DOC PREVIEW
UW CSE 303 - Lecture Notes

This preview shows page 1-2-3 out of 9 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

'&$%CSE 303:Concepts and Tools for Software DevelopmentHal PerkinsSpring 2008Lecture s1— Societal Implications: Data Ownership & PrivacyCSE303 Spring 2008, Lecture s1 1'&$%Why are we doing this?An educated computer-scientist should think about the broaderimplications of what they do.Conversely, people not trained in computer-science may not beequipped to make ethical / practical dec isions about relevanttechnology.There are a million topics we could pick; data ownership and use istimely, (see electronic highway tolls, RFID, data mining, . . . ).10% of your grade: a short paper on topic(s) we disc uss or somethingrelated; more information later.CSE303 Spring 2008, Lecture s1 2'&$%The planI’ll share 5–10 minutes of thoughts, overview, examples, and questions.We’ll divide into sm all groups for 20+ minutes.• Discuss questions of interest• Bring up new examples (preferred) or discuss existing ones• Pick a speaker to report back (1 minute)We’ll rec onvene for whole- class discussion• (1-minute prese ntations will guide us)CSE303 Spring 2008, Lecture s1 3'&$%A Day in the Life• You buy groceries and use your “club card” to get the “discount”– What you bought, and when, is logge d with your “club” id• You log on to Amazon; they suggest things you m ight want basedon your previous history, you buy something• You s earch for “amazons” on Google– Your IP address, the tim e, and the query are logged• You use your new ORCA pass to ride t he bus, light rail, ferry, or• You use the HOT toll lanes or the new Tacoma narrows bridge . . .– The time and location of your trip is logged• You use your bankcard to buy something– The details are logged and used to debit your acc ountTheme: Trading information (& privacy) for convenienceCSE303 Spring 2008, Lecture s1 4'&$%Your Online Life• You post information on your UW webpage– The university (e.g., Wa. state) owns the c omputers; is it theirdata?• You post all sorts of information on Facebook– Other people post comments on your pages• You post a video clip to YouTube– Someone claims that it’s theirs– YouTube takes it down for copyright infringement• The things you post are sc anned and indexed by Google, others– Everything on the we b lives foreverTheme: Who’s data is it? Who controls it?CSE303 Spring 2008, Lecture s1 5'&$%Simple (?) Questions• What data s hould be publicly available?• What should be stored about where users we b-surf?• Who should be to blame when t he wrong data / surf-historiesbecome known?• Can data be used for unanticipated purposes once it’s beencollected? (e.g., data mining)• Can s ome one associated with data require that it becorrected/dele ted? Who decides?• Can an organization operate effective ly if it does or doesn’tcontrol data it collects or uses?CSE303 Spring 2008, Lecture s1 6'&$%Data Content• Is it clear “w ho controls” a web-site? Should it be?• My homepage, but on a government site.• Search engines copy other possibly illegal (in what country?) sites.• YouTube, Facebook, Flickr, ... post strangers’ content.• What if gmail or Google Calendar “got hacked”?A universal dilemma: replication increases recovery (backups) anddecreases security (privacy).Anachronistic laws? Is “who owns the hard-drive” the point? If not,then what is?CSE303 Spring 2008, Lecture s1 7'&$%Surfing / Search-query privacy• Search for “drug rehab”, “domestic-violence she lter” or “how tomake a bomb”, “child pornography”• Jealous ex-S.O. snooping IM or parent snooping 8-year-old’s IM• Lawyers can subpoena highway toll records in divorce cases• Amazon s uggesting “s imilar products” or totalitarian regimefinding buyers of “banned books”• Employers have right to ensure productivity and network-securityor employees have right to “clos e the door”A universal dilemma: data can improve user-experience, but oncecollected can be used for other purposes.Is there a “best answer” for all/most web-sites or networks? How cana user / site protect him/her/itself?CSE303 Spring 2008, Lecture s1 8'&$%More Questions1. How res ponsible is the “equipment owner” for c ontent?2. Does a “big site” have greater obligations than a “small site”?3. What bounds should there be on “terms of service” for web sites?Should you read them?4. What c ontrol should you have over data about you?5. Do technical solutions (passwords, log-deletion, ...) help or is this“just” a legal/ethical issue?6. How long should data be kept? Who should decide that?7. How m uch privacy would you give up for “something really cool”?8. How have data privacy issues changed in the last 5 ye ars? Howmuch is technical? Social?9. ...CSE303 Spring 2008, Lecture s1


View Full Document

UW CSE 303 - Lecture Notes

Documents in this Course
Profiling

Profiling

11 pages

Profiling

Profiling

22 pages

Profiling

Profiling

11 pages

Testing

Testing

12 pages

Load more
Download Lecture Notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture Notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture Notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?