This document discusses privacy, security, and ethics as they relate to technology and personal data. It addresses threats to privacy from large databases, private networks, and the internet. It also covers security threats from computer criminals like hackers and issues around computer crime. Finally, it discusses ethics around copyright, software piracy, and plagiarism as shaped by digital technologies.
2. Introduction
The ubiquitous use of computers and technology prompts some very important
questions about the use of personal data and our right to privacy.
Privacy – What are the threats to personal privacy and how can we protect
ourselves?
Security – How can access to sensitive information be controlled and how can we
secure hardware and software?
Ethics – How do the actions of individual users and companies affect society?
3. Privacy
Privacy – concerns the collection and use of data about individuals
Three primary privacy issues:
Accuracy
Property
Access
4. Large Databases
Federal government alone has over 2,000 databases
Reverse directory compiles lists of the calls we make
Data gatherers
Information resellers or
information brokers
Electronic profiles are
easily created
5. Large Databases - Issues
Your personal information is a marketable commodity, which raises many issues:
Collecting public, but personally identifying information (e.g., Google’s Street View)
Spreading information without personal consent, leading to identity theft
Spreading inaccurate information
Mistaken identity
Freedom of Information Act
6. Private Networks
Employers can monitor e-mail legally
75 percent of all businesses search employees’ electronic mail and computer files using snoopware
A proposed law could prohibit this type of
electronic monitoring
or at least require the
employer to notify
the employee first
7. The Internet and the Web
Illusion of anonymity
People are not concerned about
privacy when surfing the Internet
or when sending e-mail
History file (right) in Web browsers
Traditional cookies from Web surfing
Spyware
Ad network or adware cookies
Web bugs
Computer monitoring software,
such as keystroke loggers
8. Spyware Removal
Anti-Spyware programs
Designed to detect and remove cookies, web bugs, and monitoring software, such as key loggers
9. Major Laws on Privacy
Federal laws governing privacy matters have been created
Gramm-Leach-Bliley Act – protects personal financial information
Health Insurance Portability and Accountability Act (HIPAA) – protects medical records
Family Educational Rights and Privacy Act (FERPA) – restricts disclosure of educational results and
records
10. Security
Threats to computer security include criminals, computer crimes, and other hazards
Computer criminals:
Employees
Outside users
Hackers and
crackers
Organized crime
Terrorists
11. Computer Crime
Malicious Programs
Viruses
Worms
Trojan horse
Zombies
Denial of service (DoS) attacks
Internet scams, such as phishing
Social networking risks
Rogue Wi-Fi hotspots
Theft of hardware, software, data, and
computer time
Data manipulation
Computer Fraud and Abuse Act
12. Other Hazards
Natural hazards
Natural forces such as fires, floods, and tornadoes
Civil strife and terrorism
Wars, riots, and terrorist activites
Technological failures
Voltage surge or spike
Use a surge protector
Human errors
Data entry errors
Programmer error
13. Measures to Protect Computer Security
Restricting access
Encrypting data
Anticipating disasters
Preventing data loss
15. Encrypting Data
Encryption is the process of coding information to make it unreadable,
except to those who have the key
E-mail encryption
File encryption
Web site encryption
Virtual private networks
(VPNs)
Wireless network encryption
WEP, WPA, and WPA2
16. Ethics
Copyright
Gives content creators the right to control the use and distribution of their work
Software piracy
Unauthorized copying and distribution
Digital Millennium Copyright Act
Digital rights management (DRM)
Plagiarism
17. Questions
Discuss the impact of large databases, private networks, the Internet, and the Web
on privacy.
Discuss the various kinds of computer criminals.
What are the principal measures used to protect computer security? What is
encryption? How is it used by corporations and individuals?
What is a copyright? Discuss software piracy, the Digital Millennium Copyright Act,
and digital rights management?
What is plagiarism? Discuss how computers make plagiarism easy and tempting to
busy people and how a plagiarist can be easily identified.