1 / 17

Privacy in computing

Privacy in computing. Material/text on the slides from Chapter 10 Textbook: Pfleeger. What is privacy?. How would you define it? What do you think its aspects are? Three key aspects: Controlled disclosure. Sensitive data Affected subject. Computer Related Privacy Problems.

sani
Download Presentation

Privacy in computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.

  2. What is privacy? • How would you define it? • What do you think its aspects are? • Three key aspects: • Controlled disclosure. • Sensitive data • Affected subject.

  3. Computer Related Privacy Problems • Data collection: what issue do you see? • No informed consent: • Examples: real age. • Loss of control: class discussion. • Example: posting on a blog. • What are the ramifications vs. writing a letter? • Ownership of data.

  4. Computer Related Privacy Problems • Data collection: what issue do you see? • No informed consent: • Examples: real age. • Loss of control: class discussion. • Example: posting on a blog. • What are the ramifications vs. writing a letter? • Ownership of data.

  5. Protections provided • Privacy Policies; • First step: fair information policies: • Regulate these; • Collection of information. • Data quality. • Purpose specification (use of information) • Use limitation. • Security safeguards. • Openness. • Individual participation. • Accountability.

  6. U.S privacy laws • Are usually applied to individual data types: • HIPAA • Financial organizations: Gramm-Leach-Bliley Act (GLBA) • Important in Radford: Federal Educational Rights and Privacy Act (FERPA). • Somethings are not clear: example class discussion.

  7. U.S govt. websites. • Privacy laws controlled by the FTC. • Address 5 factors: • Notice (must be informed) • Choice • Access (contest accuracy of data collected) • Security. (data collectors must secure against unauthorized use). • Enforcement (sanctions on noncompliance) • In 2002, the US e-government act.

  8. What about commercial websites? • Federal trade comission can prosecute for deceptive practices. (e.g., false advertising) • E.g., JetBlue and the DOD.

  9. Other issues with Privacy. • Anonymity. • Issues with anonymity. • Multiple identities (online id)

  10. How to protect against privacy loss?

  11. How to protect against privacy loss? • Get/give as little data as possible. • Data anonymization. • Audit trail: record who has accessed what data. • Security and controlled access • Training, quality, Restricted usage, data left in place. • Policy.

  12. Issues in Computer Security: Data mining and privacy. • Government data mining. • Privacy preserving data mining: • Data mining is “extracting hidden patterns from large amounts of data” • Solutions to preserve privacy: • Remove id information. Doesn’t work. • E.g., Sweeney’s report: > 87% US population can be identified by: 5 digit zip code, gender and date of birth. • Data perturbation. Example. Needs to be done carefully.

  13. Privacy on the web • Think about this: • On the web: every word you speak (blog) can be read • Someone selling something may have ads on their site for something else. • Identity of the other person may not be known! • Some issues on the web are protected. • Can you name them?

  14. Privacy on the web • Credit card payments are protected. • But not necessarily private. • Paypal etc.. May solve the privacy issues. • Site and portal registrations: • Beware of “we will enhance your browsing experience” • Using email as id on some sites. Issues? • Third party ads. • Contests and offers: Free Iphones!

  15. Privacy issues • Cookies: • Be-aware • Third party cookies. E.g., Double Click and online profiling. • Adware • Web-bug. • Spyware: keystroke loggers.

  16. Email security • Interception of email. • Can be encrypted using PGP or S/MIME • Email monitored legallly. • Anonymous E-mail and remailers • Sending anonymous emails. • Spoofing and spamming.

  17. Impact on Emerging technologies • RFID tags • RFID and privacy issues: • Consumer products. How can this be exploited? • RFID in individuals. • Electronic voting • Privacy issues. • VoIP and Skype • Privacy issues.

More Related