SlideShare a Scribd company logo
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
IntroductionIntroduction

Group Members:
14: M Ali Shirwany
72: M Ali
1
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
ContentsContents
Privacy
Copyrights
2
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 3
OutlineOutline
What is privacy?
Privacy laws and self-regulation
Privacy risks from personalization
Reducing privacy risks
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 4
What is privacy?What is privacy?
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 5
Hard to defineHard to define
“Privacy is a value so complex, so
entangled in competing and contradictory
dimensions, so engorged with various and
distinct meanings, that I sometimes despair
whether it can be usefully addressed at all.”
Robert C. Post, Three Concepts of Privacy,
89 Geo. L.J. 2087 (2001).
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 6
Realizing limited access and controlRealizing limited access and control
Limited access
• Laws to prohibit or limit collection, disclosure,
contact
• Technology to facilitate anonymous
transactions, minimize disclosure
Control
• Laws to mandate choice (opt-in/opt-out)
• Technology to facilitate informed consent, keep
track of and enforce privacy preferences
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 7
Privacy laws and self-regulationPrivacy laws and self-regulation
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 8
Privacy policiesPrivacy policies
Policies let consumers know about site’s
privacy practices
Consumers can then decide whether or not
practices are acceptable, when to opt-in or
opt-out, and who to do business with
The presence of privacy policies increases
consumer trust
What are some problems with privacy policies?
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 9
Privacy policy problemsPrivacy policy problems
BUT policies are often
• difficult to understand
• hard to find
• take a long time to read
• change without notice
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 10
Risks may be magnified in futureRisks may be magnified in future
Wireless location tracking
Semantic web applications
Ubiquitous computing
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
WHAT IS COPYRIGHT?WHAT IS COPYRIGHT?
 Copyright is a form of protection given to
authors/creators of original works.
 This property right can be sold or transferred to
others.
11
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
COPYRIGHT LAWCOPYRIGHT LAW
 Copyright is a form of protection grounded in the
U.S. Constitution and granted by law for original
works of authorship.
 The current copyright law, the Copyright Act of
1976, is codified in Title 17 of the U.S. Code.
12
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
AUTHOR´S RIGHTSAUTHOR´S RIGHTS
 Copyright law assures ownership, which comes with several
rights, that the author has exclusively. For example:
• Make copies of the work
• Distribute copies of the work
• Perform the work publicly
• Display the work publicly
• Make derivative works
13
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
 The law provides certain ways in which copyright works
may be used without the need to first obtain permission
from the copyright holder - these include:
• Fair use (e.g. to make copies)
• Public domain
• Library privilege
• Copying for examinations and copying for instruction
14
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
COPYRIGHT PROTECTIONCOPYRIGHT PROTECTION
 Copyright covers both published and unpublished
works. 
 Copyright protection is automatic at the moment the
work is created and fixed in a tangible form that it is
perceptible
15
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
COPYRIGHTABLE WORKSCOPYRIGHTABLE WORKS
 Literary works
 Dramatic works
 Musical works
 Artistic works
16
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
NON-COPYRIGHTABLE WORKSNON-COPYRIGHTABLE WORKS
Not everything is protected by copyright
law. 
Copyright does not protect facts, ideas,
systems, or methods of operation.
17
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
Copyright VS. Patent andCopyright VS. Patent and
TrademarkTrademark
 Copyright protects original works of authorship,
while a patent protects inventions or discoveries.
 A trademark protects words, phrases, symbols, or
designs identifying the source of the goods or
services of one party and distinguishing them from
those of others. 
18

More Related Content

What's hot

Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethicsgeneveve_
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
FaMulan2
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction Brief
Nováccent
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy PowerpointMbradber
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019
Priyanka Aash
 
Information security
Information security Information security
Information security
AishaIshaq4
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
Saqib Raza
 
Piracy and Types
Piracy and TypesPiracy and Types
Piracy and Types
Syed Muhammad Shah
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
Habib Siddiqui
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
atuljaybhaye
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
Michael Heron
 
Digital law
Digital lawDigital law
Digital law
zrh48
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
Hamza Cheema
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Qazi Anwar
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
David Strom
 
Digital rights and responsibilities ppt
Digital rights and responsibilities pptDigital rights and responsibilities ppt
Digital rights and responsibilities ppt
Maddiecarter5
 

What's hot (20)

Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction Brief
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019
 
Information security
Information security Information security
Information security
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Piracy and Types
Piracy and TypesPiracy and Types
Piracy and Types
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
 
Digital law
Digital lawDigital law
Digital law
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Digital rights and responsibilities ppt
Digital rights and responsibilities pptDigital rights and responsibilities ppt
Digital rights and responsibilities ppt
 

Viewers also liked

Sample_Energy_Survey_Report
Sample_Energy_Survey_ReportSample_Energy_Survey_Report
Sample_Energy_Survey_ReportBrian T. Gaudet
 
Drupal 7 and RDF
Drupal 7 and RDFDrupal 7 and RDF
Drupal 7 and RDF
scorlosquet
 
Dukengineer2012
Dukengineer2012Dukengineer2012
Dukengineer2012鋒博 蔡
 
Probleemoplossen & Ontwerpen
, ICT-werktuigen: 

Les 1
Probleemoplossen & Ontwerpen
, ICT-werktuigen: 

Les 1Probleemoplossen & Ontwerpen
, ICT-werktuigen: 

Les 1
Probleemoplossen & Ontwerpen
, ICT-werktuigen: 

Les 1
Erik Duval
 
Fall2012 gear up_final.report
Fall2012 gear up_final.reportFall2012 gear up_final.report
Fall2012 gear up_final.report
David Harris
 
Dukengineer2012
Dukengineer2012Dukengineer2012
Dukengineer2012鋒博 蔡
 
Police.power
Police.powerPolice.power
Police.power
John Wible
 
Interesting Times: Will Business Survive?
Interesting Times: Will Business Survive?Interesting Times: Will Business Survive?
Interesting Times: Will Business Survive?
Ben Tomhave
 
Digital Marketing Teigland 2011
Digital Marketing Teigland 2011Digital Marketing Teigland 2011
Digital Marketing Teigland 2011
Robin Teigland
 
To Google or Not To Google
To Google or Not To GoogleTo Google or Not To Google
To Google or Not To Google
Online_Librarians
 
7 Things You Should Know About Flipped Classrooms - Educause
7 Things You Should Know About Flipped Classrooms - Educause7 Things You Should Know About Flipped Classrooms - Educause
7 Things You Should Know About Flipped Classrooms - Educause
Luciano Sathler
 
Blogtaller
BlogtallerBlogtaller
Blogtallerlucenac
 
Pepperdine Flu Impact on Small and Medium-sized Businesses 2013
Pepperdine Flu Impact on Small and Medium-sized Businesses 2013Pepperdine Flu Impact on Small and Medium-sized Businesses 2013
Pepperdine Flu Impact on Small and Medium-sized Businesses 2013
Pepperdine University Graziadio School of Business and Management
 
Dukengineer2012
Dukengineer2012Dukengineer2012
Dukengineer2012鋒博 蔡
 
seo-150 edu site
seo-150 edu siteseo-150 edu site
seo-150 edu site
sami dib
 
Wildfire Solutions through Science
Wildfire Solutions through ScienceWildfire Solutions through Science
Wildfire Solutions through Science
Insurance Institute for Business & Home Safety
 
Elgg/Eduspaces Einfuehrung
Elgg/Eduspaces EinfuehrungElgg/Eduspaces Einfuehrung
Elgg/Eduspaces Einfuehrungestudyskills
 
Fall & Winter Vegetable Gardening in King County, Washington, Gardening Guide...
Fall & Winter Vegetable Gardening in King County, Washington, Gardening Guide...Fall & Winter Vegetable Gardening in King County, Washington, Gardening Guide...
Fall & Winter Vegetable Gardening in King County, Washington, Gardening Guide...
School Vegetable Gardening - Victory Gardens
 

Viewers also liked (20)

Sample_Energy_Survey_Report
Sample_Energy_Survey_ReportSample_Energy_Survey_Report
Sample_Energy_Survey_Report
 
Drupal 7 and RDF
Drupal 7 and RDFDrupal 7 and RDF
Drupal 7 and RDF
 
Dukengineer2012
Dukengineer2012Dukengineer2012
Dukengineer2012
 
Probleemoplossen & Ontwerpen
, ICT-werktuigen: 

Les 1
Probleemoplossen & Ontwerpen
, ICT-werktuigen: 

Les 1Probleemoplossen & Ontwerpen
, ICT-werktuigen: 

Les 1
Probleemoplossen & Ontwerpen
, ICT-werktuigen: 

Les 1
 
Fall2012 gear up_final.report
Fall2012 gear up_final.reportFall2012 gear up_final.report
Fall2012 gear up_final.report
 
Dukengineer2012
Dukengineer2012Dukengineer2012
Dukengineer2012
 
Police.power
Police.powerPolice.power
Police.power
 
Interesting Times: Will Business Survive?
Interesting Times: Will Business Survive?Interesting Times: Will Business Survive?
Interesting Times: Will Business Survive?
 
Digital Marketing Teigland 2011
Digital Marketing Teigland 2011Digital Marketing Teigland 2011
Digital Marketing Teigland 2011
 
To Google or Not To Google
To Google or Not To GoogleTo Google or Not To Google
To Google or Not To Google
 
Anti communism propaganda
Anti communism propagandaAnti communism propaganda
Anti communism propaganda
 
7 Things You Should Know About Flipped Classrooms - Educause
7 Things You Should Know About Flipped Classrooms - Educause7 Things You Should Know About Flipped Classrooms - Educause
7 Things You Should Know About Flipped Classrooms - Educause
 
Edublog - 1 Introduzione
Edublog - 1 IntroduzioneEdublog - 1 Introduzione
Edublog - 1 Introduzione
 
Blogtaller
BlogtallerBlogtaller
Blogtaller
 
Pepperdine Flu Impact on Small and Medium-sized Businesses 2013
Pepperdine Flu Impact on Small and Medium-sized Businesses 2013Pepperdine Flu Impact on Small and Medium-sized Businesses 2013
Pepperdine Flu Impact on Small and Medium-sized Businesses 2013
 
Dukengineer2012
Dukengineer2012Dukengineer2012
Dukengineer2012
 
seo-150 edu site
seo-150 edu siteseo-150 edu site
seo-150 edu site
 
Wildfire Solutions through Science
Wildfire Solutions through ScienceWildfire Solutions through Science
Wildfire Solutions through Science
 
Elgg/Eduspaces Einfuehrung
Elgg/Eduspaces EinfuehrungElgg/Eduspaces Einfuehrung
Elgg/Eduspaces Einfuehrung
 
Fall & Winter Vegetable Gardening in King County, Washington, Gardening Guide...
Fall & Winter Vegetable Gardening in King County, Washington, Gardening Guide...Fall & Winter Vegetable Gardening in King County, Washington, Gardening Guide...
Fall & Winter Vegetable Gardening in King County, Washington, Gardening Guide...
 

Similar to Privacy And Copyrights

security and usable.ppt
security and usable.pptsecurity and usable.ppt
security and usable.ppt
Saba651353
 
New Directions in Scholarly Communication
New Directions in Scholarly CommunicationNew Directions in Scholarly Communication
New Directions in Scholarly Communication
SciELO - Scientific Electronic Library Online
 
SciELO 2013: Empowering Scholars with Altmetrics
SciELO 2013: Empowering Scholars with AltmetricsSciELO 2013: Empowering Scholars with Altmetrics
SciELO 2013: Empowering Scholars with AltmetricsWilliam Gunn
 
Final presentation SACES 2014
Final presentation SACES 2014Final presentation SACES 2014
Final presentation SACES 2014cmholmes1
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
Cori Faklaris
 
The issues of security and privacy in social network
The issues of security and privacy in social network The issues of security and privacy in social network
The issues of security and privacy in social network
Noori Sadeq
 
Digital identities & digital security
Digital identities & digital securityDigital identities & digital security
Digital identities & digital security
tanvir616
 
saces-online tools for the classroom
saces-online tools for the classroomsaces-online tools for the classroom
saces-online tools for the classroomJessica Haas
 
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Test Security
 
10 Steps to Digital Citizenship
10 Steps to Digital Citizenship10 Steps to Digital Citizenship
10 Steps to Digital Citizenship
Kathleen Stone
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
Micah Altman
 
10.3.14 draft presentation saces
10.3.14 draft presentation saces10.3.14 draft presentation saces
10.3.14 draft presentation saces
cmholmes1
 
Charleston 2013: The Social Side of Research
Charleston 2013: The Social Side of ResearchCharleston 2013: The Social Side of Research
Charleston 2013: The Social Side of ResearchWilliam Gunn
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_sma
Ansgar Koene
 
Self disclosure risks and benefits on social networks
Self disclosure risks and benefits on social networksSelf disclosure risks and benefits on social networks
Self disclosure risks and benefits on social networksTAFENSW Online
 
Learning analytics at the intersections of student trust, disclosure and benefit
Learning analytics at the intersections of student trust, disclosure and benefitLearning analytics at the intersections of student trust, disclosure and benefit
Learning analytics at the intersections of student trust, disclosure and benefit
University of South Africa (Unisa)
 
Open Educational Resources - Session #6
Open Educational Resources - Session #6Open Educational Resources - Session #6
Open Educational Resources - Session #6
Vanessa Camilleri
 
Your attention please: designing security-decision UIs to make genuine risks ...
Your attention please: designing security-decision UIs to make genuine risks ...Your attention please: designing security-decision UIs to make genuine risks ...
Your attention please: designing security-decision UIs to make genuine risks ...
Cristian Bravo-Lillo
 
Keeping learners safe online presentation
Keeping learners safe online presentationKeeping learners safe online presentation
Keeping learners safe online presentation
Jisc
 

Similar to Privacy And Copyrights (20)

security and usable.ppt
security and usable.pptsecurity and usable.ppt
security and usable.ppt
 
New Directions in Scholarly Communication
New Directions in Scholarly CommunicationNew Directions in Scholarly Communication
New Directions in Scholarly Communication
 
SciELO 2013: Empowering Scholars with Altmetrics
SciELO 2013: Empowering Scholars with AltmetricsSciELO 2013: Empowering Scholars with Altmetrics
SciELO 2013: Empowering Scholars with Altmetrics
 
Final presentation SACES 2014
Final presentation SACES 2014Final presentation SACES 2014
Final presentation SACES 2014
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
 
Hardy2011
Hardy2011Hardy2011
Hardy2011
 
The issues of security and privacy in social network
The issues of security and privacy in social network The issues of security and privacy in social network
The issues of security and privacy in social network
 
Digital identities & digital security
Digital identities & digital securityDigital identities & digital security
Digital identities & digital security
 
saces-online tools for the classroom
saces-online tools for the classroomsaces-online tools for the classroom
saces-online tools for the classroom
 
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
 
10 Steps to Digital Citizenship
10 Steps to Digital Citizenship10 Steps to Digital Citizenship
10 Steps to Digital Citizenship
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
10.3.14 draft presentation saces
10.3.14 draft presentation saces10.3.14 draft presentation saces
10.3.14 draft presentation saces
 
Charleston 2013: The Social Side of Research
Charleston 2013: The Social Side of ResearchCharleston 2013: The Social Side of Research
Charleston 2013: The Social Side of Research
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_sma
 
Self disclosure risks and benefits on social networks
Self disclosure risks and benefits on social networksSelf disclosure risks and benefits on social networks
Self disclosure risks and benefits on social networks
 
Learning analytics at the intersections of student trust, disclosure and benefit
Learning analytics at the intersections of student trust, disclosure and benefitLearning analytics at the intersections of student trust, disclosure and benefit
Learning analytics at the intersections of student trust, disclosure and benefit
 
Open Educational Resources - Session #6
Open Educational Resources - Session #6Open Educational Resources - Session #6
Open Educational Resources - Session #6
 
Your attention please: designing security-decision UIs to make genuine risks ...
Your attention please: designing security-decision UIs to make genuine risks ...Your attention please: designing security-decision UIs to make genuine risks ...
Your attention please: designing security-decision UIs to make genuine risks ...
 
Keeping learners safe online presentation
Keeping learners safe online presentationKeeping learners safe online presentation
Keeping learners safe online presentation
 

More from muhammad-Sulaiman

Foundations of Electronic Commerce
Foundations of Electronic CommerceFoundations of Electronic Commerce
Foundations of Electronic Commerce
muhammad-Sulaiman
 
Digital Library 
Digital Library Digital Library 
Digital Library 
muhammad-Sulaiman
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
muhammad-Sulaiman
 
Latest technologies in computer system AI(Artificial Intelligence) Knowledg...
Latest technologies in computer system  AI(Artificial Intelligence)  Knowledg...Latest technologies in computer system  AI(Artificial Intelligence)  Knowledg...
Latest technologies in computer system AI(Artificial Intelligence) Knowledg...
muhammad-Sulaiman
 
Computer Scientific Applications
Computer Scientific ApplicationsComputer Scientific Applications
Computer Scientific Applications
muhammad-Sulaiman
 
Social Media And Impact Of Computer On Our Sociaty
Social Media And Impact Of Computer On Our SociatySocial Media And Impact Of Computer On Our Sociaty
Social Media And Impact Of Computer On Our Sociaty
muhammad-Sulaiman
 

More from muhammad-Sulaiman (6)

Foundations of Electronic Commerce
Foundations of Electronic CommerceFoundations of Electronic Commerce
Foundations of Electronic Commerce
 
Digital Library 
Digital Library Digital Library 
Digital Library 
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Latest technologies in computer system AI(Artificial Intelligence) Knowledg...
Latest technologies in computer system  AI(Artificial Intelligence)  Knowledg...Latest technologies in computer system  AI(Artificial Intelligence)  Knowledg...
Latest technologies in computer system AI(Artificial Intelligence) Knowledg...
 
Computer Scientific Applications
Computer Scientific ApplicationsComputer Scientific Applications
Computer Scientific Applications
 
Social Media And Impact Of Computer On Our Sociaty
Social Media And Impact Of Computer On Our SociatySocial Media And Impact Of Computer On Our Sociaty
Social Media And Impact Of Computer On Our Sociaty
 

Recently uploaded

Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 

Privacy And Copyrights

  • 1. Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ IntroductionIntroduction  Group Members: 14: M Ali Shirwany 72: M Ali 1
  • 2. Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ ContentsContents Privacy Copyrights 2
  • 3. Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 3 OutlineOutline What is privacy? Privacy laws and self-regulation Privacy risks from personalization Reducing privacy risks
  • 4. Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 4 What is privacy?What is privacy?
  • 5. Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 5 Hard to defineHard to define “Privacy is a value so complex, so entangled in competing and contradictory dimensions, so engorged with various and distinct meanings, that I sometimes despair whether it can be usefully addressed at all.” Robert C. Post, Three Concepts of Privacy, 89 Geo. L.J. 2087 (2001).
  • 6. Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 6 Realizing limited access and controlRealizing limited access and control Limited access • Laws to prohibit or limit collection, disclosure, contact • Technology to facilitate anonymous transactions, minimize disclosure Control • Laws to mandate choice (opt-in/opt-out) • Technology to facilitate informed consent, keep track of and enforce privacy preferences
  • 7. Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 7 Privacy laws and self-regulationPrivacy laws and self-regulation
  • 8. Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 8 Privacy policiesPrivacy policies Policies let consumers know about site’s privacy practices Consumers can then decide whether or not practices are acceptable, when to opt-in or opt-out, and who to do business with The presence of privacy policies increases consumer trust What are some problems with privacy policies?
  • 9. Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 9 Privacy policy problemsPrivacy policy problems BUT policies are often • difficult to understand • hard to find • take a long time to read • change without notice
  • 10. Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 10 Risks may be magnified in futureRisks may be magnified in future Wireless location tracking Semantic web applications Ubiquitous computing
  • 11. Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ WHAT IS COPYRIGHT?WHAT IS COPYRIGHT?  Copyright is a form of protection given to authors/creators of original works.  This property right can be sold or transferred to others. 11
  • 12. Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ COPYRIGHT LAWCOPYRIGHT LAW  Copyright is a form of protection grounded in the U.S. Constitution and granted by law for original works of authorship.  The current copyright law, the Copyright Act of 1976, is codified in Title 17 of the U.S. Code. 12
  • 13. Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ AUTHOR´S RIGHTSAUTHOR´S RIGHTS  Copyright law assures ownership, which comes with several rights, that the author has exclusively. For example: • Make copies of the work • Distribute copies of the work • Perform the work publicly • Display the work publicly • Make derivative works 13
  • 14. Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/  The law provides certain ways in which copyright works may be used without the need to first obtain permission from the copyright holder - these include: • Fair use (e.g. to make copies) • Public domain • Library privilege • Copying for examinations and copying for instruction 14
  • 15. Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ COPYRIGHT PROTECTIONCOPYRIGHT PROTECTION  Copyright covers both published and unpublished works.   Copyright protection is automatic at the moment the work is created and fixed in a tangible form that it is perceptible 15
  • 16. Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ COPYRIGHTABLE WORKSCOPYRIGHTABLE WORKS  Literary works  Dramatic works  Musical works  Artistic works 16
  • 17. Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ NON-COPYRIGHTABLE WORKSNON-COPYRIGHTABLE WORKS Not everything is protected by copyright law.  Copyright does not protect facts, ideas, systems, or methods of operation. 17
  • 18. Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ Copyright VS. Patent andCopyright VS. Patent and TrademarkTrademark  Copyright protects original works of authorship, while a patent protects inventions or discoveries.  A trademark protects words, phrases, symbols, or designs identifying the source of the goods or services of one party and distinguishing them from those of others.  18