23
PRIVACY SECTION 2.1 CptS 401 Adam Carter

Privacy Section 2.1

  • Upload
    coby

  • View
    30

  • Download
    0

Embed Size (px)

DESCRIPTION

CptS 401 Adam Carter. Privacy Section 2.1. For Tomorrow's In-Class Activity. Form into groups of 4 Make sure someone in your group brings a digital camera to class! Your group can’t get credit for the activity without one. Quiz Question 1. - PowerPoint PPT Presentation

Citation preview

Page 1: Privacy Section 2.1

PRIVACYSECTION 2.1

CptS 401Adam Carter

Page 2: Privacy Section 2.1

For Tomorrow's In-Class Activity...

Form into groups of 4Make sure someone in your group brings a digital camera to class! Your group can’t get credit for the activity without one.

2

Page 3: Privacy Section 2.1

Quiz Question 1Which of the following is a key aspect of privacy, according to the book:A. Freedom from surveillanceB. Control of information about oneselfC. Freedom from intrusionD. All of the above

3

Page 4: Privacy Section 2.1

Quiz Question 1 AnswerD: All of the above (p. 45, 3 bullet points)

4

Page 5: Privacy Section 2.1

Quiz Question 2In a court case discussed in the book, the government asked Google to release people’s search queries in order to crack down on material deemed harmful to minors. Was this be a violation of privacy?A. No, because the search queries can be released

without identifying information (“anonymized”)B. No, because it is impossible to link a search query to

the person who made the search.C. Yes, because even if the search queries are stripped

of identifying information, it is still possible to link some of the queries to the people who made them.

D. None of the above.

5

Page 6: Privacy Section 2.1

Quiz Question 2 Answer/Quiz Question 3(C): “It was not difficult to deduce the

identity of some people, especially those who searched on their own name or address. A process called identified others” (p. 49). In this process, one identifies the individual from a set of anonymous data.

A. Identity tracking B. Re-identificationC. Identity deduction D. Unanonymizing

6

Page 7: Privacy Section 2.1

Quiz Question 3 Answer(B) “Re-identification means identifying the

individual from a set of anonymous data” (p. 49).

7

Page 8: Privacy Section 2.1

Quiz Question 4According to the book, the collection of personal information about a person without the person’s knowledge is known asA. Invisible information gatheringB. Personal data scrapingC. Private data surveillanceD. Data MiningE. None of the above

8

Page 9: Privacy Section 2.1

Quiz Question 4 Answer/Quiz Question 5(A): Invisible information gathering (p. 50)Which of the following is a technique used for invisible information gathering?A. Internet Service Provider data logsB. CookiesC. Supermarket club cardsD. Event data recorders in carsE. All of the above

9

Page 10: Privacy Section 2.1

Quiz Question 5 Answer E: All of the above (see p. 51).

Now let’s focus on online behavior…

10

Page 11: Privacy Section 2.1

Is Our Online Behavior Private? (Small Group Exercise) Anything we do online is recorded, at

least briefly, and linked to our computer, if not our name.

With your group, identify the benefits and drawbacks of this.

Do you want your online data to be tracked? Is there a way you can prevent your online behavior from being tracked?

Be prepared to discuss your conclusions

11

Page 12: Privacy Section 2.1

Online Invisible Information Gathering In the News!Many phone manufacturers (Apple, Google, Microsoft) track and store your location.

Is this an invasion of privacy?

12

Page 13: Privacy Section 2.1

Quiz Question 6The following privacy policy requires businesses to obtain explicit consent from a person for each use of the person’s personal information (by, e.g., checking a box):A. Informed consentB. Implied consentC. Opt inD. Opt outE. None of the above

13

Page 14: Privacy Section 2.1

Quiz Question 6 AnswerC: Opt-in (p. 53).

What about when people use an internet site that provides a free service with no explicit end-user agreement? What would be a reasonable business policy in this case?

14

Page 15: Privacy Section 2.1

Privacy Case Study 1 (Clicker)Ex. 2.9, p. 130: A company that supplies filtering software to schools to block access to objectionable websites sold statistical data about the websites visited by school children. The data did not identify the children or individual schools. Was this a privacy violation?A.YesB.NoC.UnsureWhy or why not? Discuss with group for 5 min.; apply ethical frameworks and privacy principles on p. 54

15

Page 16: Privacy Section 2.1

Privacy Case Study 2 (Clicker)Ex. 2.14, p. 130: People who fled hurricane Katrina left behind and lost important documents and records such as birth certificates, credit cars, property records, and employment records. A U.S agency proposed a new database where people could voluntarily store essential personal records in case of natural disasters. Is this a good idea?A.YesB.NoC.UnsureDiscuss pros and cons with group for 5 min.; apply ethical frameworks and privacy principles on p. 54

16

Page 17: Privacy Section 2.1

Privacy Case Study 3 (Clicker)Ex. 2.16, p. 131: A city government wants to track down people who run small businesses and do not pay the city’s $125 business license fee. The city hired a private detective to obtain IRS tax records of city residents and determine who has reported small-business income to the IRS but paid the license. Should this action by the city be permitted?A.YesB.NoC.UnsureDiscuss arguments for and against with group for 5 min.; apply ethical frameworks and privacy principles on p. 54

17

Page 18: Privacy Section 2.1

Case Study:Warfare with Unmanned Drones

One of the segments in Digital Nation explored the U.S. military’s use of unmanned drones to carry out military operations overseas. From the comfort of a sophisticated control room on a military base on U.S. soil, pilots carry out reconnaissance missions and bomb targets overseas. Drones have been known unintentionally to strike innocent people. Is it ethical for the military to operate unmanned drones?

18

Page 19: Privacy Section 2.1

Case Study: Unmanned Drones (Clicker Poll)Is it ethical for the military to operate unmanned drones? A. YesB. NoC. Not sure

19

Page 20: Privacy Section 2.1

Case Study:Computer Game Addiction

As reported in Digital Nation, many youths in spend inordinate amounts of time playing video games. They play so much that their educations and social relationships suffer. Should the government establish restrictions on gaming for minors? If so, what kinds of restrictions? How would they be enforced?

20

Page 21: Privacy Section 2.1

Case Study: Computer Game Addiction (Clicker Poll)Should the government establish restrictions on gaming for minors? A. YesB. NoC. Not sure

21

Page 22: Privacy Section 2.1

Case Study III (Discuss with Group)1. A man sued his health insurance

company because it would not pay for Viagra, a drug for treating male impotence. He argued that the insurer’s refusal to pay denied his right to a happy sex life.

A. Negative (claim) rightB. Positive (liberty) rightC. A mix of the two

22

Page 23: Privacy Section 2.1

Case Study IV (Discuss with Group)2. Two legislators who ran for reelection

lost. They sued an organization that sponsored ads criticizing their voting records. The former legislators argued that the organization interfered with their right to hold office.

A. Negative (claim) rightB. Positive (liberty) rightC. A mix of the two

23