1 / 6

The Primacy of Privacy: A survey of knowledge and opinions

The Primacy of Privacy: A survey of knowledge and opinions. Prof. Masooda Bashir Kevin Hoff Gahyun Jeon. Research Interests. Privacy Security Trust. Digital Information Digital Information. Humans and Society.

annot
Download Presentation

The Primacy of Privacy: A survey of knowledge and opinions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Primacy of Privacy: A survey of knowledge and opinions Prof. Masooda Bashir Kevin Hoff GahyunJeon

  2. Research Interests Privacy Security Trust Digital Information Digital Information Humans and Society

  3. What is “Cloud Computing?” Background • Privacy is a complex, multifaceted concept • Although privacy been an important topic throughout history, recent advances in information technology have raised levels of concern to an all-time high • Scholars have conceptualized “privacy” in many different ways: • “The right to be left alone” (Warren and Brandeis, 1890) • “A self-serving economic good” (Richard Posner, 1978) • “Contextual integrity” (Helen Nissenbaum, 2003) • A taxonomy of different, yet related problems (Solove, 2009) • Different conceptions of privacy • Privacy as a negative freedom – freedom from something, rather than a right to something else • Secrecy paradigm – privacy applies to things that are secret • Invasion paradigm – privacy violation is an invasion of a specific interest • Inaccessibility – privacy is where the subject is inaccessible to others • Privacy viewed as constitutional and human right • Decisional privacy, physical privacy, proprietary privacy, informational privacy

  4. What is “Cloud Computing?” Research Background • In the U.S., the legal system surrounding information privacy is based on fair information practices (FIPs) • FIPs are an internationally recognized set of policies for collecting, managing, and distributing personal information • There are five main principles used in the U.S.: • Notice • Choice/Consent • Access to data/participation • Data Integrity/Security • Enforcement (i.e. self, third-party, or government regulation) • Today, cloud service providers claim that their customers are providing informed consent by accepting privacy policies and terms of service agreements • By clicking “accept”, consumers are providing cloud service providers with legal rights to use their information for a variety of purposes • Informed Consent- “the process by which a fully informed user participates in decisions about his or her personal data” (van der Geest et al., 2005, p. 7) • Five principles of informed consent: • Disclosure, Comprehension, Voluntariness, Competence, Agreement

  5. What is “Cloud Computing?” Survey of Knowledge

  6. What is “Cloud Computing?” Surveyof Opinions

More Related