Privacy C O M P U T I N G ... S E C T I O N I...

advertisement
Privacy
COMPUTING AT CARNEGIE MELLON
SECTION I2
Introduction
Lauren Milisits
What is PRIVACY?
 The ability to seclude information and oneself
 Possible violations of privacy:
Cookies
 Google Maps (street view)
 Criminal Registration
 Criminal justice & inmates

Background Information
Erika Tang
History of Information Protection
Pre-Digital Era
 primary modes of communication and exchange had
physical evidence (i.e. paper trails)
 hard to invade a person's privacy without finding
tangible records of personal information
Dawn of the Digital Age
 new modes of communication and exchange



social networking sites
email
on-line shopping
 greater avenues for the violation of privacy


identity theft, fraud,etc.
no longer need paper trail to invade privacy
Positive Aspects and Benefits
Emerson Hum
Positive Aspects of Having Sufficient Privacy
 Individual can do work in seclusion without
revealing certain information about themselves
 Individual has a level of security and confidentiality
when on the computer
 Individual has protection in conducting interactions
with others such as payment transactions or chatting
Steps Taken to Improve Privacy and Lessen the
Effects of Privacy Invasion
 Using non-common passwords
 HTTPS connections provide security to servers
 Ability to remove cookies
 Avoiding sites that seem unreliable or fishy
 Privacy invasion laws specific for computer crimes
 Internet regulation to prevent others committing
frauds/scams to steal information
Criticism
Like Li
Increased Internet Privacy?
IN SUPPORT OF
IN OPPOSITION OF
 Users should be able to
 Government
know exactly how their
data is being used
 Users should be able to
express their views
completely
anonymously on the
Internet
intervention to protect
consumer privacy
would stifle innovation
 Having some way to
track users decreases
threats to safety (i.e.
Internet stalkers,
criminals, etc.)
Opinion
Lauren Milisits
What do we think?
Download