A Gift of Fire - CH #2
A Gift of Fire - CH #2
A Gift of Fire - CH #2
1-2
1-1
Opening Statements
Classmates will ask question
Class will then Vote on winner
1-4
1-3
1-2
1-4
1-3
To the Rescue
1-5
1-12
1-5
1-12
Linux
Many Flavors
Different Tasks
General, Forensics, Hacking
Different Formats
CD, DVD, USB, Floppy, Network
1-15
1-15
Using It
Ubuntu
Commitment to Users
Get It
Websites, Torrents
Books, Magazines
Burn it
CD, DVD, USB
Boot it
BIOS, Boot Key (F12 Dell)
1-16
1-17
1-16
Commitment to Users
Specs
Fourth edition
Sara Baase
Chapter 2:
Privacy
Slides prepared by Cyndi Chie and Sarah Frye. Fourth edition revisions by Sharon Gray.
1-18
1-20
1-19
A Gift of Fire
1-18
1-17
1-21
1-20
1-21
1
-21
21
Terminology:
Personal information any information
relating to an individual person.
Informed consent users being aware of what
information is collected and how it is used.
Invisible information gathering - collection of
personal information about a user without the
users knowledge.
Terminology:
Cookies Files a Web site stores on a visitors
computer.
Secondary use Use of personal information
for a purpose other than the purpose for
which it was provided.
Data mining Searching and analyzing
masses of data to find patterns and develop
new information or knowledge.
Location apps
Data sometimes stored and sent without
users knowledge
Terminology:
Computer matching Combining and
comparing information from different
databases (using social security number, for
example) to match records.
Computer profiling Analyzing data to
determine characteristics of people most
likely to engage in a certain behavior.
Discussion Questions
Have you seen opt-in and opt-out choices?
Where? How were they worded?
Were any of them deceptive?
What are some common elements of privacy
policies you have read?
New Technologies
Make possible noninvasive but deeply
revealing searches
Security cameras
Increased security
Decreased privacy
Discussion questions:
Should organizers at events which are
possible terrorist targets use such systems?
Should we allow them to screen for people
with unpaid parking tickets?
Data mining
Targeted ads
Informed consent
Do Not Track button in browsers
Social Networks
What we do
Discussion Questions
Is there information that you have posted to
the Web that you later removed? Why did you
remove it? Were there consequences to
posting the information?
Have you seen information that others have
posted about themselves that you would not
reveal about yourself?
What they do
Location Tracking
Location Tracking
TTools
l for
f parents
GPS tracking via cell phones or RFID
A Right to Be Forgotten
Government Systems
Government Systems
Databases:
Government Accountability Office (GAO) monitors government's privacy policies
Burden of proof and "fishing expeditions"
Data mining and computer matching to fight
terrorism
Government Systems
National ID Systems
National ID Systems
Discussion Questions:
What data does the government have about
you?
Who has access to the data?
How is your data protected?
Protecting Privacy
Encryption Policy
Transactions
Ownership of personal data
A basic legal framework: Enforcement of
agreements and contracts
Regulation
Free Market
k View
Freedom of consumers to make voluntary
agreements
Diversity of individual tastes and values
Response of the market to consumer
preferences
Usefulness of contracts
Flaws of regulatory solutions
Communications
Discussion Questions
How would the free market view and the
consumer protection view differ on errors in
Credit Bureau databases?
Who is the consumer in this situation?
Public-key cryptography
Wi t
Wiretapping
i and
d Email
E il Protection:
P t ti
Telephone
1934 Communications Act prohibited interception of
messages
1968 Omnibus Crime Control and Safe Streets Act
allowed wiretapping and electronic surveillance by
law-enforcement (with court order)
Email and other new communications
Electronic Communications Privacy Act of 1986 (ECPA)
extended the 1968 wiretapping laws to include
electronic communications, restricts government
access to email
Communications
Closing Thought
1-77
1-77