Lecture23_Privacy1

Lecture23_Privacy1 - Computer Applications for Business...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Computer Applications for Business Spring 2008 Instructor: Gayatree Ganu
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Topics List: Privacy and Digital Security Privacy Breach in Privacy examples Privacy Defined Then and now Controlling the use of information Threats to Privacy Privacy Laws Cookies Identity threat Managing privacy
Background image of page 2
What is Breach in Privacy? A secret is revealed: (My best friend tells a guy that I have a crush on him) Hospital records are disclosed (What was the nature of the treatment? What if I am a criminal?) Google Ads based on your search engine queries (Machine controlled, no human intervention) Facebook (Who puts secret personal information on Facebook? We know it can be seen by anyone) Spam Mails (Did you subscribe?) Population Statistics (Group vs. individual)
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Definition Privacy: The right of people to choose freely under what circumstances and to what extent they will reveal themselves, their attitude and their behavior to others.
Background image of page 4
Then and Now Everything is recorded Purchase using Credit Cards Technological advancements Intruders can gain and transfer information in a short time. Processing power of machines is high. Surveillance cameras constantly capturing images Pinpointing the privacy intruder Intruders have learned to disguise themselves Crossing the national boundaries By the time you pinpoint the intruder, he is far and gone.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Controlling the use of information What is Voluntary disclosure? Easiest way to avoid any privacy breach: hermit’s life
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/08/2011 for the course ECONOMICS 101 taught by Professor June during the Spring '08 term at Rutgers.

Page1 / 18

Lecture23_Privacy1 - Computer Applications for Business...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online