DOC PREVIEW
Texas State CS 2315 - Privacy

This preview shows page 1-2-3-4 out of 12 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Privacy• What are privacy concerns?• Why is privacy important?• How does cybertechnology impact privacy?• How do we protect privacy?• General privacy concerns involving cybertechlology im-pact everyone, regardless of computer use• Are cyberprivacy concerns unique or special?– not new, but aggravated– technology has affected∗ accuracy and amount of information∗ speed of transmission∗ length of retention∗ kind of information that can be transmittedWhat is privacy?• repository of personal informationcan be diminshed• a spatial zonecan be invaded• confidentiality or trustcan be violatedDistinguish having privacy (descriptive) from having a rightto privacy (normativeThree views of privacy• Freedom from intrusion– 1890 first explicit reference as a legal right– prompted by the use of cameras– may be implied by Fourth Amendment (protectionfrom unreasonable searches and seizures)• Freedom from interference in personal affairs– decisional privacy– right not to be interfered with– contraception, abortion, right to die, euthanasia• Access and control of personal information– informational privacy– who has access to personal information?– to what extent can an individual control the ways inwhich information can b e gathered, stored, mined,combined, exchanged or sold?An individual has privacy in a situation if he is protected fromintrusioin, interference, and information access by others.Differentiate between a loss of privacy and a violation of pri-vacy.• hiking alone in the woods– no expectation or right to privacy– privacy can be lost but not violated• surveillance camera hidden in a dorm room– privacy is protected by laws or policies– privacy is violatedPrivacy as a Value• not a universal value• problem for laws and policies in cyberspace• necessary means to trust and friendship (more than in-strumental)• desired for its own sake? no.• expression of the core value security• essential for autonomy, freedom and independence• provides social value – necessary for democracyData Gathering• not new• cybertech allows it w it hout the knowledge and consentof the person• data monitoring and recording– wiretapping, store video cameras, tollbooth scanners– workplace monitoring, website monitoring, ”click-streams”• cookies– information is gathered and stored on user’s com-puter without his knowledge– information can be combined from multiple sources– defense: cookies can be disabled– default is to accept• RFID tags– microchip + reader– intended to ID objects and track inventory– can monitor after sale– autos, clothing, cattle, dogs, humans– Bill of Rights∗ know if product contains tags∗ have tags removed or disabled on purchase∗ know when, where, and why tags are being read• government surveillance– domestic syping– threat to privacy and civil liberty– gps chips mandated in cell phones since 2005– monitor email– subpoena records of online search requests– also used to combat crime and terrorism– issues of privacy and civil libertyMerging and Matching Records• collection, exchange and sale of personal data violatesprivacy• merging is the technique of extracting information fromtwo or more unrelated databases and integrating infor-mation• giving information to an organization is not violation ofprivacymerging multiple sets of infofmation without conse nt i sa violation• matching is cross checkingn records in two or more un-related databases for matches or hits.• used to produce lists of potential lawbreakers• problem: maatch the innocent as well as the guilty• information is given to each database with consent, butmatching is done without consentData Mining• indirect gathering of personal information through ananalysis of implicit patterns discoverable in data• can generate new, non-obvious classifications to whichand individual can be linked• no legal protection with respect to how this informationcan be used• raises special concerns• threat to privacy• laws and informal guidelines protect information that isexplicit, confidential and exchanged among databases.Information extracted by data mining may be none ofthese.Personal Information in Public• personal data exists in databases and can be merged,matched or mined – not public• personal data can be mined from internet transactionsand webpages – public• should the re be legal protection for public personal data?• search engines and privacy– each request is logged– users can gather information about people• public records are often online or are sold and placedonlineshould governments sell data?Privacy Enhancing Tools• protect privacy and personal information of users en-gaged on online activities• compromise between l eg islat io n and industry self regula-tion• email encryption, Anonymizer.com , trust marks• issues of consumer education, info rm ed consent, and so-cial equityLegislation and Industry Self-Regulation• W3C – Platform for Privacy Preferences• TRUSTe– trust engine• 1974 Privacy Act• 2003 HIPAA– medical only• Patriot Act• FISA• EU Directive on Data


View Full Document

Texas State CS 2315 - Privacy

Download Privacy
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Privacy and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Privacy 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?