Lecture11-2 - Examples: Clickstream profile Amazon.com...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Ethical Issues in Computer  Science   CSCI 328, Fall 2011 Session 11 Democracy and the Internet Privacy
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Privacy in IT societies What's new? What's different about information flow in IT societies from previous societies? Previous modes of information flow: Characteristics of IT information flow:
Background image of page 2
3 What Else is New? Tools for Data Mining and Managing Databases. Did not emerge in a vacuum (technological determinism) Emerged in response to government and corporate interests. New Kinds of information. Transaction generated information (TGI) Examples: Credit card Clickstream
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Merging and Mining Data When different types of information is merged and then mined for patterns, this can produce new types of information.
Background image of page 4
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 6
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Examples: Clickstream profile Amazon.com recommendations Facebook friends--gaydar 5 Other Issues Distribution of information is broader and more extensive than before. Example: Credit rating. Once on a server, information can be bought, sold, given away or stolen. Information endures. Example: Images on Facebook. Errors are very hard to correct. 6 IT Societies are Surveillance Societies IT allows people to be easily tracked and monitored. Examples? Data can be used to create profiles of individuals. The data can be "mined" for patterns of behavior. Questions raised: What is the value of privacy? How does surveillance affect us and our society?...
View Full Document

This note was uploaded on 03/09/2012 for the course CSCI 328 taught by Professor Staff during the Fall '11 term at Holy Cross College.

Page1 / 6

Lecture11-2 - Examples: Clickstream profile Amazon.com...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online