Chapter 8: Search, Privacy, Government, and Evil By: Marissa Gittelman Tuesday, March 27 2007 CPS 49:Google, the Computer Science within and its Impact.

Slides:



Advertisements
Similar presentations
The Same Sex Marriage Debate
Advertisements

Search, Privacy, Government and Evil “Don’t Be Evil” Ashley Twichell & Emily Lang.
Chapter 14.1 Protecting Individual Rights
The Great Firewall of China INTRODUCTION Gisela Torrentí, Judith Martín & Julia Mabrey.
Managing Incoming Chapter 3 Bit Literacy. Terminology client – program which retrieves s from a mail server, lets you read the mails,
American Political Culture Why don’t people shoot Bill Clinton? Why don’t people shoot Bill Clinton? Why do we pay taxes? Why do we pay taxes? Why don’t.
IGE105 – Communication Technology in a Changing World Dr. Ken Cosh Week 10.
Ethics in a Computing Culture
USA PATRIOT ACT: Is it a legitimate law to protect national security or is it a violation of your Civil Liberties? Essential Question:
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Information Privacy Policy in Canada Presented By: Sue Wu.
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
Natural Rights Philosophy
Basic Principles: Ethics and Business
INTERNET SAFETY Sergeant Karl Youngblood Barbara Burchard Information adapted from the
Left or Right? Caterpillar: “And what are you?” Alice: “ I…I hardly know, sir, just at present—at least I know who I was when I got up this morning, but.
Bell Work: 5/8/13 What is seditious speech? What is prior restraint?
Every Tuesday! Live Real Estate Training 12:00 pm eastern Last 8 Class recordings and power points Lender Partner to help put a plan in place Private Facebook.
Internet regulation International. An issue of ownership Who owns your phone company? What does your phone company own? Who regulates your phone company?
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Copyrights and Wrongs Day 03. Essential Question How can I make responsible choices when I use other people’s creative work (pictures, etc)?
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
Economics: American Free Enterprise Chapter 2 Section 1.
Digital Citizenship: Active Participants in a Digital World.
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
Regulation of Personal Information Sally Brierley & Emma Harvey.
Josh Schmoldt The Data Mining Experts. My project is an investigation of data mining and Google. Hal Niedzviecki’s book “The Peep Diaries: How We’re Learning.
1 Activity 5.3 – Statement 2, page 135 Lise Auffray Ray Reid and Lee Purves.
What Brought the Colonists Together? Notebook Check Everyday!
Internet Safety. Let’s Take Questions First! ● On your notecard, please write down 1- 2 questions you have regarding internet safety.
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
STUDENT JUDICIAL AFFAIRS Balancing the Principals of Natural Justice with Requirements of Privacy Legislation CCSJA March 23, 2006 Harry Davis Deborah.
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
Chapter 19. Laws: rules, enforced by governments 1.Need for Order 2.Protecting Safety and Property 3.Protecting Individual Freedoms 4.Promoting the Common.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
E-Safety. A great place… Image by: Shutterstock/nasirkhan As we have discussed over the last few lessons, the Internet is a great tool for sharing information,
Uncovering the Invisible Web. Back in the day… Students used to research using resources hand-picked by librarians and teachers. These materials were.
INTERNET SAFETY Sergeant Karl Youngblood Barbara Burchard Information adapted from the
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
American Free Enterprise Economics Chapter 3. Basic Principles of Free Enterprise Chapter 3: Section 1.
The Right To Be Forgotten In 2006, the European Union and Argentina put the concept of the right to be forgotten into practice. This issue started from.
ETHICS AND LEGALITIES JOURNALISM. JOBS OF JOURNALISTS POLITICAL FUNCTION – WATCHDOG OF THE GOVERNMENT ECONOMIC FUNCTION – BUSINESS, FARMING, INDUSTRIAL.
Securities vs. Liberties Greg Gough & Ben Paulson Those Who Sacrifice Liberty For Security Deserve Neither-Benjamin Franklin.
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
1 Privacy Lessons from Other Industries Chris Zoladz, CIPP, Vice President, Information Protection Marriott International, President, International Association.
Tara George Amber Gardner Jennifer Shorter. Advantages Many employers run software that searches for offensives words and highlights problematic s.
New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar /UE 141 MMM – Spring 2008 Solving Crimes using Referent.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
By : Jack Kelenjian. Is a career in computers right for me? To determine if a career in computers is right for someone you need to identify what makes.
Political Spectrum: Left Wing vs Right Wing. Belief in Liberal Democracy (liberalism) is a commitment to the individual and the desire to construct a.
When Supreme Court justices narrowly interpret laws and limit their decisions in order to avoid making public policy or attention drawn to the issue Believe.
HW due today- Finish researching a second case Agenda NVCs Warm-up Establishment clause and balancing test Crime and amendments Rights of the accused Objectives.
Created by Lorena Espinoza U.S History Mc-Elmoyl – p. 7.
Cloud computing and government surveillance
The Same Sex Marriage Debate
Ibtesam Cockrell Strategic Management
Silicon Valley’s China Paradox
Impact and the trustee’s role
4th Amendment According to the Fourth Amendment, the people have a right “to be secure in their persons, houses, papers and effects, against unreasonable.
My Digital Footprint.
– Communication Technology in a Changing World
Cloud? Computing? noSQL vs SQL RAID 0,1,5,6,10
The First Amendment and Protecting the Rights of the Accused
Created by Lorena Espinoza U.S History
COSC-100 (Elements of Computer Science) Prof. Juola
Presentation transcript:

Chapter 8: Search, Privacy, Government, and Evil By: Marissa Gittelman Tuesday, March CPS 49:Google, the Computer Science within and its Impact on Society

“This will go on your permanent record” Google knows where you live Reverse directories scare people Google is just making the connection America built on the “right to know” (legal public information) No one used to to look, but now its easy to get information about anyone

Problems arise People trying to sue - but you can’t shoot the messenger Getting personal… When is it too public? Government still isn’t sure where to draw the line Privacy vs. Right to Know Implications of this massive storehouse of identifiable information?

“Search Me” Gmail (1 gigabyte and a search interface) Ads too relevant Concerns…can trace entire web usage Legislatures wanted to ban Gmail in California --- protections instead Hit a nerve

How else can you be tracked and recorded? Google Desktop Search ISP and Universities What if it falls into the wrong hands? Its about trust… Relationship with service provider But do we really know the policies? And trust our providers?

Unreasonable Search? US Patriot Act html html Response to 9/11 Re-hash of Anti-Terrorism Act of 2001? Access to private information Internet, phone tapping What happened to the fourth amendment? endment04/ endment04/

Liberties vs. Security? You wouldn’t even know Times of war Balance between liberties and national security New York’s refusal People should at least be informed Renewal in 2005?

Do No Evil? Brin brushes it off 1984? The ability to know Choicepoint Google informally working with law enforcement? Google’s privacy policy: “We may share [private] information….[if] we conclude that we are required by law or have good faith belief that access, preservation or disclosure of such information is reasonably necessary to protect the rights, property or safety of Google, its users or the public.” Do no evil?

The China Question Censorship The Great Firewall of China China, the hybrid Business vs social responsibility Google in China…it’s complicated… China News

“Do no evil” to “accessory to evil”? People upset with Google But Google had to make a choice… Decided some news better than no news They gave in… Baidu Market Opportunity vs standing up to China “trying to do the most good”

Tough Decision Different kind of company Let people down Core values of freedom, independence, resistance Tough place, supposed to organize information… became moral police Impacting billions of lives

For the next turn of events… Google Goes Public (2004)!