SlideShare a Scribd company logo
1 of 8
Download to read offline
Case Study on Computer Privacy
Dr. Varun Kumar
Dr. Varun Kumar (IIIT Surat) Lecture-13 1 / 8
Outlines
1 Scenario
Fund Raising and Potential Donors
Taking Work Home
Workplace Monitoring
Data Mining
Dr. Varun Kumar (IIIT Surat) Lecture-13 2 / 8
Introduction
⇒ Ms Reshma studies computer science at university.
⇒ She wishes to be involved in public service.
⇒ She accepts a fund-raising job for a big university.
⇒ She is asked to get information on Ramesh (potential donor).
⇒ Using the Internet and databases, Reshma was able to find out the
following:
Via a public database, his board memberships
Via databases of associated organizations, contributions he has made
to others and his support for any religious organizations
Newspaper archives → information written about Ramesh
Governmental records → if he has had any encounter with the law
Credit card agencies → his credit history
⇒ Other routes that Reshma tried to get information include:
Contacting Amazon.com about the types of books he read
Dr. Varun Kumar (IIIT Surat) Lecture-13 3 / 8
Continued–
Wonders if his ISP will tell her about his online activities
From the university records she finds that he was treated at the
university hospital.
She finds that she can access his medical records and discovers that
he was treated successfully for a kidney complaint.
⇒ She then proceeds to recommends that he be approached for a
donation for kidney research.
Q Discuss whether or not you think she has done anything wrong?
Dr. Varun Kumar (IIIT Surat) Lecture-13 4 / 8
Taking work home
⇒ Max works for a government department working against alcoholism.
⇒ The department maintains a database of people with these problems.
⇒ Max’s job is to track the success or failure of treatment programs.
He has to prepare a report indicating:
Number of clients seen per month in each program
Length of client treatment
Criminal history of clients
Distribution addresses
⇒ He gets this information from various databases located in different
locations.
⇒ He downloads information to his computer in his office, then copies
the data to hard drive and takes that home to finish his report there.
⇒ However, he also leaves a copy of the information and the report on
his machine at home.
Dr. Varun Kumar (IIIT Surat) Lecture-13 5 / 8
Continued
Q Is he wrong to move the data to his house and is he wrong to
leave the data there when he is done with the report.
Q What policy should Maxs agency have concerning taking work
home? Discuss.
Workplace Monitoring
⇒ Estelle works for Medical Insurance Company.
⇒ She supervises the claims department and her brief is to improve
efficiency there each unit must process a minimum number of claims
per day.
⇒ In order to achieve this goal, she installs a software system which
monitors:
The number of claims processed by each clerk
Number of keystrokes done by each clerk
Log information on when each clerk is on or off his/her post
Dr. Varun Kumar (IIIT Surat) Lecture-13 6 / 8
Continued
⇒ The system allows her to watch all the above information in real-time
on her screen.
⇒ She can also see all e-mails sent by each clerk regardless of whether
the e-mail is business-related or not.
Q Should she use this system and if so should each of the clerk be
informed?
Q Do you think any limitations should be placed on companies
employing such systems? Discuss.
Data Mining
⇒ Ravi works for a credit card company, developing new products.
⇒ He read about data mining and convinces his supervisor to buy this
tool.
Dr. Varun Kumar (IIIT Surat) Lecture-13 7 / 8
Continued
⇒ With this tool Ravi can get information on customers buying habits,
as well as finds out postal codes correlation to loan defaults.
⇒ Based on this new information a new policy can be formulated
resulting in his company refusing credits to clients in bad postal code
areas.
⇒ Doing this could reduce his companys exposure to bad loans.
⇒ Ravi also discovers that Zoroastrians who donate to charity charges a
substantial amount to their credit cards.
⇒ He promptly recommends a new policy of soliciting more Zoroastrians
for credit card in hope of increasing his companys profit.
Q Are either of these two recommendations wrong? What about
the way Ravi use these information?
Q Is the company wrong by implement these policies? Discuss.
Dr. Varun Kumar (IIIT Surat) Lecture-13 8 / 8

More Related Content

What's hot

Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Records Retention And Destruction Policies
Records Retention And Destruction PoliciesRecords Retention And Destruction Policies
Records Retention And Destruction PoliciesRichard Austin
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacyhimanshu jain
 
Understanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsUnderstanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsSARON MESSEMBE OBIA
 
Final moot problem 2012
Final moot problem 2012Final moot problem 2012
Final moot problem 2012siddhesh20sep
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment9945446746
 
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018Talwant Singh
 
Law case study by neetu
Law case study by neetuLaw case study by neetu
Law case study by neetuNeetu Marwah
 

What's hot (13)

Cyber law
Cyber lawCyber law
Cyber law
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Records Retention And Destruction Policies
Records Retention And Destruction PoliciesRecords Retention And Destruction Policies
Records Retention And Destruction Policies
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
Understanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsUnderstanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminals
 
Internship diary by ronak
Internship diary by ronakInternship diary by ronak
Internship diary by ronak
 
Еврокод 7
Еврокод 7Еврокод 7
Еврокод 7
 
Final moot problem 2012
Final moot problem 2012Final moot problem 2012
Final moot problem 2012
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment
 
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
 
Law case study by neetu
Law case study by neetuLaw case study by neetu
Law case study by neetu
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 

Similar to Case Study on Computer Privacy

Investigating Data Trials
Investigating Data TrialsInvestigating Data Trials
Investigating Data TrialsVARUN KUMAR
 
SDNC13 -Day1- The Danger of Big Data by Kerry Bodine
SDNC13 -Day1- The Danger of Big Data by Kerry BodineSDNC13 -Day1- The Danger of Big Data by Kerry Bodine
SDNC13 -Day1- The Danger of Big Data by Kerry BodineService Design Network
 
Social networking mobile apps framework for organizing and facilitating chari...
Social networking mobile apps framework for organizing and facilitating chari...Social networking mobile apps framework for organizing and facilitating chari...
Social networking mobile apps framework for organizing and facilitating chari...journalBEEI
 
Introduction to Censorship
Introduction to Censorship Introduction to Censorship
Introduction to Censorship VARUN KUMAR
 
 Now draw a box, divide this box into various segments to make home page tit...
	Now draw a box, divide this box into various segments to make home page tit...	Now draw a box, divide this box into various segments to make home page tit...
 Now draw a box, divide this box into various segments to make home page tit...GOVINDANM2
 
Final Ist 490 Project
Final Ist 490 ProjectFinal Ist 490 Project
Final Ist 490 ProjectKyle Wardle
 
New Possibility in Computing
New Possibility in ComputingNew Possibility in Computing
New Possibility in ComputingVARUN KUMAR
 
FREE 6 Sample Informative Essay Templates In MS Word
FREE 6 Sample Informative Essay Templates In MS WordFREE 6 Sample Informative Essay Templates In MS Word
FREE 6 Sample Informative Essay Templates In MS WordSandra Long
 
01232014 IFSM 305 – Case Study Description Page 1 U.docx
01232014 IFSM 305 – Case Study Description Page  1  U.docx01232014 IFSM 305 – Case Study Description Page  1  U.docx
01232014 IFSM 305 – Case Study Description Page 1 U.docxmercysuttle
 
Data Collection Tool Used For Information About Individuals
Data Collection Tool Used For Information About IndividualsData Collection Tool Used For Information About Individuals
Data Collection Tool Used For Information About IndividualsChristy Hunt
 
11292015 IFSM 305 – Case Study Page 1 UMUC Family .docx
 11292015 IFSM 305 – Case Study Page  1  UMUC Family .docx 11292015 IFSM 305 – Case Study Page  1  UMUC Family .docx
11292015 IFSM 305 – Case Study Page 1 UMUC Family .docxaryan532920
 
TINU Healthcare Startup idea
TINU Healthcare Startup ideaTINU Healthcare Startup idea
TINU Healthcare Startup ideaHarshadaPawar26
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningVARUN KUMAR
 
Using research to inform service design
Using research to inform service design Using research to inform service design
Using research to inform service design Ana Cecilia Santos
 

Similar to Case Study on Computer Privacy (18)

Final Documentation
Final DocumentationFinal Documentation
Final Documentation
 
Investigating Data Trials
Investigating Data TrialsInvestigating Data Trials
Investigating Data Trials
 
SDNC13 -Day1- The Danger of Big Data by Kerry Bodine
SDNC13 -Day1- The Danger of Big Data by Kerry BodineSDNC13 -Day1- The Danger of Big Data by Kerry Bodine
SDNC13 -Day1- The Danger of Big Data by Kerry Bodine
 
Social networking mobile apps framework for organizing and facilitating chari...
Social networking mobile apps framework for organizing and facilitating chari...Social networking mobile apps framework for organizing and facilitating chari...
Social networking mobile apps framework for organizing and facilitating chari...
 
Introduction to Censorship
Introduction to Censorship Introduction to Censorship
Introduction to Censorship
 
 Now draw a box, divide this box into various segments to make home page tit...
	Now draw a box, divide this box into various segments to make home page tit...	Now draw a box, divide this box into various segments to make home page tit...
 Now draw a box, divide this box into various segments to make home page tit...
 
Final Ist 490 Project
Final Ist 490 ProjectFinal Ist 490 Project
Final Ist 490 Project
 
New Possibility in Computing
New Possibility in ComputingNew Possibility in Computing
New Possibility in Computing
 
60079068 case-study
60079068 case-study60079068 case-study
60079068 case-study
 
FREE 6 Sample Informative Essay Templates In MS Word
FREE 6 Sample Informative Essay Templates In MS WordFREE 6 Sample Informative Essay Templates In MS Word
FREE 6 Sample Informative Essay Templates In MS Word
 
60079918 case-study
60079918 case-study60079918 case-study
60079918 case-study
 
01232014 IFSM 305 – Case Study Description Page 1 U.docx
01232014 IFSM 305 – Case Study Description Page  1  U.docx01232014 IFSM 305 – Case Study Description Page  1  U.docx
01232014 IFSM 305 – Case Study Description Page 1 U.docx
 
103.government health solutions
103.government health solutions103.government health solutions
103.government health solutions
 
Data Collection Tool Used For Information About Individuals
Data Collection Tool Used For Information About IndividualsData Collection Tool Used For Information About Individuals
Data Collection Tool Used For Information About Individuals
 
11292015 IFSM 305 – Case Study Page 1 UMUC Family .docx
 11292015 IFSM 305 – Case Study Page  1  UMUC Family .docx 11292015 IFSM 305 – Case Study Page  1  UMUC Family .docx
11292015 IFSM 305 – Case Study Page 1 UMUC Family .docx
 
TINU Healthcare Startup idea
TINU Healthcare Startup ideaTINU Healthcare Startup idea
TINU Healthcare Startup idea
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
Using research to inform service design
Using research to inform service design Using research to inform service design
Using research to inform service design
 

More from VARUN KUMAR

Distributed rc Model
Distributed rc ModelDistributed rc Model
Distributed rc ModelVARUN KUMAR
 
Electrical Wire Model
Electrical Wire ModelElectrical Wire Model
Electrical Wire ModelVARUN KUMAR
 
Interconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignInterconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignVARUN KUMAR
 
Introduction to Digital VLSI Design
Introduction to Digital VLSI DesignIntroduction to Digital VLSI Design
Introduction to Digital VLSI DesignVARUN KUMAR
 
Challenges of Massive MIMO System
Challenges of Massive MIMO SystemChallenges of Massive MIMO System
Challenges of Massive MIMO SystemVARUN KUMAR
 
E-democracy or Digital Democracy
E-democracy or Digital DemocracyE-democracy or Digital Democracy
E-democracy or Digital DemocracyVARUN KUMAR
 
Ethics of Parasitic Computing
Ethics of Parasitic ComputingEthics of Parasitic Computing
Ethics of Parasitic ComputingVARUN KUMAR
 
Action Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionAction Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionVARUN KUMAR
 
Geneva Plan of Action
Geneva Plan of ActionGeneva Plan of Action
Geneva Plan of ActionVARUN KUMAR
 
Fair Use in the Electronic Age
Fair Use in the Electronic AgeFair Use in the Electronic Age
Fair Use in the Electronic AgeVARUN KUMAR
 
Software as a Property
Software as a PropertySoftware as a Property
Software as a PropertyVARUN KUMAR
 
Orthogonal Polynomial
Orthogonal PolynomialOrthogonal Polynomial
Orthogonal PolynomialVARUN KUMAR
 
Patent Protection
Patent ProtectionPatent Protection
Patent ProtectionVARUN KUMAR
 
Copyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy LawCopyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy LawVARUN KUMAR
 
Property Right and Software
Property Right and SoftwareProperty Right and Software
Property Right and SoftwareVARUN KUMAR
 
Gaussian Numerical Integration
Gaussian Numerical IntegrationGaussian Numerical Integration
Gaussian Numerical IntegrationVARUN KUMAR
 
Censorship and Controversy
Censorship and ControversyCensorship and Controversy
Censorship and ControversyVARUN KUMAR
 
Romberg's Integration
Romberg's IntegrationRomberg's Integration
Romberg's IntegrationVARUN KUMAR
 
Protect your online privacy-2
Protect your online privacy-2Protect your online privacy-2
Protect your online privacy-2VARUN KUMAR
 
Interception Act vs Privacy Act
Interception Act vs Privacy ActInterception Act vs Privacy Act
Interception Act vs Privacy ActVARUN KUMAR
 

More from VARUN KUMAR (20)

Distributed rc Model
Distributed rc ModelDistributed rc Model
Distributed rc Model
 
Electrical Wire Model
Electrical Wire ModelElectrical Wire Model
Electrical Wire Model
 
Interconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignInterconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI Design
 
Introduction to Digital VLSI Design
Introduction to Digital VLSI DesignIntroduction to Digital VLSI Design
Introduction to Digital VLSI Design
 
Challenges of Massive MIMO System
Challenges of Massive MIMO SystemChallenges of Massive MIMO System
Challenges of Massive MIMO System
 
E-democracy or Digital Democracy
E-democracy or Digital DemocracyE-democracy or Digital Democracy
E-democracy or Digital Democracy
 
Ethics of Parasitic Computing
Ethics of Parasitic ComputingEthics of Parasitic Computing
Ethics of Parasitic Computing
 
Action Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionAction Lines of Geneva Plan of Action
Action Lines of Geneva Plan of Action
 
Geneva Plan of Action
Geneva Plan of ActionGeneva Plan of Action
Geneva Plan of Action
 
Fair Use in the Electronic Age
Fair Use in the Electronic AgeFair Use in the Electronic Age
Fair Use in the Electronic Age
 
Software as a Property
Software as a PropertySoftware as a Property
Software as a Property
 
Orthogonal Polynomial
Orthogonal PolynomialOrthogonal Polynomial
Orthogonal Polynomial
 
Patent Protection
Patent ProtectionPatent Protection
Patent Protection
 
Copyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy LawCopyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy Law
 
Property Right and Software
Property Right and SoftwareProperty Right and Software
Property Right and Software
 
Gaussian Numerical Integration
Gaussian Numerical IntegrationGaussian Numerical Integration
Gaussian Numerical Integration
 
Censorship and Controversy
Censorship and ControversyCensorship and Controversy
Censorship and Controversy
 
Romberg's Integration
Romberg's IntegrationRomberg's Integration
Romberg's Integration
 
Protect your online privacy-2
Protect your online privacy-2Protect your online privacy-2
Protect your online privacy-2
 
Interception Act vs Privacy Act
Interception Act vs Privacy ActInterception Act vs Privacy Act
Interception Act vs Privacy Act
 

Recently uploaded

Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdfAlexander Litvinenko
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information SystemsAnge Felix NSANZIYERA
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)ChandrakantDivate1
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxMustafa Ahmed
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Danikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdfDanikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdfthietkevietthinh
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptjigup7320
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxhublikarsn
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Compressing and Sparsifying LLM in GenAI Applications
Compressing and Sparsifying LLM in GenAI ApplicationsCompressing and Sparsifying LLM in GenAI Applications
Compressing and Sparsifying LLM in GenAI ApplicationsMFatihSIRA
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 

Recently uploaded (20)

Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Danikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdfDanikor Product Catalog- Screw Feeder.pdf
Danikor Product Catalog- Screw Feeder.pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Compressing and Sparsifying LLM in GenAI Applications
Compressing and Sparsifying LLM in GenAI ApplicationsCompressing and Sparsifying LLM in GenAI Applications
Compressing and Sparsifying LLM in GenAI Applications
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 

Case Study on Computer Privacy

  • 1. Case Study on Computer Privacy Dr. Varun Kumar Dr. Varun Kumar (IIIT Surat) Lecture-13 1 / 8
  • 2. Outlines 1 Scenario Fund Raising and Potential Donors Taking Work Home Workplace Monitoring Data Mining Dr. Varun Kumar (IIIT Surat) Lecture-13 2 / 8
  • 3. Introduction ⇒ Ms Reshma studies computer science at university. ⇒ She wishes to be involved in public service. ⇒ She accepts a fund-raising job for a big university. ⇒ She is asked to get information on Ramesh (potential donor). ⇒ Using the Internet and databases, Reshma was able to find out the following: Via a public database, his board memberships Via databases of associated organizations, contributions he has made to others and his support for any religious organizations Newspaper archives → information written about Ramesh Governmental records → if he has had any encounter with the law Credit card agencies → his credit history ⇒ Other routes that Reshma tried to get information include: Contacting Amazon.com about the types of books he read Dr. Varun Kumar (IIIT Surat) Lecture-13 3 / 8
  • 4. Continued– Wonders if his ISP will tell her about his online activities From the university records she finds that he was treated at the university hospital. She finds that she can access his medical records and discovers that he was treated successfully for a kidney complaint. ⇒ She then proceeds to recommends that he be approached for a donation for kidney research. Q Discuss whether or not you think she has done anything wrong? Dr. Varun Kumar (IIIT Surat) Lecture-13 4 / 8
  • 5. Taking work home ⇒ Max works for a government department working against alcoholism. ⇒ The department maintains a database of people with these problems. ⇒ Max’s job is to track the success or failure of treatment programs. He has to prepare a report indicating: Number of clients seen per month in each program Length of client treatment Criminal history of clients Distribution addresses ⇒ He gets this information from various databases located in different locations. ⇒ He downloads information to his computer in his office, then copies the data to hard drive and takes that home to finish his report there. ⇒ However, he also leaves a copy of the information and the report on his machine at home. Dr. Varun Kumar (IIIT Surat) Lecture-13 5 / 8
  • 6. Continued Q Is he wrong to move the data to his house and is he wrong to leave the data there when he is done with the report. Q What policy should Maxs agency have concerning taking work home? Discuss. Workplace Monitoring ⇒ Estelle works for Medical Insurance Company. ⇒ She supervises the claims department and her brief is to improve efficiency there each unit must process a minimum number of claims per day. ⇒ In order to achieve this goal, she installs a software system which monitors: The number of claims processed by each clerk Number of keystrokes done by each clerk Log information on when each clerk is on or off his/her post Dr. Varun Kumar (IIIT Surat) Lecture-13 6 / 8
  • 7. Continued ⇒ The system allows her to watch all the above information in real-time on her screen. ⇒ She can also see all e-mails sent by each clerk regardless of whether the e-mail is business-related or not. Q Should she use this system and if so should each of the clerk be informed? Q Do you think any limitations should be placed on companies employing such systems? Discuss. Data Mining ⇒ Ravi works for a credit card company, developing new products. ⇒ He read about data mining and convinces his supervisor to buy this tool. Dr. Varun Kumar (IIIT Surat) Lecture-13 7 / 8
  • 8. Continued ⇒ With this tool Ravi can get information on customers buying habits, as well as finds out postal codes correlation to loan defaults. ⇒ Based on this new information a new policy can be formulated resulting in his company refusing credits to clients in bad postal code areas. ⇒ Doing this could reduce his companys exposure to bad loans. ⇒ Ravi also discovers that Zoroastrians who donate to charity charges a substantial amount to their credit cards. ⇒ He promptly recommends a new policy of soliciting more Zoroastrians for credit card in hope of increasing his companys profit. Q Are either of these two recommendations wrong? What about the way Ravi use these information? Q Is the company wrong by implement these policies? Discuss. Dr. Varun Kumar (IIIT Surat) Lecture-13 8 / 8