Download Document

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Information security wikipedia , lookup

Business intelligence wikipedia , lookup

Computer security wikipedia , lookup

Open data in the United Kingdom wikipedia , lookup

Mass surveillance wikipedia , lookup

Internet privacy wikipedia , lookup

Online shaming wikipedia , lookup

Information privacy law wikipedia , lookup

Do Not Track legislation wikipedia , lookup

Privacy International wikipedia , lookup

Transcript
Internet Ethics
Presented by:
Daniel Wu
Kalven Wu
Book Format




Internet Ethics edited by Duncan
Langford
Compilation of works written by many
authors
Little opinions, mostly informational
Published in 2000
Relation to Report

Report - Laws and the Internet




Copyrights
Defamation
John Mawhood and Daniel Tysver
Presentation - Privacy and Security


Related to Everyday Use
Herman T. Tavani
Outline




What is Privacy?
Privacy Theories
Internet Enhanced Privacy Concerns
Internet Specific Privacy Concerns
Outline (cont.)




What is Security?
Two senses of Security
Cryptography and Data Encryption
Proposals for Internet Privacy and
Internet Security
What is Privacy?



Interest that individuals have with
respect to protecting personal
information, personal property, and
personal space
Moral or Legal right ?
Data Protection
Privacy Theories





Non-Intrusion theory
Seclusion theory
Control theory
Limitation theory
Control/Restricted Access theory
Non-Intrusion Theory




Article by Warren and Brandels (1890)
‘Being let alone’
‘Being free from intrusion’
Problem: could be left alone but still no
privacy.
Seclusion Theory





‘Being alone’
Physical means in a state of solitude
Differentiates Privacy with Liberty
Confused Privacy with Solitude
Person on a Deserted Island
Control Theory




One has Privacy iff one has control over
information about oneself
Choice – grant/deny access to info
All or None
Flaws


Practical – Never able to have complete control
over information about onself
Theoretical – Can reveal every bit of information
but still retain privacy
Limitation Theory


Limiting and restricting access of
information in certain contexts
Avoids confusion:





Autonomy
Liberty
Solitude
Problem: Underestimate role of control
Confused with secrecy
Control/Restricted Access
Theory



Privacy in a ‘situation’ if person is
‘protected from intrusion, interference,
and information access by others’
Comprehensive account
Situations

Activity, relationship, storage/access of
information
Internet Enhanced Privacy
Concern



Privacy Issues before the Internet
Dataveillance & Data Gathering
Data Exchanging and Data Mining
Dataveillance & Data
Gathering


Monitoring people’s actions or
communications
Not unique to Internet




Click streams
Direct


Wiretapping
Stalkers
Web forms
Indirect

Log files
Data Exchanging and Data
Mining



Sale of data to third parties
Merging and matching of electronic
records
Data mining


Unearth patterns and relationships
between data
Consumer groups
Internet Specific Privacy
Concern


Cookie
Search Engine
Cookie




Collect data
With or without user’s knowledge
Shopping cart
Able to turn off
Search Engine


Retrieving personal information
Information about Individual persons


Persons with no knowledge of information
on databases
Searching on listservers, newsgroups,
etc provides information about user
history
What is Security?



ECS153
Privacy concerns is losing control of
personal information to people who
claim to need it
Security concerns is fear of
unauthorized access and manipulation
of data by people who does not have a
legitimate need of it
Two senses of Security

Concerns involving computer system
vulnerability


Viruses, worms, and other ‘rogue’
programs
Protection from unauthorized access
information that either


Resides in databases
Communicated over the Internet
Cryptography and Data
Encryption



Prof. Rogaway studies cryptography
Plain text, ciphertext, key
Private Key


Roman Era: Julius Caesar
Public and Private Key, “Strong
encryption”
Proposals for Internet Privacy
and Internet Security



Anonymizer
Crowds
Onion Router
Final Remarks



Questions ?
Comments
Discussion