COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.

12
COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy

Transcript of COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.

Page 1: COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.

COMPUTING AT CARNEGIE MELLONSECTION I2

Privacy

Page 2: COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.

Introduction

Lauren Milisits

Page 3: COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.

What is PRIVACY?

The ability to seclude information and oneself Possible violations of privacy:

Cookies Google Maps (street view) Criminal Registration Criminal justice & inmates

Page 4: COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.

Background Information

Erika Tang

Page 5: COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.

History of Information Protection

Pre-Digital Eraprimary modes of communication and exchange had

physical evidence (i.e. paper trails)hard to invade a person's privacy without finding

tangible records of personal informationDawn of the Digital Agenew modes of communication and exchange

social networking sites email on-line shopping

 greater avenues for the violation of privacy identity theft, fraud,etc. no longer need paper trail to invade privacy

Page 6: COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.

Positive Aspects and Benefits

Emerson Hum

Page 7: COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.

Positive Aspects of Having Sufficient Privacy

Individual can do work in seclusion without revealing certain information about themselves

Individual has a level of security and confidentiality when on the computer

Individual has protection in conducting interactions with others such as payment transactions or chatting

Page 8: COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.

Steps Taken to Improve Privacy and Lessen the Effects of Privacy Invasion

Using non-common passwordsHTTPS connections provide security to

serversAbility to remove cookiesAvoiding sites that seem unreliable or fishyPrivacy invasion laws specific for computer

crimesInternet regulation to prevent others

committing frauds/scams to steal information

Page 9: COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.

Criticism

Like Li

Page 10: COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.

IN SUPPORT OF IN OPPOSITION OF

Users should be able to know exactly how their data is being used

Users should be able to express their views completely anonymously on the Internet

Government intervention to protect consumer privacy would stifle innovation

Having some way to track users decreases threats to safety (i.e. Internet stalkers, criminals, etc.)

Increased Internet Privacy?

Page 11: COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.

Opinion

Lauren Milisits

Page 12: COMPUTING AT CARNEGIE MELLON SECTION I2 Privacy. Introduction Lauren Milisits.

What do we think?