* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Document
Information security wikipedia , lookup
Business intelligence wikipedia , lookup
Computer security wikipedia , lookup
Open data in the United Kingdom wikipedia , lookup
Mass surveillance wikipedia , lookup
Internet privacy wikipedia , lookup
Online shaming wikipedia , lookup
Information privacy law wikipedia , lookup
Internet Ethics Presented by: Daniel Wu Kalven Wu Book Format Internet Ethics edited by Duncan Langford Compilation of works written by many authors Little opinions, mostly informational Published in 2000 Relation to Report Report - Laws and the Internet Copyrights Defamation John Mawhood and Daniel Tysver Presentation - Privacy and Security Related to Everyday Use Herman T. Tavani Outline What is Privacy? Privacy Theories Internet Enhanced Privacy Concerns Internet Specific Privacy Concerns Outline (cont.) What is Security? Two senses of Security Cryptography and Data Encryption Proposals for Internet Privacy and Internet Security What is Privacy? Interest that individuals have with respect to protecting personal information, personal property, and personal space Moral or Legal right ? Data Protection Privacy Theories Non-Intrusion theory Seclusion theory Control theory Limitation theory Control/Restricted Access theory Non-Intrusion Theory Article by Warren and Brandels (1890) ‘Being let alone’ ‘Being free from intrusion’ Problem: could be left alone but still no privacy. Seclusion Theory ‘Being alone’ Physical means in a state of solitude Differentiates Privacy with Liberty Confused Privacy with Solitude Person on a Deserted Island Control Theory One has Privacy iff one has control over information about oneself Choice – grant/deny access to info All or None Flaws Practical – Never able to have complete control over information about onself Theoretical – Can reveal every bit of information but still retain privacy Limitation Theory Limiting and restricting access of information in certain contexts Avoids confusion: Autonomy Liberty Solitude Problem: Underestimate role of control Confused with secrecy Control/Restricted Access Theory Privacy in a ‘situation’ if person is ‘protected from intrusion, interference, and information access by others’ Comprehensive account Situations Activity, relationship, storage/access of information Internet Enhanced Privacy Concern Privacy Issues before the Internet Dataveillance & Data Gathering Data Exchanging and Data Mining Dataveillance & Data Gathering Monitoring people’s actions or communications Not unique to Internet Click streams Direct Wiretapping Stalkers Web forms Indirect Log files Data Exchanging and Data Mining Sale of data to third parties Merging and matching of electronic records Data mining Unearth patterns and relationships between data Consumer groups Internet Specific Privacy Concern Cookie Search Engine Cookie Collect data With or without user’s knowledge Shopping cart Able to turn off Search Engine Retrieving personal information Information about Individual persons Persons with no knowledge of information on databases Searching on listservers, newsgroups, etc provides information about user history What is Security? ECS153 Privacy concerns is losing control of personal information to people who claim to need it Security concerns is fear of unauthorized access and manipulation of data by people who does not have a legitimate need of it Two senses of Security Concerns involving computer system vulnerability Viruses, worms, and other ‘rogue’ programs Protection from unauthorized access information that either Resides in databases Communicated over the Internet Cryptography and Data Encryption Prof. Rogaway studies cryptography Plain text, ciphertext, key Private Key Roman Era: Julius Caesar Public and Private Key, “Strong encryption” Proposals for Internet Privacy and Internet Security Anonymizer Crowds Onion Router Final Remarks Questions ? Comments Discussion