Lecture 1 - 2010-1-28

Lecture 1 - 2010-1-28 - 2/4/2010 Announcements Reminder...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
2/4/2010 1 Announcements Reminder This is a survey course that explores the impact of technology and engineering design on society past, present, and future. The main themes as they relate to changing technology are: industry and the economy; the environment; social, educational, and psychological implications of computers; energy and society; warfare; and 21st-century emerging technologies. Historical Perspectives Technology for the purposes of this class is defined as: Human innovation in action that involves the generation of knowledge and processes to develop systems that solve problems and extend human capabilities What We Will Cover Privacy and Computer Technology “Big Brother is Watching You” Privacy Topics Protecting Privacy Communications
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2/4/2010 2 Privacy and Computer Technology Key Aspects of Privacy: Freedom from intrusion (being left alone) Control of information about oneself Freedom from surveillance (being tracked, followed, watched) Privacy and Computer Technology (cont.) New Technology, New Risks: Government and private databases Sophisticated tools for surveillance and data analysis Vulnerability of data Privacy and Computer Technology (cont.) Terminology: Invisible information gathering - collection of personal information about someone without the person’s knowledge Secondary use - use of personal information for a purpose other than the one it was provided for
Background image of page 2
3 Privacy and Computer Technology (cont.) Terminology (cont.): Data mining - searching and analyzing masses of data to find patterns and develop new information or knowledge Computer matching - combining and comparing information from different databases (using social security number, for example, to match records) Privacy and Computer Technology (cont.) Terminology (cont.): Computer profiling - analyzing data in computer files to determine characteristics of people most likely to engage in certain behavior Privacy and Computer Technology (cont.) Principles for Data Collection and Use:
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 10/03/2010 for the course ESE 337 taught by Professor Chi-tsongchen during the Spring '10 term at SUNY Stony Brook.

Page1 / 11

Lecture 1 - 2010-1-28 - 2/4/2010 Announcements Reminder...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online