What is Privacy?. 3 Types of Privacy 1.Accessibility Privacy 2.Decisional Privacy 3.Informational Privacy.

Slides:



Advertisements
Similar presentations
10 July 2003MIS 111 Internet Privacy Laws Jennifer Almond and Colin Zupancic Enjoying the right to privacy means having control over your own personal.
Advertisements

Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
PowerPoint® Slides to Accompany
Slides prepared by Cyndi Chie and Sarah Frye Modified for Auburn University by Cheryl Seals A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
COMP6005 An Introduction to Computing An Introduction to Computing Privacy and Ethical Issues.
Cyberculture and Privacy Baase, Chp 2. Cyberculture and Privacy A.Computers and Privacy Computers are not needed for the invasion of privacy. 1.Computers.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Internet Ethics Presented by: Daniel Wu Kalven Wu.
3 Ethics and Privacy.
1 Business Ethics and Technology Chapter 9 Professor Craig Diamond BA 385 October 28, 2009.
Privacy & Personal Information -- Why do we care or do we?
Privacy, Open Records, and Location Enabled Everything Rick Miller Douglas County, KS MAGIC SYMPOSIUM 2006.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Protecting your money: Identity Theft
Operational Data Tools Chapter Eight. Copyright © Houghton Mifflin Company. All rights reserved.8–28–2 Chapter Eight Learning Objectives To learn database.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
“Breach of Privacy” nPresented by Sumit Yadav. Computer Science and Engineering Computer security Aspects nPrivacy (confidentiality ) n integrity n availability.
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
Ethics Applied to Computerized World “Privacy” (Morality and Machines S. L. Edgar) **** CS575 *** Jules R. NYA BAWEU.
Anonymity, Security, Privacy and Civil Liberties
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
CHAPTER 4 Marketing Information and Research: Analyzing the Business Environment Off-line and Online M A R K E T I N G.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Privacy and Personal Information
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Day 2 – Marketing Research…
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
CS417 SOCIAL AND ETHICAL ISSUES IN COMPUTING Adapted by: Helala AlShehri 1 Original Slides prepared by Cyndi Chie and Sarah Frye”
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Norton UniversityBusiness Concepts and Social Issues 1 PART TWO Business Concepts and Social Issues.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
Privacy and the Market Richard Warner. Three Types of Privacy  Spatial rights define a physical zone of control over intrusions by others.  Decisional.
Computer Ethics Chapter 14 – Computers: Understanding Technology.
Managing the Information Copyright © Texas Education Agency, All rights reserved.
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
4.08 Use of technology in marketing-information management
Privacy and Data Mining What Do “They” Know About You?
Teens lesson fourteen consumer privacy presentation slides 03/08.
1 Ethics of Computing MONT 113G, Spring 2012 Session 29 Privacy.
Gaby Orduna Period 1. Public records contain info about individuals, often very sensitive information. Are accessible electronically Courts and government.
CHAPTER 5 ETHICS & PRIVACY.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy Slides prepared by Cyndi Chie and Sarah Frye.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
Lecture4 Information Privacy 1-1. Overview Introduction Perspectives on privacy Information disclosures Data mining 1-2.
Welcome! The objective of this 43 slide presentation is to: 1. Identify privacy issues associated with technology. 2. Evaluate current technology practices.
College lesson ten consumer privacy presentation slides 04/09.
privacy and information
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Societal Issues in Computing (COMP466)
Computers and Data Collection
A Gift of Fire Third edition Sara Baase
Privacy and Information
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Teens lesson fourteen consumer privacy presentation slides 03/08.
Session 25 INST 301 Introduction to Information Science
A Gift of Fire Third edition Sara Baase
Privacy and Data Mining
Privacy and Data Mining
IT and Society Week 2: Privacy.
Presentation transcript:

What is Privacy?

3 Types of Privacy 1.Accessibility Privacy 2.Decisional Privacy 3.Informational Privacy

Accessibility Privacy Freedom from unwarranted intrusion Inferred from the 4 th Amendment

Decisional Privacy Freedom from external influence in one’s personal choices, plans, decisions – Griswold v. Connecticut (1965) – Roe v. Wade (1973) – in Re Karen Ann Quinlan (late 1970s)

Informational Privacy Control over the flow of our personal information 3 threats: 1.data gathering 2.data exchange 3.data mining

Data Gathering Techniques used to gather information about us, many times without our knowledge or consent Surveillance, employee monitoring, RFID tracking, online tracking, just to name a few

Cookies Used by Web site operators Controversial data collection tool

RFID Used for many things – Automobile keys, cattle, pets, E-ZPass system, passports, credit cards, commercial applications, implanting into humans?, etc.

Government Surveillance “Domestic spying” Does it work?

Data Exchange Computer merging – extracting and combining data from two+ unrelated databases Computer matching – the technology used to merge computerized records to produce matching records

Government Databases Tax records Medical records Marriage and divorce records Property ownership Welfare records School records Motor vehicle records Voter registration records Books checked out of public libraries People with permits to carry firearms Applications for government grant and loan programs Professional and trade licenses Bankruptcy records Arrest records

Data Mining The indirect gathering of personal information through an analysis of patterns in data Can lead to customer profiling Can also be used to protect consumers

Information is a Commodity Organizations sell or exchange information with other organizations. Common way to gather large databases they can mine.

Privacy Online Non-existent? Search engines

National Security Does it justify the reduction in privacy and the erosion of the 4 th Amendment? “The Spy Factory” The USA PATRIOT Act

Monitoring Children For their safety, or an invasion of their privacy?