L05 - TEP1281 Ethics and Professional Conduct Session 2,...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Faculty of Information Technology & Faculty of Information Science and Technology , Multimedia University Malaysia TEP1281 Ethics and Professional Conduct Lecture 5 Privacy and Cyberspace Session 2, 2011/2012
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Faculty of Information Technology & Faculty of Information Science and Technology , Multimedia University Malaysia Contents 1. Are privacy concerns associated with cybertechnology unique or special? 2. What is personal privacy? 3. Classic theories of privacy 4. A comprehensive account of privacy 5. Cybertechnology threats 6. Exchanging personal data: Merging and Matching 7. Protecting personal privacy in public space 8. Privacy-Enhancing Technologies 9. Privacy legislation
Background image of page 2
Faculty of Information Technology & Faculty of Information Science and Technology , Multimedia University Malaysia Privacy and Cybertechnology • Privacy concerns affect many aspects of an individual’s life. • Categories such as: – consumer privacy, – medical/healthcare privacy, – employee/workplace privacy. • Privacy issues involving cybertechnology affect each of us. • Examples: – Information about us that can be acquired. – privacy of users who navigate the Web 1
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Faculty of Information Technology & Faculty of Information Science and Technology , Multimedia University Malaysia Privacy and Cyberspace Are any privacy issues unique to cybertechnology? Privacy concerns have been exacerbated by cybertechnology: - amount of personal information that can now be collected; - speed at which personal information can now be transferred and exchanged; - duration of time in which personal information can now be retained; - kind of personal information (such as transactional information) that can be acquired. 1
Background image of page 4
Faculty of Information Technology & Faculty of Information Science and Technology , Multimedia University Malaysia What is Personal Privacy • We sometimes speak of an individual’s privacy as something that can be: – lost, – diminished, – intruded upon, – invaded, – violated, – breached. 2
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Faculty of Information Technology & Faculty of Information Science and Technology , Multimedia University Malaysia Classic Theories of Privacy Accessibility Privacy (Non- intrusion) Privacy is defined in terms of one's physically "being let alone," or freedom from intrusion into one's physical space. Decisional Privacy (Non- interference) Privacy is defined in terms of freedom from interference in one's choices and decisions. Informational Privacy (Control Over / restricting access to one’s personal information) Privacy is defined as control over the flow of one's personal information, including the transfer and exchange of that information. 3
Background image of page 6
Faculty of Information Technology & Faculty of Information Science and Technology , Multimedia University Malaysia A Comprehensive Account of Privacy • James Moor (2004): key elements of the three classic theories. • According to Moor:
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 42

L05 - TEP1281 Ethics and Professional Conduct Session 2,...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online