Swe 2642 professional practices and ethics
Download
1 / 41

SwE 2642 Professional Practices and Ethics - PowerPoint PPT Presentation


  • 69 Views
  • Uploaded on

SwE 2642 Professional Practices and Ethics. August 29 Chapter Two: Privacy and Personal Information. About Assignment 1– Due Wed. Questions? Professionals must stay current & this assignment lets you learn about that

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'SwE 2642 Professional Practices and Ethics' - miron


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Swe 2642 professional practices and ethics

SwE 2642Professional Practices and Ethics

August 29

Chapter Two: Privacy and Personal Information


About assignment 1 due wed
About Assignment 1– Due Wed.

Questions?

Professionals must stay current & this assignment lets you learn about that

Don’t forget that I may be asking for your reference list and article summaries as we go along the course.


Try hornet connect http connect spsu edu
Try Hornet Connecthttp://connect.spsu.edu

sduggins@spsu.edu

sduggins

Same as email password


Try hornet connect http connect spsu edu1
Try Hornet Connecthttp://connect.spsu.edu


September 5
September 5…

…is not Labor Day, and we will have a class meeting.

Group 8 will present Examples supporting Chapter Two. Please email me your slides and put your name on the slides.


Health and medicine
Health and Medicine

Computer-aided imaging

Monitoring

Computer-enhanced instruments

Drugs Designing Dispensing

Patient records

Telemedicine


Assistive technology
Assistive Technology

Screen readers

Speech controls, speech to text

Nerve or brain implants

Aids in locating things

Locating people


Automation
Automation

Automation of repetitive or dangerous tasks

Improvements in product quality Assembly Inspection

Automation and jobs


Identifying sensing and tracking
Identifying, Sensing and Tracking

Scanners For checkers Self-scanning

Smart cards

Sensors and active ID tags


Reducing paper use and waste
Reducing Paper Use and Waste

On-line storage Good points Less good points

Office automation increasespaper use


Observations
Observations

Imagining life without computers War and Peace The Brooklyn Bridge Automobiles, airplanes, ships


Data and privacy
Data and Privacy

What data are collected about individuals?

What is the effect of computers on this?


Aspects of privacy
Aspects of Privacy

The right to be let aloneMr. Justice Louis D. Brandeis

The right to control information about oneself

Freedom from surveillance

http://www.swiss.ai.mit.edu/classes/6.805/articles/privacy/Privacy_brand_warr2.html


What are the limits of privacy
What are the Limits of Privacy?

What are the limits?

  • Your neighbors and friends

  • Companies and enterprises

  • Government

    Is privacy a good thing?


Privacy and personal information
Privacy and Personal Information

What is personal information?

What is not?


The risks of technology
The Risks of Technology

To what extent does technology threaten privacy?

  • Invisible information gathering

  • Data leakage

  • Matching and profiling(Whatis profiling, anyway?)

  • Location and technology


Surveillance
Surveillance

Is “Big Brother” watching you?

  • Constitutional restrictions

  • Databases

  • The Privacy Act of 1974

  • Computer Matching and Privacy Protection Act of 1988


The census
The Census

  • Purpose of the Census

  • Census of 1890

  • Use (and abuse?) of Census data

  • Other “fishing expeditions”


Unauthorized uses of information
Unauthorized Uses of Information

Quis custodiet ipsos custodes?(Who will guard the guards themselves?) –Juvenal

Abuses by those authorized to have access

  • Government

  • Private businesses


The fourth amendment
The Fourth Amendment

About the Bill of Rights

The Fourth Amendment: “the right of the people to be secure in their persons, houses, papers, and effects…


The weakening of the fourth amendment
The Weakening of the Fourth Amendment

  • The USA PATRIOT Act

  • HIPAA (Health Insurance Portability and Accountability Act)

    The notion of “expectation of privacy”


Technology and surveillance
Technology and Surveillance

  • Satellite surveillance

  • Thermal imaging(Thermal imaging is a “search” that requires a warrant. Kyllo v. United States)

  • Toll collection

  • Purchase records

  • Cell phones


The supreme court and the expectation of privacy
The Supreme Court and the Expectation of Privacy

  • Olmstead v. United States (1928)Wiretaps

  • Katz v. United States (1967)

    Restrictive interpretation on expectation of privacy


Electronic searches
Electronic Searches

  • Metal detectors

  • Bomb-sniffers

  • Backscatter X-Ray machines

    Trade-offs of security and privacy


Your picture
Your Picture

  • Security cameras

  • Face recognition systems

  • CCTV cameras in England and Canada


Fighting terrorism
Fighting Terrorism

What techniques should we use

  • Profiling ?

  • Surveillance ?

  • Photographs and fingerprints ?

    Where did security break down?


Databases and marketing
Databases and Marketing

How much “junk mail” do you get?

Why?

How is data mining (comparison of databases by private industry) like database matching by government? How is it different?

Why were people opposed to DoubleClick’s matching project?


Children and the web
Children and the Web

“On the Internet, nobody knows you’re a dog.”

Are children exposed to potentially dangerous situations because of Internet interactions?

Is it ethical for an FBI agent to pose as an eleven year old girl on the Internet?

What about collection of personal information from children by businesses?

Cartoon by Peter Steiner, reproduced from page 61 of July 5, 1993 issue of The New Yorker, (Vol.69 (LXIX) no. 20)


The social security number
The Social Security Number

Social Security Number as ID number

Matching

Access to information

Identity theft

The SSN as a national ID number?


National id cards
National ID Cards

Benefits of a national ID card

fewer cards to carry(?)

harder to forge

deter identity theft

And the down side?

“Your papers, please!”

Do you need an ID to work?

What about the “Real ID” law? (Passed in 2005; implementation by 2008.)


Health information
Health Information

Medical databases are replacing paper records

Are databases easier or harder to protect?

What are the legitimate uses of medical records?

Medical records and payment for health care.

Medical records and sensitive conditions.


Laws about medical privacy
Laws about Medical Privacy

HIPAA: Health Insurance Portability and Accountability Act (Administrative Simplifications)

Privacy protections

Security requirements

And also… standardization of identifying codes

…government access without a consent requirement


National health insurance
National Health Insurance

Can Medicare patients see a “private” doctor?

Should there be a national medical record database?

Would a national health card turn into a de facto national ID card?


Public records
Public Records

  • Property ownership records

  • Marriage licenses

  • Bankruptcy records

  • Criminal records

  • What is the effect of computers?

  • Aircraft flight plans

  • Judges’ financial disclosures


Public vs anonymous
Public vs. Anonymous

  • Should any record available “publicly” be available anonymously?

  • How do you decide?

  • For on-line records, how do you verify the identity of the person requesting the record?


Black boxes and surveillance
“Black Boxes” and Surveillance

  • Many new cars have event data recorders

  • GPS sensor / recorders

  • IEEE Spectrum reports that 25% of rental cars now have GPS devices


Rfid tags
RFID Tags

  • Passive radio devices that respond to queries from scanners

  • 128-bit code (about 31038 codes; enough to identify just about everything on earth!)

  • Required by Wal-Mart for cartons, pallets in 2005

  • Scenario: You visit an anti-war protest with a friend. Later, at the airport, a government database identifies your sweater as havingbeen at the protest.


About assignment 2
About Assignment 2

  • You will be asked to pick one of five current issues.

    • “Black boxes” for cars

    • RFID tags and surveillance

    • Read ID

    • New warrantless wiretapping law

    • “phishing” scams

  • You will research the issue you pick and follow the directions in the assignment. Note if you pick “phishing”, there are different instructions.


Telemarketing
Telemarketing

How has the Federal “do not call list” changed the telemarketing business?

Is telemarketing a free-speech issue?

Why are charities, surveys and political candidates exempt?


Electronic mail
Electronic Mail

Do you use a business e-mail account?

Is it monitored in any way? How do you know?

Is spam a free-speech issue?


Children and the web1
Children and the Web

“On the Internet, nobody knows you’re a dog.”

Are children exposed to potentially dangerous situations because of Internet interactions?

Is it ethical for an FBI agent to pose as an eleven year old girl on the Internet?

What about collection of personal information from children by businesses?

Cartoon by Peter Steiner, reproduced from page 61 of July 5, 1993 issue of The New Yorker, (Vol.69 (LXIX) no. 20)