1 / 18

Computer and Internet privacy

ITSS 4201 Internet Insurance and Information Hiding. Computer and Internet privacy. University of Palestine Eng. Wisam Zaqoot Feb 2010. First of all, What is “ Privacy ” ?.

isanne
Download Presentation

Computer and Internet privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ITSS 4201 Internet Insurance and Information Hiding Computer and Internet privacy University of Palestine Eng. Wisam Zaqoot Feb 2010

  2. First of all, What is “Privacy” ? • Your right of Privacy: "is the right to control over your own personal data and the ability to grant or deny access to others"

  3. Privacy Problem: • Consider computer-based interactions from a simple transaction to a complex collaboration • Interactions almost always involve dissemination of private data • Threats of privacy violations result in lower trust. Lower trust leads to isolation and lack of collaboration • Privacy violations could be very harmful

  4. The scope of a person’s privacy disclosure should be proportional to the benefits expected from the interaction • As in social interactions • E.g.: a customer applying for a mortgage must reveal much more personal data than someone buying a book

  5. Key Aspects of Privacy: • Freedom from intrusion (being left alone) • Control of information about oneself. Control of publication (“notice and choice”). • Freedom from surveillance (being tracked, followed, watched)

  6. Main issues: • Secondary Use • Computer Matching • Computer Profiling • Invisible Information Gathering • Video Surveillance • Stealing and losing data

  7. Secondary use - use of personal information for a purpose other than the one it was provided for. • Data mining - searching and analyzing masses of data to find patterns and develop new information or knowledge.

  8. Computer matching - combining and comparing information from different databases (using social insurance number, for example, to match records) Examples: • During Vietnam War, Selective Service bought birthday list from ice cream chain to find 18-year olds who had not registered for the draft. • Data mining and computer matching are used to fight terrorism

  9. Computer profiling - analyzing data in computer files to determine characteristics of people most likely to engage in certain behavior Examples: • Business: find likely customers, targeted marketing. • Police: find likely criminals.

  10. Invisible information gathering - collection of personal information about someone without the person’s knowledge

  11. Video Surveillance Modern surveillance techniques are redefining expectation of privacy • Security cameras • Increased security • Decreased privacy • Cameras in United Kingdom. Millions of cameras, some of them used to enforce 9 pm curfew for young people (<16) in some cities. • Cameras in Dubai Other surveillance technologies: • Satellites, RDIF, tracking credit cards transactions …etc

  12. Stolen and Lost Data Except for hackers, stealing or losing data is not new to computer technology. Before computers, files were stolen, receipts were stolen, information was requested under false pretenses and employees who have access were bribed. But, with computers, the extent and impact have grown. • Example: Child benefit details for 25 million people lost in Britain.

  13. ------------------------------------------------------

  14. Regarding the government, e-health and e-commerce sectors, discuss the following questions: • What data do they have about you? • Who has access to the data? • How is your data protected?

  15. Privacy, Government and Citizens: Basically there are traditional set of issues: • Law enforcement/security vs. privacy/individual freedom. • new domains: e-mail monitoring, computer matching/profiling • new scope: millions of records on one hard disk (U.K.)

  16. U.S. Constitution, Fourth Amendment: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

  17. Privacy, Business and Customers: • In the past: Information of single ordinary person not profitable. Mass information gathering too expensive/infeasible. • Now: Information of 1000s or millions of ordinary people is valuable: • databases can gather and store that much information. • data mining programs can find statistical patterns.

  18. Discussion Questions • Is there information that you have posted to the Web that you later removed? Why did you remove it? Were there consequences to posting the information? (if you are using Facebook, have you revised your privacy settings?) • Have you seen information that others have posted about themselves that you would not reveal about yourself ?

More Related