1 / 22

Privacy 7 February

“zone of inaccessibility” Edmund Byrne, 1998. COMP 381. Privacy 7 February . “The right to be alone” Warren and Brandeis, 1890. Views on Privacy. “All this secrecy is making life harder, more expensive, dangerous …” Peter Cochran, BT Research “You have zero privacy anyway.”

red
Download Presentation

Privacy 7 February

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. “zone of inaccessibility” Edmund Byrne, 1998 COMP 381 Privacy7 February “The right to be alone” Warren and Brandeis, 1890

  2. Views on Privacy • “All this secrecy is making life harder, more expensive, dangerous …” Peter Cochran, BT Research • “You have zero privacy anyway.” Scott McNealy, Sun • “By 2010, privacy will become a meaningless concept in western society” Gartner report

  3. Aspects of Privacy • Secrecy • Limiting dissemination of information • Anonymity • Protection from undesired attention • Solitude • Lack of proximity Ruth Gavison 1984

  4. Historical Basis of Privacy • Code of Hammurabi • 1760 BCE • crime to break a hole through the wall of another’s house • Justice of Peace Act • England 1361 • Peeping Toms and eavesdroppers

  5. Current Basis of Privacy • Universal Declaration of Human Rights • United Nations 1948 • Article 12 • European Convention on Human Rights • European Council 1950 • Article 8 • US Constitution: Bill of Rights • Evolution from property rights • Amendment IV

  6. Without Privacy • Extrinsic loss of freedom • Ability of others to control our behavior • Coercion or imposition of others’ wills • Intrinsic loss of freedom • Changes how we behave • “anticipatory conformity” • Autonomy requires privacy

  7. Privacy and Identity • Identity • sense of self • distinct personality of an individual • an individual's comprehension of him or herself as a discrete, separate entity • What defines your identity?

  8. Privacy and Trust • In order to trust others, need to know something about them • Privacy impedes • In order to build STRONGEST trust between two people, need to create a bond • Requires privacy

  9. Importance of Privacy • Privacy and relationships • How is it different from pre-computers/networks? • Electronic alter ego • Identity convergence

  10. Everyone Agrees • Privacy is not absolute in society …why? • Willing to divulge SOME information in exchange for SOME economic or social benefit…. • BUT reasonable expectation about how it’s treated… • What is known about you?

  11. Controversy & Challenge • My right to informational privacy vs. others’ right to know vs. security • Does it have to be versus? • Is it really a zero-sum game?

  12. My rights • Shouldn’t I have a say? • Why should I care? • Decisions made about us • Effect if data are Incomplete? Erroneous? Sensitive?

  13. Legal Realities of Privacy • Self-regulation approach in US, Japan • Comprehensive laws in Europe, Canada, Australia • European Union • Limits data collection • Requires comprehensive disclosures • Prohibits data export to unsafe countries • Or any country for some types of data

  14. Privacy Impingement In the Past • Go to the court or town hall • Go through trash • Interview people • Eavesdrop/wiretap • Surveillance • Breaking and entering

  15. … and Today • Public records easier to find • Publications spread faster • Surveillance • Keeping records of what you do on the web • Shopping • Surfing • Searching • Breaches

  16. Privacy on the Web • The right to have information that you don’t expect to be available to others remain that way • On many sites, you give up your right to privacy • But there are also other more insidious ways • Google Dashboard

  17. Aspects of Privacy • Transparency and Control: knowing what is being collected • Anonymity • Security • Data breaches chronology • Mike Reiter lecture in 2 weeks

  18. Impediments to Privacy • Cookies • Web site retaining cookies for 5 years • Sniffing, Snarfing, Snorting • Forms of capturing packets over network • Differ by how much info & what is done with it • Surveillance • Different forms? • Google Street View • Data collection and sharing

  19. What’s Coming: Web 3.0 • Semantic Web • Assign meanings -> further connections

  20. Identity Theft • “crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception” • Identity Theft is a Federal Offense • Crimes of Persuasion • Commercial

  21. (Stop Internet Fraud and Identity Theft)

  22. And a final note… Pizza Parlor knows all

More Related