Lecture 25 - Privacy 1

Lecture 25 - Privacy 1 - CS170 Computer Applications for...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: CS170 Computer Applications for Business Fall 2008 Instructor: Kristian Stout Lecture 25 Introduction to Privacy 1 Readings: Chapters 12,13 Topics List: Privacy and Digital Security Privacy Breach in Privacy examples Privacy Defined Then and now Controlling the use of information Threats to Privacy Privacy Laws Cookies Identity threat Managing privacy What is Breach in Privacy? A secret is revealed- Someone steals a test from me and leaks the answers Hospital records are disclosed - What was the nature of the treatment? Google Ads based on your search engine queries & emails- Machine controlled, no human intervention Facebook & Myspace- About as public as you can get, can you breach that privacy ? Spam Mails - Did you subscribe? Population Statistics - Group vs. individual A Definition Privacy: The right of people to choose freely under what circumstances and to what extent they will reveal themselves, their attitude and their behavior to others. A question: Is privacy a right ? Then and Now The Founders and the 19 th century Everything is recorded- Purchase using Credit Cards- EZ Pass- Real ID & Microchipping Technological advancements - Intruders can gain and transfer information in a short time.- Processing power of machines is high.- Surveillance cameras constantly capturing images Pinpointing the privacy intruder- Intruders have learned to disguise themselves Crossing the national boundaries- By the time you pinpoint the intruder, he is far and gone. Controlling the use of information What is Voluntary disclosure?...
View Full Document

Page1 / 18

Lecture 25 - Privacy 1 - CS170 Computer Applications for...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online