컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.

Slides:



Advertisements
Similar presentations
Background Credit reporting agencies are a key player, helping facilitate modern commerce Credit records help predict the risk of a transaction Credit.
Advertisements

Ethical Issues concerning Internet Privacy 1.  Personal information on the Internet has become a hot commodity because it can be collected, exchanged,
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Privacy Chris Kelly iLaw July 5, 2002.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
PowerPoint® Slides to Accompany
Slides prepared by Cyndi Chie and Sarah Frye Modified for Auburn University by Cheryl Seals A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
COMP6005 An Introduction to Computing An Introduction to Computing Privacy and Ethical Issues.
Cyberculture and Privacy Baase, Chp 2. Cyberculture and Privacy A.Computers and Privacy Computers are not needed for the invasion of privacy. 1.Computers.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
4.1 © 2007 by Prentice Hall 4 Chapter Ethical and Social Issues in Information Systems.
A Gift of Fire Fourth edition Sara Baase
3 Ethics and Privacy.
Privacy & Personal Information -- Why do we care or do we?
CS4020 Privacy L. Grewe What We Will Cover Privacy and Computer Technology “Big Brother is Watching You” Privacy Topics Protecting Privacy Communications.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
IS 490 Notes for Baase Textbook, Chapter 2. Check the Homework Page for the weekly assignment (it's due next Monday). Go to the Angel Page for this course,
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
9/4/20151 Computer Security Social Legal and Ethical issues.
Data Privacy and Security Prof Sunil Wattal. Consumer Analytics  Analytics with consumer data to derive meaningful insights on actions and behaviors.
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Privacy and Personal Information A supplementary guide to a complex and controversial social phenomenon.
Privacy and Personal Information
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Day 2 – Marketing Research…
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
14.1 Chapter 14 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
What is Privacy?. 3 Types of Privacy 1.Accessibility Privacy 2.Decisional Privacy 3.Informational Privacy.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
Chapter 6 Sports Market Research and Outlets. Objectives Define market research. Explain how businesses use market research. Identify the steps used in.
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Personal Selling and Direct Marketing
Privacy and the Law.
Personal Selling and Direct Marketing
Personal Selling and Direct Marketing
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Societal Issues in Computing (COMP466)
Computers and Data Collection
A Gift of Fire Third edition Sara Baase
Privacy and Information
Ethical and Social Issues in Information Systems
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Other Sources of Information
Computer Programming I
Computer Security Social Legal and Ethical issues
A Gift of Fire Third edition Sara Baase
IT and Society Week 2: Privacy.
Presentation transcript:

컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과

컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology “Big Brother is Watching You” Consumer Information More Privacy Risks Protecting Privacy: Education, Technology, and Markets Protecting Privacy: Law and Regulation

컴퓨터와 사회 프라이버시와 개인 정보 3 The Impact of Computer Technology Computers are not needed for the invasion of privacy. Computers simply make new threats possible and old threats more potent. Privacy can mean: Freedom from intrusion Control of information about oneself Freedom from surveillance

컴퓨터와 사회 프라이버시와 개인 정보 4 The Impact of Computer Technology Invisible Information Gathering Examples: Satellite surveillance Caller ID 080- or 900-number calls Loyalty cards Web-tracking data; cookies Peer-to-peer monitoring Others… Q : Recall an example of invisible information gathering about you.

컴퓨터와 사회 프라이버시와 개인 정보 5 The Impact of Computer Technology Secondary Use Using information for a purpose other than the one for which it was obtained. A few examples: Sale (or trade) of consumer information to other businesses Credit check by a prospective employer Government agency use of consumer database Q : Recall an occasion when a secondary use of your personal information was made.

컴퓨터와 사회 프라이버시와 개인 정보 6 The Impact of Computer Technology Computer Matching Combining and comparing information from more than one database. Some examples: Sharing of government agencies’ databases to detect fraud by recipients of government programs Creating consumer dossiers from various business databases Q : Recall an example of computer matching that has appeared in the news.

컴퓨터와 사회 프라이버시와 개인 정보 7 The Impact of Computer Technology Profiling Using data in computer files to predict likely behaviors of people. Some examples: Businesses engage in profiling to determine consumer propensity toward a product or service. Government agencies use profiling to create descriptions of possible terrorists. Q : How might profiling be used with your personal information?

컴퓨터와 사회 프라이버시와 개인 정보 8 The Impact of Computer Technology Monitoring and Tracking Examples: GPS (global positioning system) Cell-phones Blackboxes in automobiles Other wireless appliances Q : What is the impact of GPS-equipped childrens’ wrist watches?

컴퓨터와 사회 프라이버시와 개인 정보 9 “Big Brother is Watching You” National Government Databases Purpose: Determine eligibility for jobs and programs Reduce waste Detect fraud Law enforcement Regulations: Privacy Act of 1974 Computer Matching and Privacy Protection Act of 1988 Q : Which government databases contains your personal information?

컴퓨터와 사회 프라이버시와 개인 정보 10 “Big Brother is Watching You” 4 th Amendment Expectation of Privacy: Government’s rights are limited. Government must have probable cause to search private premises or seize documents. Privacy Challenges: New sensing and surveillance technologies enable the government access to private premises without physical entry. New technologies provide the government with access to huge amounts of personal data in business databases. Courts allow some searches and seizures of computers without search warrants. Q : Has technology strengthened or weakened the spirit of the 4 th Amendment?

컴퓨터와 사회 프라이버시와 개인 정보 11 Consumer Information Consumer Databases Gathering Information: Warranty cards Purchasing records Membership lists Web activity Change-of-address forms Much more… Q : Recall ways in which you have contributed to consumer databases.

컴퓨터와 사회 프라이버시와 개인 정보 12 Consumer Information Consumer Databases (cont’d) Limiting Collection, Use, Sharing, and Sale of Personal Data: Consumers can take measures to restrict the use of their personal information. Some information sharing is prohibited by law. Some information sharing is prohibited by published, privacy policies. Q : What measures do you take to limit consumer information gathered about you?

컴퓨터와 사회 프라이버시와 개인 정보 13 Consumer Information Marketing: Using Consumer Information Trading/buying customer lists Telemarketing Data Mining Mass-marketing Web ads Spam (unsolicited ) Q : How are children affected by marketers using consumer information?

컴퓨터와 사회 프라이버시와 개인 정보 14 Consumer Information Credit Bureaus Uses of consumer information: Evaluate credit risk of applicant. Marketing. Regulation: FCRA (Fair Credit Reporting Act) Self-regulated by privacy principles. Q : If you are denied credit, what are your rights based on the FCRA?