1 / 17

Robert Crawford, MBA West Middle School

Introduction to computers and Information Technology Chapter 33, Issues for Computer Users Lesson 33-1, Privacy Online. Robert Crawford, MBA West Middle School. UNIT O BJECTIVES. Summarize the danger of sharing personal information on the internet.

iria
Download Presentation

Robert Crawford, MBA West Middle School

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction to computers and Information TechnologyChapter 33, Issues for Computer UsersLesson 33-1, Privacy Online Robert Crawford, MBA West Middle School

  2. UNIT O BJECTIVES • Summarize the danger of sharing personal information on the internet. • Explain how cookies and global unique identifiers endanger privacy. Essential Question What are some of the threats to our privacy online?

  3. KEY TERMS • Global Unique Identifier (GUID) • Infringe In book, but not listed as a key term (these are the ones you need to write down) : • Cookie Not in book: • Digital Footprint

  4. Before we go too far in this unit • What is Privacy? • I will provide a couple of definitions: noun • the state or condition of being free from being observed or disturbed by other people. • the state of being free from public attention.

  5. Privacy in Cyberspace Page 452 • We share information both: • Knowingly • Unknowingly

  6. How Businesses Obtain Personal Information (pg. 452) • Sources Include: • Public Records • Directly from the individual • Website registration • Online Purchases • Warranty Registration • Sweepstakes Entries • This information is then, often, sold to other companies, such as marketing companies. • The information is also saved, forming your “digital footprint.”

  7. Digital Footprint (not in text) • Digital Footprint (not in text) • A digital footprint is the data that is left behind by users on digital services. • There are two main classifications for digital footprints: passive and active. • A passive digital footprint is created when data is collected without the owner knowing • An active digital footprint is created when personal data is released deliberately by a user for the purpose of sharing information about oneself by means of websites or social media. Mention Amazon Adaptive Pricing http://en.wikipedia.org/wiki/Digital_footprint

  8. Protecting Privacy (pg. 452) Different countries have different standards of online privacy Most restricted Restricted Some restrictions Minimal restrictions Effectively no restrictions No legislation or no information http://www.forrestertools.com/heatmap/

  9. Protecting others Privacy (pg. 453) • It is not enough to guard your own privacy online. • You have an ethical, and increasingly legal, responsibility to protect the privacy of others online. • Infringe: • mid 16th century: from Latininfringere, from in- 'into' +frangere 'to break'.

  10. Protecting others Privacy (pg. 453) • It is not enough to guard your own privacy online. • You have an ethical, and increasingly legal, responsibility to protect the privacy of others online. The “Golden Rule” isn’t enough

  11. Expectations of Privacy (pg. 453) • Is your e-mail truly private? • This is particularly relevant as the school goes to a Google domain • Soon the school will be issuing you an e-mail address • Your e-mail is not private. • Firstly, it is easily forwarded. • Secondly, anything on a computer system belongs to whoever owns the system. • I am not saying this is right, only that it is. • Do not ever send anything by e-mail that you would be deeply embarrassed if it were to become public information.

  12. New Technology and your privacy Page 453

  13. New Technology and your privacy (pg. 453) • We frequently share information about ourselves knowingly (we are aware that we are sharing information). • Do we ever share information unknowingly? • Remember the Passive Digital Footprint. • A digital footprint is the data that is left behind by users on digital services. • A passive digital footprint is created when data is collected without the owner knowing Remarketing Related video

  14. Cookies (pg. 453) • As relates to computers, what is a cookie? • As relates to computers, a cookie is a small file that is stored on your hard drive when you visit some websites. • What do cookies provide? • They provide the website with a means of storing information about you. • You can mange the cookie settings on your computer

  15. Global Unique Identifiers (pg. 453) • Global unique Identifier (GUID) • A unique number assigned to a person, a piece of software, or a piece of hardware • Similar to a MAC Address, except that people are not aware of its presence. • A media access controladdress (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and WiFi. • getmacifconfig/all (can be spoofed) • Because people are not aware they are being tracked, the information can be abused. http://en.wikipedia.org/wiki/MAC_address

  16. UNIT O BJECTIVES • Summarize the danger of sharing personal information on the internet. • Explain how cookies and global unique identifiers endanger privacy.

  17. KEY TERMS • Global Unique Identifier (GUID) • Infringe In book, but not listed as a key term: • Cookie Not in book (these are the ones you need to write down) • Digital Footprint

More Related