1 / 12

Privacy

Privacy. Computing at Carnegie Mellon Section I2. Introduction. Lauren Milisits. What is PRIVACY ?. The ability to seclude information and oneself Possible violations of privacy: Cookies Google Maps (street view) Criminal Registration Criminal justice & inmates.

vince
Download Presentation

Privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy Computing at Carnegie Mellon Section I2

  2. Introduction Lauren Milisits

  3. What is PRIVACY? • The ability to seclude information and oneself • Possible violations of privacy: • Cookies • Google Maps (street view) • Criminal Registration • Criminal justice & inmates

  4. Background Information Erika Tang

  5. History of Information Protection Pre-Digital Era • primary modes of communication and exchange had physical evidence (i.e. paper trails) • hard to invade a person's privacy without finding tangible records of personal information Dawn of the Digital Age • new modes of communication and exchange • social networking sites • email • on-line shopping •  greater avenues for the violation of privacy • identity theft, fraud,etc. • no longer need paper trail to invade privacy

  6. Positive Aspects and Benefits Emerson Hum

  7. Positive Aspects of Having Sufficient Privacy Individual can do work in seclusion without revealing certain information about themselves Individual has a level of security and confidentiality when on the computer Individual has protection in conducting interactions with others such as payment transactions or chatting

  8. Steps Taken to Improve Privacy and Lessen the Effects of Privacy Invasion Using non-common passwords HTTPS connections provide security to servers Ability to remove cookies Avoiding sites that seem unreliable or fishy Privacy invasion laws specific for computer crimes Internet regulation to prevent others committing frauds/scams to steal information

  9. Criticism Like Li

  10. Increased Internet Privacy? IN SUPPORT OF IN OPPOSITION OF Users should be able to know exactly how their data is being used Users should be able to express their views completely anonymously on the Internet Government intervention to protect consumer privacy would stifle innovation Having some way to track users decreases threats to safety (i.e. Internet stalkers, criminals, etc.)

  11. Opinion Lauren Milisits

  12. What do we think?

More Related