential customers.
The DoubleClick controversy and other related issues pertaining to privacy on the Internet.
Digital Citizenship Project. Netiquette Do’s -Read before you post messages. -Try to keep your postings brief and easy to read. -Be kind when others make.
Norton UniversityBusiness Concepts and Social Issues 1 PART TWO Business Concepts and Social Issues.
ETHICS and COMPUTERS An Overview 23/04/2017.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Revision. The Paper Watch out for … Identify and explain Explain with examples Compare and contrast Discuss and justify Marks – figure out the marks.
Ethical Internet Use TECH 503 By A. Greenwell. Ethics in the Virtual World We all grow up learning the rules, regulations, and laws of the real world.
Internet Privacy: What’s Yours and What Never Was 14 April 2011 Ms. Foster and Ms. McCabe Street Law.
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
Chapter 8: Search, Privacy, Government, and Evil By: Marissa Gittelman Tuesday, March CPS 49:Google, the Computer Science within and its Impact.
1/10/ Ethics and Computing Why is Ethics such an issue with computing in particular? Principles of ethics are the same - theft is theft whether using.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
CS 99 Final Paper The Ethics of Privacy in a Digital Economy Jason Gelman.
Lecture 7 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS 1.
CHAPTER 5 ETHICS & PRIVACY.
CISB 412 Social and Professional Issues Final Discussion.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Ethics of Research Ethics deal with a range of moral and immoral choices; Research challenges us to define individual moral principles; Academic researchers.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
ICT GLOBAL ISSUES Information Technology. ICT IN A GLOBAL SOCIETY ▪ Social Issues ▪ Ethical Issues ▪ Legal Issues ▪ Environmental Issues.
Slideroll BY: DALIA LAWRENCE. What is it?  Online slideshow software  Allows people to create video like slideshows and post them on the web  Always.
Facing Facebook: The Reality of Life in a Virtual World Maria Mancusi, Janine Bowen, Courtney Dillon, Nelly Zorilla.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Computer Security Keeping you and your computer safe in the digital world.
Write the Screening Questionnaire GGGE /2014  Steps for developing a screener :  Review the profile to understand users’ backgrounds  Identify.
McLean HIGHER COMPUTER NETWORKING Lesson 10 Ethical Implications Description of ethical implications of networks: Personal privacy Censorhip.
ETHICS Internet And Online Community Week 10.
Computer Security Fundamentals
Chapter 3 The Internet macro-environment
Michael Pawlowski Steven Ritchie
UN vs the Internet Summary
Bigger Picture.
E-Commerce: Doing Business on the Internet
UNIT 4 – THE COST OF FREE LESSON 4.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Internet And Online Community Week 10
Learning Area 1 Information And Communication Technology and Society
UNIT 4 – THE COST OF FREE LESSON 6.
Ethical and Social Issues in Information Systems
INFS 452 – Computer Ethics & Society
How to Stay Safe on the Internet
Presentation transcript:

On-Line Privacy: A Study of the DoubleClick Case Mark Banner Computer Science 99 February 23, 2000

Overview What is the DoubleClick case? Where does the right to privacy come from? Can we apply physical rights to the virtual world? What ethical stance should we take in the DoubleClick case? What are the implications of this point of view?

DoubleClick vs. Harriet Judnick DoubleClick combines online data with other information to enable “targeted” marketing “DoubleClick not only knows where you go online and what you do there but also who you are, where you live, and your phone number.” – Business Week, Feb. 14, 2000, p 38 Judnick is asking that DoubleClick get permission before gathering data and destroy all existing data

The Ethics of Privacy Privacy is not a priori “It is a particular society that determines whether one has the right to look at people in public or private.” – Bernard Gert, Morality p 115 There is a negative-utilitarianism about rights in general and privacy rights in particular

Popular Analogies Man with a camera on a street corner Store surveillance camera Surveyors standing on the street Paparazzi photographers stalking famous figures “Truman show” society

The Problem with Analogies They are never quite close enough to the virtual world They imply that the virtual world functions in the same way as the physical world They deny that rights are a context-based, society-centric phenomena

Privacy in DoubleClick vs. Judnick Is the harm from gathering information greater than the harm from losing the information? Society is leaning towards support of privacy as control of information Anonymous information gathering seems harmless and efficient

What Can Be Done DoubleClick can record information without specific information about the user Gathered information can be kept within the company; subject to legal punishment Internet users can: – Opt-out of their system ( ) – Turn off cookies – Avoid DoubleClick member sites

Implications of Privacy On-Line Who pays for the Internet? The end of “free” services? Increase in number of “useless” ads? Texas stalking case