DOC PREVIEW
UW CSE 303 - Societal Implications

This preview shows page 1-2-3 out of 9 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

'&$%CSE 303:Concepts and Tools for Software DevelopmentHal PerkinsAutumn 2007Lecture 10— Societal Implications: Data Ownership & PrivacyCSE303 Autumn 2007, Lecture 10 1'&$%Why are we doing this?An educated computer-scientist should think about the broaderimplications of what they do.Conversely, people not trained in computer-science may not beequipped to make ethical / practical decisions about relevanttechnology.There are a million topics we could pick; data ownership and use istimely, given the discussion of RFID and the ORCA card, amongothers. . . .10% of your grade: a short paper on topic(s) we discuss or somethingrelated; more information later.CSE303 Autumn 2007, Lecture 10 2'&$%The planI’ll share 5–10 minutes of thoughts, overview, examples, and questions.We’ll divide into groups of 5–8 for 20 m inutes.• Discuss questions of interest• Bring up new e xamples (preferred) or discuss existing ones• Pick a speaker to report back (1 minute)We’ll reconve ne for whole-class discussion• (1-minute presentations will guide us)CSE303 Autumn 2007, Lecture 10 3'&$%A Day in the Life• You buy groceries and prese nt your “club card” to get the“discount”– What you bought, and when, is logged with your “c lub” id• You log on to Amazon; they suggest things you might want basedon your previous history, you buy some thing• You s earch for “amazons” on Google– Your IP address, the time , and the query are logged• You use your new ORCA pass to ride the bus, light rail, ferry, . . .– The time and location of your trip is logged• You use your bankcard to buy something– The details are logged and used to debit your acc ountTheme: Trading information (& privacy) for convenienceCSE303 Autumn 2007, Lecture 10 4'&$%Your Online Life• You post information on your UW webpage– The university (e.g., Wa. s tate) owns the computers; is it theirdata?• You post all sorts of information on Facebook– Other people post comments on your pages• You post a video clip to YouTube– Someone claims that it’s theirs– YouTube takes it down for copyright infringement• The things you post are scanned and indexed by Google, others– Everything on the web live s foreverTheme: Who’s data is it? Who controls it?CSE303 Autumn 2007, Lecture 10 5'&$%Simple (?) Questions• What data should be publicly available?• What should be stored about w here use rs web-surf?• Who should be to blame when the w rong data / surf-historiesbecom e known?• Can data be used for unanticipated purposes once it’s beencollected? (e.g., data mining)• Can s ome one associated with data require that it becorrected/delete d? Who decides?• Can an organization operate effect ively if it does or doesn’tcontrol data it c ollect s or use s?CSE303 Autumn 2007, Lecture 10 6'&$%Data Content• Is it clear “who c ontrols” a web-site? Should it be?• My homepage, but on a government site.• Search engines copy other possibly illegal (in what country?) sites.• YouTube, Facebook, Flickr, ... post strangers’ content.• What if gmail or Google Calendar “got hacked”?A universal dilem ma: replication increase s rec overy (backups) anddecreases security.Anachronistic laws? Is “who owns the hard-drive” the point? If not,then what is?CSE303 Autumn 2007, Lecture 10 7'&$%Surfing / Search-query privacy• Search for “drug rehab”, “domestic-violence s helter” or “how tomake a bomb”, “child pornography”• Jealous ex-S.O. snooping IM or parent snooping 8-year-old’s IM• Amazon s uggesting “similar products” or totalitarian regimefinding buyers of “banned books”• Search-query personalization (jaguar the car) or like a securitycamera (everything you se arch for)• Employers have right to ensure productivity and network-securityor employees have right to “close the door”.A universal dilem ma: data can improve user-experience , but oncecollected can be used for other purposes.Is there a “be st answer” for all/most web-sites or networks? How cana user / site prote ct him/he r/itself?CSE303 Autumn 2007, Lecture 10 8'&$%More Questions1. How res ponsible is the “e quipment owner” for content?2. Does a “big site” have greater obligations than a “small site”?3. What bounds should there be on “terms of service” for web sites?Should you read them?4. What control should you have over data about you?5. Do technical solutions (passwords, log-dele tion, ...) help or is this“just” a legal/ethical issue?6. How long should data be kept? Who should decide that?7. How m uch privacy would you give up for “something really cool”?8. How have data privacy issues c hanged in the last 5 years? Howmuch is technical? Social?9. ...CSE303 Autumn 2007, Lecture 10


View Full Document

UW CSE 303 - Societal Implications

Documents in this Course
Profiling

Profiling

11 pages

Profiling

Profiling

22 pages

Profiling

Profiling

11 pages

Testing

Testing

12 pages

Load more
Download Societal Implications
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Societal Implications and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Societal Implications 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?