CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”

Slides:



Advertisements
Similar presentations
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
Advertisements

Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Chapter 9: Privacy, Crime, and Security
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
PowerPoint® Slides to Accompany
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Slides prepared by Cyndi Chie and Sarah Frye Modified for Auburn University by Cheryl Seals A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Technological Implications for Privacy David Kotz Department of Computer Science Dartmouth College
Cyberculture and Privacy Baase, Chp 2. Cyberculture and Privacy A.Computers and Privacy Computers are not needed for the invasion of privacy. 1.Computers.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
A Gift of Fire Fourth edition Sara Baase
Privacy as an International Information Issue MD823 October 18, 2004.
CS4020 Privacy L. Grewe What We Will Cover Privacy and Computer Technology “Big Brother is Watching You” Privacy Topics Protecting Privacy Communications.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
How It Applies In A Virtual World
Chapter 10: Authentication Guide to Computer Network Security.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
IS 490 Notes for Baase Textbook, Chapter 2. Check the Homework Page for the weekly assignment (it's due next Monday). Go to the Angel Page for this course,
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
A Gift of Fire Third edition Sara Baase
Data Privacy and Security Prof Sunil Wattal. Consumer Analytics  Analytics with consumer data to derive meaningful insights on actions and behaviors.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Staying Safe Online Keep your Information Secure.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Privacy and Personal Information
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Privacy BBA361 Business Ethics and Corporate Governance Lecture 4 Department of Business Administration Chapter 6, “Ethics and the Conduct of Business”,John.
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Protecting Students on the School Computer Network Enfield High School.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
ITGS Databases.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
What is Privacy?. 3 Types of Privacy 1.Accessibility Privacy 2.Decisional Privacy 3.Informational Privacy.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
CHAPTER 5 ETHICS & PRIVACY.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Privacy and the Law.
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Societal Issues in Computing (COMP466)
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Privacy and Information
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Other Sources of Information
Chapter 10: Privacy, Security, and Ethics
A Gift of Fire Third edition Sara Baase
Computer Security Social Legal and Ethical issues
A Gift of Fire Third edition Sara Baase
INFS 452 – Computer Ethics & Society
IT and Society Week 2: Privacy.
Presentation transcript:

CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”

INTRODUCTORY PREVIEW TO THE DEVELOPMENTS, ISSUES, THEMES AND ETHICS. Chapter 2: Privacy 2

Outline Privacy and Computer Technology Terminology and principles for data collection and use Big brother is watching you Protecting Privacy 3

PRIVACY AND COMPUTER TECHNOLOGY 4

Introduction Three key aspects of privacy: 5 Freedom from intrusion (being left alone) Control of information about oneself Freedom from surveillance (being tracked, followed, watched)

New Technology, New Risks: 6 Government and private databases Incredible capacity at low cost Detailed information previously not collected Sophisticated tools for surveillance and data analysis Powerful search and analysis tools can use data to track movements and develop personal profiles Search query examples?

TERMINOLOGY AND PRINCIPLES FOR DATA COLLECTION AND USE 7

Invisible Information Gathering Collection of personal information about someone without the person’s knowledge Invisible information gathering is common on the Web: ISPs (Internet Service Provider) and websites can collects such details of the users online activities. 8

HTTP cookies web cookie, or browser cookie small pieces of textual information stored by websites on your computer login information, the contents of your basket on shopping sites, etc. the data stored in the cookie is sent back to the website by the browser authentication cookies are used by websites to know whether the user is logged in or not tracking cookies can compile long-term records of individuals' browsing histories 9

Secondary use Secondary use: Use of personal information for a purpose other than the one it was provided for. Info sold to marketers Organization member lists Vehicle registrations Data mining: Searching and analyzing masses of data to find patterns and develop new information or knowledge Large databases Use to develop business strategies 10

Secondary use Computer matching: Combining and comparing information from different databases Using social security number, for example, to match records Acts as primary key to identify your records in multiple databases Computer profiling: analyzing data in computer files to determine characteristics of people most likely to engage in certain behavior Valid / effective?? Identify “people to watch”? Data mining, computer matching, and computer profiling are examples of secondary use of personal information. 11

Principles for data collection and use Informed Consent: Tell people what you intend to do with their data Obtain consent, or not Opt-in and opt-out policies: Allow people to allow or deny use Opt-in: You have to say that you want in; Otherwise, by default, you are automatically out. Opt-out: You have to say that you want out; Otherwise, by default, you are automatically in. 12

Principles for data collection and use Fair Information Principles (or Practices) 13 Inform people when personal data is collected Collect only data needed Offer opt-out option for secondary uses of information Provide strong protection for sensitive data –i.e. medical info Keep data only as long as needed Maintain accuracy and provide means for correction Protect security of data from theft & accidental disclosure Develop policies for responding to law enforcement requests for data Inform people when personal data is collected Collect only data needed Offer opt-out option for secondary uses of information Provide strong protection for sensitive data –i.e. medical info Keep data only as long as needed Maintain accuracy and provide means for correction Protect security of data from theft & accidental disclosure Develop policies for responding to law enforcement requests for data

Discussion Topics What We Do Ourselves: Personal information in blogs and online profiles Pictures of ourselves and our families File sharing and storing National ID System Is privacy old-fashioned? –Young people put less value on privacy than previous generations –May not understand the risks

BIG BROTHER IS WATCHING YOU 15

Government Databases Government Databases: 16 Public library records Firearms permits Applications to gov’t programs Professional & trade licenses Bankruptcy records Arrest / criminal history records Taxes –employer, dependants, status Medical –Medicare, military Marriage / Divorce Property ownership Government aid –includes family info School records –includes psych tests Motor vehicle –personal info Small Sampling of Governments Databases with Personal Information

Government Databases Scope of government activities is ubiquitous Government & its agencies are coercive by nature “Requests” for info viewed more as demands Potential for abuse of info is high High standard of privacy protection seems appropriate? 17

Government Databases Privacy Act of 1974: Applies to agencies of the US federal government Enacted in response to government abuse of personal information Provisions include: Collect only data “relevant & necessary” to authorized purpose Publish notice of database existence in Federal Register Allow review and correction of errors Responsible for ensuring the security of data Prohibit disclosure without consent (with exceptions) 18

Government Databases Burden of proof and "fishing expeditions”: Traditionally: crime > evidence > suspect Probable cause required for search Database searches identify “suspicious” people, then look for crime Presumption of guilt VS presumption of innocence? Data mining and computer matching to fight terrorism After 9-11, people more willing to trade privacy for safety. Government given more access to personal information for data mining and profiling 19

PROTECTING PRIVACY Technology, Market, Rights, and Laws 20

Technology and Markets Privacy-enhancing technologies for consumers: Cookies disablers and alerts Block pop-ups software Free anti-Spyware. Anonymizer. Websites restrictions options (family, friends). 21

Self-destructs 22

Public-key cryptography Encryption: Transforms data into a form that is meaningless to anyone. Usually contains coding scheme and keys. Keys: wnbsuqiomnlpaevzrtycxjhgfd! More advanced mathematical technique 23

13.24 Digital Signature A digital signature needs a public-key system. The signer signs with her private key; the verifier verifies with the signer’s public key.

Technology and Markets Business tools and policies for protecting personal data A well designed database should have several features to protect against leaks, intruders, and unauthorized employee access: 25 A unique password and identifier for each person with authorized access Restricting users from performing certain operations. Audit trail: Keeps track of information about each access, including the ID of the person looking at record and the information viewed or modified.

Free Market View Freedom of consumers to make voluntary agreements Informed consent People should be allowed to “sell” their info, if they choose Expect consumer to exercise good judgment Assumes business will act responsibly Response of the market to consumer preferences 26

Consumer Protection View Consumers need protection from their own lack of knowledge, judgment, or interest We are easily deceived –protect us from our naivety Uses of personal information Unintended or secondary uses & their consequences Costly and disruptive results of errors in databases More stringent consent and regulation on collection and use of personal information Ease with which personal information leaks out 27

Discuss one of Topics w.r.t. Privacy Pros and Cons Targeted marketing Data mining Paying for consumer information Data firms and consumer profiles Credit cards Global Positioning Systems (GPS) -computer or communication services that know exactly where a person is at a particular time Cell phones and other devices are used for location tracking

Protecting Privacy Privacy Regulations in the European Union (EU): Data Protection Directive More strict than U.S. regulations Abuses still occur Puts requirements on businesses outside the EU