chapter 2 1 2 2 privacy i n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Chapter 2.1-2.2: Privacy I PowerPoint Presentation
Download Presentation
Chapter 2.1-2.2: Privacy I

Loading in 2 Seconds...

play fullscreen
1 / 27

Chapter 2.1-2.2: Privacy I - PowerPoint PPT Presentation


  • 144 Views
  • Uploaded on

Chapter 2.1-2.2: Privacy I. See Dilbert cartoons about privacy: http://dilbert.com/strips/comic/2010-05-06/ http://dilbert.com/strips/comic/2008-06-20/. Quiz Question 1. Which of the following is a key aspect of privacy, according to the book: Freedom from surveillance

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Chapter 2.1-2.2: Privacy I' - yanni


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
chapter 2 1 2 2 privacy i
Chapter 2.1-2.2: Privacy I

See Dilbert cartoons about privacy:

http://dilbert.com/strips/comic/2010-05-06/

http://dilbert.com/strips/comic/2008-06-20/

quiz question 1
Quiz Question 1

Which of the following is a key aspect of privacy, according to the book:

Freedom from surveillance

Control of information about oneself

Freedom from surveillance

All of the above

quiz question 1 answer
Quiz Question 1 Answer

D: All of the above (p. 45, 3 bullet points)

quiz question 2
Quiz Question 2

Suppose that, for a he government requestsBecause of the possibility of , privacy violations can occur even if a search engine company does not associate queries with people’s names.

quiz question 21
Quiz Question 2

In a court case discussed in the book, the government asked Google to release people’s search queries in order to crack down on material deemed harmful to minors. Was this be a violation of privacy?

No, because the search queries can be released without identifying information (“anonymized”)

No, because it is impossible to link a search query to the person who made the search.

Yes, because even if the search queries are stripped of identifying information, it is still possible to link some of the queries to the people who made them.

None of the above.

quiz question 2 answer quiz question 3
Quiz Question 2 Answer/Quiz Question 3

(C): “It was not difficult to deduce the identity of some people, especially those who searched on their own name or address. A process called identified others” (p. 49). In this process, one identifies the individual from a set of anonymous data.

A. Identity tracking B. Re-identification

C. Identity deduction D. Unanonymizing

quiz question 3 answer
Quiz Question 3 Answer

(B) “Re-identification means identifying the individual from a set of anonymous data” (p. 49).

quiz question 4
Quiz Question 4

According to the book, the collection of personal information about a person without the person’s knowledge is known as

Invisible information gathering

Personal data scraping

Private data surveillance

Data Mining

None of the above

quiz question 4 answer quiz question 5
Quiz Question 4 Answer/Quiz Question 5

(A): Invisible information gathering (p. 50)

Which of the following is a technique used for invisible information gathering?

Internet Service Provider data logs

Cookies

Supermarket club cards

Event data recorders in cars

All of the above

quiz question 5 answer
Quiz Question 5 Answer

E: All of the above (see p. 51).

Now let’s focus on online behavior…

is o ur o nline behavior private small group exercise 5 minutes
Is Our Online Behavior Private? (Small Group Exercise – 5 minutes)

“Anything we do online is recorded, at least briefly, and linked to our computer, if not our name.

With your group, identify the benefits and drawbacks of this.

Do you want your online data to be tracked? Is there a way you can prevent your online behavior from being tracked?

Be prepared to discuss your conclusions

online invisible information gathering in the news
Online Invisible Information Gathering In the News!

Can anyone tell us about an announcement that was made yesterday that could impact your privacy on the web?

(Marketplace 1/24/11 Podcast: 3:32)

quiz question 6
Quiz Question 6

The following privacy policy requires businesses to obtain explicit consent from a person for each use of the person’s personal information (by, e.g., checking a box):

Informed consent

Implied consent

Opt in

Opt out

None of the above

quiz question 6 answer
Quiz Question 6 Answer

C: Opt-in (p. 53).

What about when people use an internet site that provides a free service with no explicit end-user agreement? What would be a reasonable business policy in this case?

quiz question 7
Quiz Question 7

According to the book, the following is a provision of the Privacy Act of 1974:

It requires private sector companies to publish notice of their record systems

It allows disclosure of a person’s information without his or her consent

It allows people to access their records and to correct inaccurate information

All of the above

None of the above

quiz question 7 answer quiz question 8
Quiz Question 7 Answer/Quiz Question 8

C: See third bullet in Figure 2.3, top of p. 59.

quiz question 8
Quiz Question 8

According to the book, surveillance cameras have the following documented outcomes:

They have helped reduce all types of crime

They have helped reduce vehicle crime

They have achieved face-recognition accuracy in excess of 80 percent

All of the above

None of the above

quiz question 8 answer
Quiz Question 8 Answer

B: In 2005, the British government found that “the only successful use of [surveillance] cameras was in parking lots where they helped reduce vehicle crime” (p. 74).

Can you think of another successful use of surveillance cameras?

quiz question 9
Quiz Question 9

The supreme court case Katz v. United States (1967) clarified the Fourth Amendment by ruling that

It applies to wiretaps

It applies only to physical intrusion and search and seizure of physical items

It requires a court order to access personal items available through technological means

It applies to conversations held in public places in some situations

None of the above

quiz question 9 answer
Quiz Question 9 Answer

D: “In Katz v. United States, the Supreme Court…ruled that the Fourth Amendment does apply to conversations and that it applies in public places in some situations.

What about Kyllo v. Unitied States (2001)? What did it say about the use of thermal imaging devices to identify pot plants?

quiz question 10
Quiz Question 10

The following was a key provision of the USA PATRIOT Act:

It allowed the FBI to obtain various kinds of records using documents called National Security Letters (NSLs).

It significantly expanded the FBI’s authority to issue NSLs.

It allowed recipients of NSLs to disclose that they have received them.

It prevented NSLs from soliciting a person’s credit report

None of the above

quiz question 10 answer
Quiz Question 10 Answer

B: “The PATRIOT Act significantly expanded FBI authority to issue NSLs” (p. 71).

privacy case study 1 clicker
Privacy Case Study 1 (Clicker)

Ex. 2.9, p. 130: A company that supplies filtering software to schools to block access to objectionable websites sold statistical data about the websites visited by school children. The data did not identify the children or individual schools. Was this a privacy violation?

  • Yes
  • No
  • Unsure

Why or why not? Discuss with group for 5 min.; apply ethical frameworks and privacy principles on p. 54

privacy case study 2 clicker
Privacy Case Study 2 (Clicker)

Ex. 2.14, p. 130: People who fled hurricane Katrina left behind and lost important documents and records such as birth certificates, c4redit cars, property records, and emplyment records. A U.S agency proposed a new database where people could voluntarily store essential personal records in case of natural disasters. Is this a good idea?

  • Yes
  • No
  • Unsure

Discuss pros and cons with group for 5 min.; apply ethical frameworks and privacy principles on p. 54

privacy case study 3 clicker
Privacy Case Study 3 (Clicker)

Ex. 2.16, p. 131: A city government wants to track down people who run small businesses and do not pay the city’s $125 business license fee. The city hired a private detective to obtain IRS tax recors of city residents and determine who has reported small-business income to the IRS but paid the license. Should this action by the city be permitted?

  • Yes
  • No
  • Unsure

Discuss arguments for and against with group for 5 min.; apply ethical frameworks and privacy principles on p. 54

team building
Team Building

You must be on a team of 4, and have a topic, by the time you leave class today!

On the white board, I have written 26 numbers corresponding to the 26 topics listed on the term project description document

Go to the number corresponding to the topic you would like to select, or pitch an idea now

When you have found a team and a topic, write your team name, members’ names (with team leader designated), and topic down on a sheet of paper and hand to instructor

for thursday in class activity
For Thursday In-Class Activity...

Make sure someone in your group brings a digital camera to class! Your group can’t get credit for the activity without one.