1 / 27

Chapter 2.1-2.2: Privacy I

Chapter 2.1-2.2: Privacy I. See Dilbert cartoons about privacy: http://dilbert.com/strips/comic/2010-05-06/ http://dilbert.com/strips/comic/2008-06-20/. Quiz Question 1. Which of the following is a key aspect of privacy, according to the book: Freedom from surveillance

yanni
Download Presentation

Chapter 2.1-2.2: Privacy I

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 2.1-2.2: Privacy I See Dilbert cartoons about privacy: http://dilbert.com/strips/comic/2010-05-06/ http://dilbert.com/strips/comic/2008-06-20/

  2. Quiz Question 1 Which of the following is a key aspect of privacy, according to the book: Freedom from surveillance Control of information about oneself Freedom from surveillance All of the above

  3. Quiz Question 1 Answer D: All of the above (p. 45, 3 bullet points)

  4. Quiz Question 2 Suppose that, for a he government requestsBecause of the possibility of , privacy violations can occur even if a search engine company does not associate queries with people’s names.

  5. Quiz Question 2 In a court case discussed in the book, the government asked Google to release people’s search queries in order to crack down on material deemed harmful to minors. Was this be a violation of privacy? No, because the search queries can be released without identifying information (“anonymized”) No, because it is impossible to link a search query to the person who made the search. Yes, because even if the search queries are stripped of identifying information, it is still possible to link some of the queries to the people who made them. None of the above.

  6. Quiz Question 2 Answer/Quiz Question 3 (C): “It was not difficult to deduce the identity of some people, especially those who searched on their own name or address. A process called identified others” (p. 49). In this process, one identifies the individual from a set of anonymous data. A. Identity tracking B. Re-identification C. Identity deduction D. Unanonymizing

  7. Quiz Question 3 Answer (B) “Re-identification means identifying the individual from a set of anonymous data” (p. 49).

  8. Quiz Question 4 According to the book, the collection of personal information about a person without the person’s knowledge is known as Invisible information gathering Personal data scraping Private data surveillance Data Mining None of the above

  9. Quiz Question 4 Answer/Quiz Question 5 (A): Invisible information gathering (p. 50) Which of the following is a technique used for invisible information gathering? Internet Service Provider data logs Cookies Supermarket club cards Event data recorders in cars All of the above

  10. Quiz Question 5 Answer E: All of the above (see p. 51). Now let’s focus on online behavior…

  11. Is Our Online Behavior Private? (Small Group Exercise – 5 minutes) “Anything we do online is recorded, at least briefly, and linked to our computer, if not our name. With your group, identify the benefits and drawbacks of this. Do you want your online data to be tracked? Is there a way you can prevent your online behavior from being tracked? Be prepared to discuss your conclusions

  12. Online Invisible Information Gathering In the News! Can anyone tell us about an announcement that was made yesterday that could impact your privacy on the web? (Marketplace 1/24/11 Podcast: 3:32)

  13. Quiz Question 6 The following privacy policy requires businesses to obtain explicit consent from a person for each use of the person’s personal information (by, e.g., checking a box): Informed consent Implied consent Opt in Opt out None of the above

  14. Quiz Question 6 Answer C: Opt-in (p. 53). What about when people use an internet site that provides a free service with no explicit end-user agreement? What would be a reasonable business policy in this case?

  15. Quiz Question 7 According to the book, the following is a provision of the Privacy Act of 1974: It requires private sector companies to publish notice of their record systems It allows disclosure of a person’s information without his or her consent It allows people to access their records and to correct inaccurate information All of the above None of the above

  16. Quiz Question 7 Answer/Quiz Question 8 C: See third bullet in Figure 2.3, top of p. 59.

  17. Quiz Question 8 According to the book, surveillance cameras have the following documented outcomes: They have helped reduce all types of crime They have helped reduce vehicle crime They have achieved face-recognition accuracy in excess of 80 percent All of the above None of the above

  18. Quiz Question 8 Answer B: In 2005, the British government found that “the only successful use of [surveillance] cameras was in parking lots where they helped reduce vehicle crime” (p. 74). Can you think of another successful use of surveillance cameras?

  19. Quiz Question 9 The supreme court case Katz v. United States (1967) clarified the Fourth Amendment by ruling that It applies to wiretaps It applies only to physical intrusion and search and seizure of physical items It requires a court order to access personal items available through technological means It applies to conversations held in public places in some situations None of the above

  20. Quiz Question 9 Answer D: “In Katz v. United States, the Supreme Court…ruled that the Fourth Amendment does apply to conversations and that it applies in public places in some situations. What about Kyllo v. Unitied States (2001)? What did it say about the use of thermal imaging devices to identify pot plants?

  21. Quiz Question 10 The following was a key provision of the USA PATRIOT Act: It allowed the FBI to obtain various kinds of records using documents called National Security Letters (NSLs). It significantly expanded the FBI’s authority to issue NSLs. It allowed recipients of NSLs to disclose that they have received them. It prevented NSLs from soliciting a person’s credit report None of the above

  22. Quiz Question 10 Answer B: “The PATRIOT Act significantly expanded FBI authority to issue NSLs” (p. 71).

  23. Privacy Case Study 1 (Clicker) Ex. 2.9, p. 130: A company that supplies filtering software to schools to block access to objectionable websites sold statistical data about the websites visited by school children. The data did not identify the children or individual schools. Was this a privacy violation? • Yes • No • Unsure Why or why not? Discuss with group for 5 min.; apply ethical frameworks and privacy principles on p. 54

  24. Privacy Case Study 2 (Clicker) Ex. 2.14, p. 130: People who fled hurricane Katrina left behind and lost important documents and records such as birth certificates, c4redit cars, property records, and emplyment records. A U.S agency proposed a new database where people could voluntarily store essential personal records in case of natural disasters. Is this a good idea? • Yes • No • Unsure Discuss pros and cons with group for 5 min.; apply ethical frameworks and privacy principles on p. 54

  25. Privacy Case Study 3 (Clicker) Ex. 2.16, p. 131: A city government wants to track down people who run small businesses and do not pay the city’s $125 business license fee. The city hired a private detective to obtain IRS tax recors of city residents and determine who has reported small-business income to the IRS but paid the license. Should this action by the city be permitted? • Yes • No • Unsure Discuss arguments for and against with group for 5 min.; apply ethical frameworks and privacy principles on p. 54

  26. Team Building You must be on a team of 4, and have a topic, by the time you leave class today! On the white board, I have written 26 numbers corresponding to the 26 topics listed on the term project description document Go to the number corresponding to the topic you would like to select, or pitch an idea now When you have found a team and a topic, write your team name, members’ names (with team leader designated), and topic down on a sheet of paper and hand to instructor

  27. For Thursday In-Class Activity... Make sure someone in your group brings a digital camera to class! Your group can’t get credit for the activity without one.

More Related