SlideShare a Scribd company logo
SOSIO INFORMATIKA
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS TEKNIK DAN ILMU KOMPUTER
20192019
Socio Informatics
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS TEKNIK DAN ILMU KOMPUTER
20192019
Yusra Fernando, M.Komyusra.fernando@teknokrat.ac.id
CONTACT ME
2
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS TEKNIK DAN ILMU KOMPUTER
20192019
Socio Informatics
Anonymity, Security, Privacy and Civil Liberties
Ethical and Social...J.M.Kizza 4
Surveys the tradi-tional ethical issues of privacy, security, anonymity and analyzes
how these issues are affected by computer technology. Information gathering,
databasing, and civil liberties are also discussed.
Objectives Learn
Ethical and Social...J.M.Kizza 5
Anonymity, Security, Privacy and Civil Liberties
• Introduction
• Anonymity
• Security
• Privacy
• Ethical and Social Issues
Ethical and Social...J.M.Kizza 6
Introduction
• Information has increased in value
• The demand for information is high due to:
• High digitalization of information and increasing bandwidth.
• Declining costs of digital communication.
• Increased miniaturization of portable computers and other communications
equipment.
• Greater public awareness by the news media of the potential abuse of digital
communication, especially the Internet.
• The danger for misuse is real
Ethical and Social...J.M.Kizza 7
Anonymity
• Absence of identity
• There are two types of identity:
• Pseudo
• Untraceable
• Anonymity on the Internet
• Email
• Other postings
Ethical and Social...J.M.Kizza 8
Security
• Means to prevent unauthorized access
• Consists of:
• Confidentiality - to prevent unauthorized disclosure of information to third
parties.
• Integrity - to prevent unauthorized modification of files and maintain the status quo
• Availability -: to prevent unauthorized withholding of information from those who need
it when they need it.
• Physical security – guaranteed by:
• Deterrence
• Prevention
• Detection
• Response
Ethical and Social...J.M.Kizza 9
Security…
• Perimeter security
• Fence
• Dog
• Guards
• Firewalls
• Proxy - individual client requests conform to the pre-set conditions, then the
firewall acts on the request
• Filter -these are packet-level filters
• Stateful Inspection: These firewalls combine the filter and proxy
functionalities.
• Passwords
Ethical and Social...J.M.Kizza 10
Information Security
• Encryption
• Plaintext
• Ciphertext
• Types:
• Symmetric (fig 5.1)
• Asymmetric (fig 5.2)
Encryption standards
• RSA
• DES
• PEMS
• PGP
• Authentication (fig 5.3)
Ethical and Social...J.M.Kizza 11
Privacy
• Human value consists of:
• Right to control external influences on individual
information:
• Solitude - right to be alone
• Anonymity – right to have no public identity
• Intimacy – right not to be monitored
• Right to control personal information:
• Reserve – right to control one’s information
Ethical and Social...J.M.Kizza 12
Value of Privacy
• Safeguard personal identity
• Preserve individual autonomy in decision-making
• Less known information,more autonomy
• Support social relationships
• Worthiness
Ethical and Social...J.M.Kizza 13
Information Gathering, Databases, and Privacy
• Who has your name on a list and what they're doing with it?
• companies you have done business with.
• Individuals
• Government agencies
• The U.S. Graham-Leach-Bliley Financial Services Modernization Act - protect the customer
through three requirements that the institutions must disclose to us:
• Privacy Policy: through which the institution is bound to tell us the types of information the institution
collects and has about us and how it uses that information.
• Right to Opt-Out: through which the institution is bound to explain our recourse to prevent the transfer
of our data to third party beneficiaries.
• Safeguards: through which the institution must put in place policies to prevent fraudulent access to
confidential financial information.
Ethical and Social...J.M.Kizza 14
• The Opt-in clause, which was not included in the Act despite strong support from
privacy and consumer activists, would have prohibited a financial institution from
sharing or selling our data without our consent.
• The opt-out option, which eventually was included in the Act after, the opt-in
clause lost, gives us, the customers, implied consent, if we fail to return the Opt-
out notices above sent to us by these institutions.
Opt-in/Opt-out
Ethical and Social...J.M.Kizza 15
Privacy Violations
• Intrusion – wrongful entry ( hacking)
• Misuse of information
• we involuntarily give off personal information
• businesses collect it
• Interception of information
• eavesdropping
• Surveillance
• Echelon/TEMPEST
• Information matching using unrelated databases -usually illegally
Ethical and Social...J.M.Kizza 16
Privacy Protection
• Is it possible? -Rapid advances in computer technology, and in particular the advent of the
Internet, have all created an environment where detailed information on individuals and
products can very easily and cheaply be moved, merged, marched, compared and shared.
• Guidelines and structures that safeguard and protected privacy rights.
• These structures and guideline, on the average fall under the following categories:
• Technical - through the use of software and other technical based safeguards and also education of
users and consumers to carry out self-regulation.
• contractual –through which information like electronic publication and how such information is
disseminated are given contractual and technological protection against unauthorized reproduction
or distribution.
• legal – through the enactment of laws by national legislatures and enforcement of such laws by the
law enforcement agencies. (see pp. 118 - 119)
• Through individual efforts ( be vigilant)
Ethical and Social...J.M.Kizza 17
Ethical and Social Issues
• The ethics of privacy - with the advent of the Internet and electronic
messages, confidentiality is a great concern. Computer technology
has raised more privacy questions than it has found answers to
• The ethics of security - the Internet is an insecure communications
channel when it is used by a criminal.
Thank You ..
UNIVERSITAS TEKNOKRAT INDONESIA
FAKULTAS TEKNIK DAN ILMU KOMPUTER
YUSRA FERNANDO, S.KOM., M.KOM
20192019

More Related Content

What's hot

Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
mrzapper
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
Willislwhite12
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
Laguna State Polytechnic University
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2
MLG College of Learning, Inc
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
Integral university, India
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
sappingtonkr
 
Professionalism, Ethics, IT & the Law - CIPS Ontario
Professionalism, Ethics, IT & the Law - CIPS OntarioProfessionalism, Ethics, IT & the Law - CIPS Ontario
Professionalism, Ethics, IT & the Law - CIPS Ontario
Lou Milrad
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 
ICO Presentation - Data Protection
ICO Presentation - Data ProtectionICO Presentation - Data Protection
ICO Presentation - Data Protection
NICVA
 
Lawek mui
Lawek muiLawek mui
Lawek mui
Mui Lawek
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber Security
NICVA
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
Maria Stella Solon
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.
vitor94
 
Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
university of education,Lahore
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
Syaiful Ahdan
 
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
IGF Indonesia
 
Digital law
Digital lawDigital law
Digital law
Jennifer Carmack
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
mtvvvv
 

What's hot (19)

Chapter 3 ethics and privacy
Chapter 3 ethics and privacyChapter 3 ethics and privacy
Chapter 3 ethics and privacy
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
Professionalism, Ethics, IT & the Law - CIPS Ontario
Professionalism, Ethics, IT & the Law - CIPS OntarioProfessionalism, Ethics, IT & the Law - CIPS Ontario
Professionalism, Ethics, IT & the Law - CIPS Ontario
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
ICO Presentation - Data Protection
ICO Presentation - Data ProtectionICO Presentation - Data Protection
ICO Presentation - Data Protection
 
Lawek mui
Lawek muiLawek mui
Lawek mui
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber Security
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.
 
Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
 
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
 
Digital law
Digital lawDigital law
Digital law
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 

Similar to Chp 05 anonymity, security, privacy and civil liberties (shared)

Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
AgeFriendlyEconomy
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
Perry Slack
 
PP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptxPP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptx
MuhammadAbdullah201796
 
Computer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfComputer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdf
mt5854804210
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
Data-Set
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
TechSoup Canada
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
Ehsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics FrameworksEhsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics Frameworks
Ehsan kabir Solicitor
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
stirlingvwriters
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
Chande Kasita
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
Tom Walker
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
Glenn E. Davis
 
ETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital EmpowermentETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital Empowerment
nellykelly1663
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Frocomm Australia
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
Arianto Muditomo
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy Regulation
Mercatus Center
 
UNIT V.pptx
UNIT V.pptxUNIT V.pptx
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
Hector Dominguez
 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptx
JaeKim165097
 

Similar to Chp 05 anonymity, security, privacy and civil liberties (shared) (20)

Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
PP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptxPP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptx
 
Computer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfComputer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdf
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Ehsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics FrameworksEhsan Kabir Solicitor-Ethics Frameworks
Ehsan Kabir Solicitor-Ethics Frameworks
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
ETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital EmpowermentETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital Empowerment
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy Regulation
 
UNIT V.pptx
UNIT V.pptxUNIT V.pptx
UNIT V.pptx
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptx
 

More from YUSRA FERNANDO

Vs Code - Keyboard-Shortcuts-Windows.pdf
Vs Code - Keyboard-Shortcuts-Windows.pdfVs Code - Keyboard-Shortcuts-Windows.pdf
Vs Code - Keyboard-Shortcuts-Windows.pdf
YUSRA FERNANDO
 
Chp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdfChp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdf
YUSRA FERNANDO
 
Chp 04 - Hardware PTI - (Shared).pdf
Chp 04 - Hardware PTI - (Shared).pdfChp 04 - Hardware PTI - (Shared).pdf
Chp 04 - Hardware PTI - (Shared).pdf
YUSRA FERNANDO
 
7. DATA RESOURCE MANAGEMENT.pdf
7. DATA RESOURCE MANAGEMENT.pdf7. DATA RESOURCE MANAGEMENT.pdf
7. DATA RESOURCE MANAGEMENT.pdf
YUSRA FERNANDO
 
8. IT and Decision Making.pdf
8. IT and Decision Making.pdf8. IT and Decision Making.pdf
8. IT and Decision Making.pdf
YUSRA FERNANDO
 
06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdf06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdf
YUSRA FERNANDO
 
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
YUSRA FERNANDO
 
Bab 1 pengantar desain web
Bab 1   pengantar desain webBab 1   pengantar desain web
Bab 1 pengantar desain web
YUSRA FERNANDO
 
Chapter 3.3 css - tugas css (shared)
Chapter 3.3   css - tugas css (shared)Chapter 3.3   css - tugas css (shared)
Chapter 3.3 css - tugas css (shared)
YUSRA FERNANDO
 
Javascript yusra 2021 (shared)
Javascript   yusra 2021 (shared)Javascript   yusra 2021 (shared)
Javascript yusra 2021 (shared)
YUSRA FERNANDO
 
3. latihan css 01 (shared)
3. latihan css   01 (shared)3. latihan css   01 (shared)
3. latihan css 01 (shared)
YUSRA FERNANDO
 
2 property css (shared)
2   property css (shared)2   property css (shared)
2 property css (shared)
YUSRA FERNANDO
 
Css pengenalan css
Css   pengenalan cssCss   pengenalan css
Css pengenalan css
YUSRA FERNANDO
 
Chapter 1 introduction html (shared)
Chapter 1   introduction html (shared)Chapter 1   introduction html (shared)
Chapter 1 introduction html (shared)
YUSRA FERNANDO
 
Chapter 00 introduction - web desain -(shared)
Chapter 00   introduction - web desain -(shared)Chapter 00   introduction - web desain -(shared)
Chapter 00 introduction - web desain -(shared)
YUSRA FERNANDO
 
Kepribadian dan Nilai
Kepribadian dan NilaiKepribadian dan Nilai
Kepribadian dan Nilai
YUSRA FERNANDO
 
Emosi dan Suasana Hati
Emosi dan Suasana HatiEmosi dan Suasana Hati
Emosi dan Suasana Hati
YUSRA FERNANDO
 
Sikap dan Kepuasan Kerja
Sikap dan Kepuasan KerjaSikap dan Kepuasan Kerja
Sikap dan Kepuasan Kerja
YUSRA FERNANDO
 
Konsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku OrganisasiKonsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku Organisasi
YUSRA FERNANDO
 
Konsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku OrganisasiKonsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku Organisasi
YUSRA FERNANDO
 

More from YUSRA FERNANDO (20)

Vs Code - Keyboard-Shortcuts-Windows.pdf
Vs Code - Keyboard-Shortcuts-Windows.pdfVs Code - Keyboard-Shortcuts-Windows.pdf
Vs Code - Keyboard-Shortcuts-Windows.pdf
 
Chp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdfChp 03 - Software PTI - (Shared).pdf
Chp 03 - Software PTI - (Shared).pdf
 
Chp 04 - Hardware PTI - (Shared).pdf
Chp 04 - Hardware PTI - (Shared).pdfChp 04 - Hardware PTI - (Shared).pdf
Chp 04 - Hardware PTI - (Shared).pdf
 
7. DATA RESOURCE MANAGEMENT.pdf
7. DATA RESOURCE MANAGEMENT.pdf7. DATA RESOURCE MANAGEMENT.pdf
7. DATA RESOURCE MANAGEMENT.pdf
 
8. IT and Decision Making.pdf
8. IT and Decision Making.pdf8. IT and Decision Making.pdf
8. IT and Decision Making.pdf
 
06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdf06 - IT Infrastructure (shared).pdf
06 - IT Infrastructure (shared).pdf
 
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
Fox, Richard - Information Technology _ An Introduction for Today’s Digital W...
 
Bab 1 pengantar desain web
Bab 1   pengantar desain webBab 1   pengantar desain web
Bab 1 pengantar desain web
 
Chapter 3.3 css - tugas css (shared)
Chapter 3.3   css - tugas css (shared)Chapter 3.3   css - tugas css (shared)
Chapter 3.3 css - tugas css (shared)
 
Javascript yusra 2021 (shared)
Javascript   yusra 2021 (shared)Javascript   yusra 2021 (shared)
Javascript yusra 2021 (shared)
 
3. latihan css 01 (shared)
3. latihan css   01 (shared)3. latihan css   01 (shared)
3. latihan css 01 (shared)
 
2 property css (shared)
2   property css (shared)2   property css (shared)
2 property css (shared)
 
Css pengenalan css
Css   pengenalan cssCss   pengenalan css
Css pengenalan css
 
Chapter 1 introduction html (shared)
Chapter 1   introduction html (shared)Chapter 1   introduction html (shared)
Chapter 1 introduction html (shared)
 
Chapter 00 introduction - web desain -(shared)
Chapter 00   introduction - web desain -(shared)Chapter 00   introduction - web desain -(shared)
Chapter 00 introduction - web desain -(shared)
 
Kepribadian dan Nilai
Kepribadian dan NilaiKepribadian dan Nilai
Kepribadian dan Nilai
 
Emosi dan Suasana Hati
Emosi dan Suasana HatiEmosi dan Suasana Hati
Emosi dan Suasana Hati
 
Sikap dan Kepuasan Kerja
Sikap dan Kepuasan KerjaSikap dan Kepuasan Kerja
Sikap dan Kepuasan Kerja
 
Konsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku OrganisasiKonsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku Organisasi
 
Konsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku OrganisasiKonsep Dasar Perilaku Organisasi
Konsep Dasar Perilaku Organisasi
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 

Chp 05 anonymity, security, privacy and civil liberties (shared)

  • 1. SOSIO INFORMATIKA UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS TEKNIK DAN ILMU KOMPUTER 20192019 Socio Informatics
  • 2. UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS TEKNIK DAN ILMU KOMPUTER 20192019 Yusra Fernando, M.Komyusra.fernando@teknokrat.ac.id CONTACT ME 2
  • 3. UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS TEKNIK DAN ILMU KOMPUTER 20192019 Socio Informatics Anonymity, Security, Privacy and Civil Liberties
  • 4. Ethical and Social...J.M.Kizza 4 Surveys the tradi-tional ethical issues of privacy, security, anonymity and analyzes how these issues are affected by computer technology. Information gathering, databasing, and civil liberties are also discussed. Objectives Learn
  • 5. Ethical and Social...J.M.Kizza 5 Anonymity, Security, Privacy and Civil Liberties • Introduction • Anonymity • Security • Privacy • Ethical and Social Issues
  • 6. Ethical and Social...J.M.Kizza 6 Introduction • Information has increased in value • The demand for information is high due to: • High digitalization of information and increasing bandwidth. • Declining costs of digital communication. • Increased miniaturization of portable computers and other communications equipment. • Greater public awareness by the news media of the potential abuse of digital communication, especially the Internet. • The danger for misuse is real
  • 7. Ethical and Social...J.M.Kizza 7 Anonymity • Absence of identity • There are two types of identity: • Pseudo • Untraceable • Anonymity on the Internet • Email • Other postings
  • 8. Ethical and Social...J.M.Kizza 8 Security • Means to prevent unauthorized access • Consists of: • Confidentiality - to prevent unauthorized disclosure of information to third parties. • Integrity - to prevent unauthorized modification of files and maintain the status quo • Availability -: to prevent unauthorized withholding of information from those who need it when they need it. • Physical security – guaranteed by: • Deterrence • Prevention • Detection • Response
  • 9. Ethical and Social...J.M.Kizza 9 Security… • Perimeter security • Fence • Dog • Guards • Firewalls • Proxy - individual client requests conform to the pre-set conditions, then the firewall acts on the request • Filter -these are packet-level filters • Stateful Inspection: These firewalls combine the filter and proxy functionalities. • Passwords
  • 10. Ethical and Social...J.M.Kizza 10 Information Security • Encryption • Plaintext • Ciphertext • Types: • Symmetric (fig 5.1) • Asymmetric (fig 5.2) Encryption standards • RSA • DES • PEMS • PGP • Authentication (fig 5.3)
  • 11. Ethical and Social...J.M.Kizza 11 Privacy • Human value consists of: • Right to control external influences on individual information: • Solitude - right to be alone • Anonymity – right to have no public identity • Intimacy – right not to be monitored • Right to control personal information: • Reserve – right to control one’s information
  • 12. Ethical and Social...J.M.Kizza 12 Value of Privacy • Safeguard personal identity • Preserve individual autonomy in decision-making • Less known information,more autonomy • Support social relationships • Worthiness
  • 13. Ethical and Social...J.M.Kizza 13 Information Gathering, Databases, and Privacy • Who has your name on a list and what they're doing with it? • companies you have done business with. • Individuals • Government agencies • The U.S. Graham-Leach-Bliley Financial Services Modernization Act - protect the customer through three requirements that the institutions must disclose to us: • Privacy Policy: through which the institution is bound to tell us the types of information the institution collects and has about us and how it uses that information. • Right to Opt-Out: through which the institution is bound to explain our recourse to prevent the transfer of our data to third party beneficiaries. • Safeguards: through which the institution must put in place policies to prevent fraudulent access to confidential financial information.
  • 14. Ethical and Social...J.M.Kizza 14 • The Opt-in clause, which was not included in the Act despite strong support from privacy and consumer activists, would have prohibited a financial institution from sharing or selling our data without our consent. • The opt-out option, which eventually was included in the Act after, the opt-in clause lost, gives us, the customers, implied consent, if we fail to return the Opt- out notices above sent to us by these institutions. Opt-in/Opt-out
  • 15. Ethical and Social...J.M.Kizza 15 Privacy Violations • Intrusion – wrongful entry ( hacking) • Misuse of information • we involuntarily give off personal information • businesses collect it • Interception of information • eavesdropping • Surveillance • Echelon/TEMPEST • Information matching using unrelated databases -usually illegally
  • 16. Ethical and Social...J.M.Kizza 16 Privacy Protection • Is it possible? -Rapid advances in computer technology, and in particular the advent of the Internet, have all created an environment where detailed information on individuals and products can very easily and cheaply be moved, merged, marched, compared and shared. • Guidelines and structures that safeguard and protected privacy rights. • These structures and guideline, on the average fall under the following categories: • Technical - through the use of software and other technical based safeguards and also education of users and consumers to carry out self-regulation. • contractual –through which information like electronic publication and how such information is disseminated are given contractual and technological protection against unauthorized reproduction or distribution. • legal – through the enactment of laws by national legislatures and enforcement of such laws by the law enforcement agencies. (see pp. 118 - 119) • Through individual efforts ( be vigilant)
  • 17. Ethical and Social...J.M.Kizza 17 Ethical and Social Issues • The ethics of privacy - with the advent of the Internet and electronic messages, confidentiality is a great concern. Computer technology has raised more privacy questions than it has found answers to • The ethics of security - the Internet is an insecure communications channel when it is used by a criminal.
  • 18. Thank You .. UNIVERSITAS TEKNOKRAT INDONESIA FAKULTAS TEKNIK DAN ILMU KOMPUTER YUSRA FERNANDO, S.KOM., M.KOM 20192019