SlideShare a Scribd company logo
CISB 412
Social and Professional Issues

    Understanding Privacy
Reference
• Materials used in this presentation are extracted mainly
  from the following texts, unless stated otherwise.

                              Michael J. Quinn “Ethics for the
                              Information Age”, 3rd edition.
                              Pearson 2009
Learning Outcomes

• At the end of this lesson you should be able to
  ▫ Explain the perspectives of privacy
  ▫ Describe ways privacy can be compromised through
    the usage of technology
  ▫ Apply the ethical principles on the issues of privacy
    to establish morality of the action
What is Privacy ?
Defining Privacy

 • Discussions about privacy revolve around the
   concept of ‘access’
 • Access can be seen from 2 perspectives:
  ▫ Physical proximity to a person
  ▫ Knowledge about a person
 • You exercise your privacy when you :
  ▫ lock the door behind you when using a restroom
  ▫ choose not tell the clerk at the video shop your
    mobile number
Defining Privacy

 • “Social arrangement that allows individuals to
   have some level of control of who is able to gain
   access to their physical selves and their personal
   information”

 • Violating someone’s privacy is considered an
   insult to the person’s dignity.
Harms of Privacy
• People may take advantage of privacy to plan
  and cover up illegal or immoral activities
• Examples:
 ▫ Family violence
 ▫ Social and economics inequities
• A challenge in parenting duties
• Love thy neighbour – who is my neighbour?
Benefits of Privacy

 • Individual growth, individual responsibility – a
   way society acknowledge and communicates to
   an individual that he/she is responsible or his
   own development as a unique person
 • Freedom to be yourself, allow us to remove our
   public persona
 • Shut out the world, be more creative
 • Development of loving, trusting, caring, intimate
   relationships – privacy ladder
Privacy and Trust



 • Trusting is easier a couple of centuries ago
 • Greater emphasis on community, lesser on
   individual
 • Pressure to conform
Privacy and Trust

 • Modern life more private
 • Challenge: living among strangers
 • How can we be sure that …
  ▫ Taxi driver will get us to our destination without
    hurting us?
  ▫ The teachers at school are not child molesters?
  ▫ Bank knows that if it loans someone money, it will be
    repaid?
Privacy and Trust
• In order to trust, we must rely on the reputations
• This was easier in the past.
• Today’s society must get information out of
  people to establish reputation:
 ▫ Through ordeal e.g. lie detector, drug test
 ▫ Through issuing/requesting credentials e.g.
   drivers license, badge, id, degree transcript etc
• Establishing reputation → reducing privacy
Disclosing Information

• Public record
 • Contains information about an incident or
   action reported for the purpose of
   informing the public
 • E.g.
     ▫ Birth certificates, death certificates,
       criminal records, police report
     ▫ Census Record
     ▫ Internal Revenue (Taxation)
Disclosing Information
• Public information
 ▫ Information you have provided to an organization
   that has the right to share it with other
   organization
 ▫ E.g.
      Listing in phone directory
      Rewards, Loyalty Programs
      Digital Video Recorder
      Automobile Black Box
      Implanted Chips
      Spyware, Cookies
Disclosing Information

• Personal information
 ▫ undisclosed information, will remain personal
   information as long as you never disclose to a
   party that has the right to share with others
 ▫ E.g. Your religion, your mobile number
• Types of disclosures
 ▫ Voluntary (e.g. form filling)
 ▫ Involuntary (e.g. CCTV)
 ▫ Statutory (e.g. obtaining license, loan)
Data Mining

• Data mining
  ▫ Searching for patterns or relationships in one or
    more databases
  ▫ Way to generate new information
• Secondary use: information collected for one
  purpose used for another purpose
• Information about customers is a valuable
  commodity
Ownership of Transaction
Information
• Who controls transaction information?
 ▫ Buyer?
 ▫ Seller?
 ▫ Both?
• Opt-in: consumer must explicitly give
  permission for the organization to share info
• Opt-out: consumer must explicitly forbid an
  organization from sharing info
Identity Theft
• Identity theft: misuse of another person’s
  identity to take actions permitted to the owner
• Credit card fraud #1 type of identity theft
 ▫ Ease of opening accounts contributes to problem
 ▫ 10 million victims in 2004 alone
Identity Theft

• Not necessary the result of IT, information can
  also be obtained through low-tech method :
  dumpster diving, shoulder surfing

• Example of high-tech method : use of
  skimmer/wedges at ATM, credit card machines,
  phishing
Encryption
• The process of transforming a message in order
  to conceal its meaning
• A valuable tool for maintaining privacy
• Information can be deemed worthless unless it
  can be decoded
Symmetric Encryption
• Single key used to encrypt and decrypt a
  message
• Both sender and receiver must have the key
• Problem: How does sender get key to receiver?
• If bad guy gets key, security is broken
Public Key Encryption

  • An example of asymmetric encryption
  • Each person has two keys: public and private
  • To send R a message, encrypt it with R’s
    public key
  • R decrypts message with R’s private key
  • No need to communicate keys
  • Strong encryption: virtually impossible to
    figure out private key.
Try this
• Should parents implant microchips in their
  children? Why?
Try this
• Video surveillance is used widely at public
  places. Do you agree with this approach of
  ‘maintaining public safety’? What is the
  advantages and disadvantages.
Try this
• A CCTV is installed at a house to monitor the
  maid who is employed to do the housekeeping
  and babysitting job. Is this ethical? Which
  ethical theory do you plan to use in supporting
  your argument. Supposed you find that this is
  unethical, what can you do to ‘soften the blow’?
Questions?

More Related Content

Similar to Topic 5 understanding privacy

Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
TargetX
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
NathanielCarlson2
 
Contemporory media
Contemporory mediaContemporory media
Contemporory media
Isma wajid
 
Cyber citizenship
Cyber citizenshipCyber citizenship
Cyber citizenshipkaeschliman
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Commonwealth Telecommunications Organisation
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Kimberley Dray
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
KnepperE
 
3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of DataMomina Mateen
 
Digital citizenship in learning
Digital citizenship in learningDigital citizenship in learning
Digital citizenship in learning
Western Pacific University
 
Omar Ha-Redeye - Legal Process using Social Media: Evidence, Jury Tampering, ...
Omar Ha-Redeye - Legal Process using Social Media: Evidence, Jury Tampering, ...Omar Ha-Redeye - Legal Process using Social Media: Evidence, Jury Tampering, ...
Omar Ha-Redeye - Legal Process using Social Media: Evidence, Jury Tampering, ...
Clio - Cloud-Based Legal Technology
 
Present to-nmmu-propella
Present to-nmmu-propellaPresent to-nmmu-propella
Present to-nmmu-propella
Exo Futures
 
Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...
Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...
Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...
Omar Ha-Redeye
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
Katie Ward
 
Building a professional digital identity
Building a professional digital identityBuilding a professional digital identity
Building a professional digital identity
Lisa Harris
 
E commerce
E commerce E commerce
E commerce
DrSelvamohanaK
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
CatherineBagaan
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activityguest09fcd1
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awareness
Jisc
 

Similar to Topic 5 understanding privacy (20)

Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
Contemporory media
Contemporory mediaContemporory media
Contemporory media
 
Cyber citizenship
Cyber citizenshipCyber citizenship
Cyber citizenship
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
 
3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data
 
Digital citizenship in learning
Digital citizenship in learningDigital citizenship in learning
Digital citizenship in learning
 
Omar Ha-Redeye - Legal Process using Social Media: Evidence, Jury Tampering, ...
Omar Ha-Redeye - Legal Process using Social Media: Evidence, Jury Tampering, ...Omar Ha-Redeye - Legal Process using Social Media: Evidence, Jury Tampering, ...
Omar Ha-Redeye - Legal Process using Social Media: Evidence, Jury Tampering, ...
 
Present to-nmmu-propella
Present to-nmmu-propellaPresent to-nmmu-propella
Present to-nmmu-propella
 
Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...
Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...
Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
Building a professional digital identity
Building a professional digital identityBuilding a professional digital identity
Building a professional digital identity
 
E commerce
E commerce E commerce
E commerce
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awareness
 

Topic 5 understanding privacy

  • 1. CISB 412 Social and Professional Issues Understanding Privacy
  • 2. Reference • Materials used in this presentation are extracted mainly from the following texts, unless stated otherwise. Michael J. Quinn “Ethics for the Information Age”, 3rd edition. Pearson 2009
  • 3. Learning Outcomes • At the end of this lesson you should be able to ▫ Explain the perspectives of privacy ▫ Describe ways privacy can be compromised through the usage of technology ▫ Apply the ethical principles on the issues of privacy to establish morality of the action
  • 5. Defining Privacy • Discussions about privacy revolve around the concept of ‘access’ • Access can be seen from 2 perspectives: ▫ Physical proximity to a person ▫ Knowledge about a person • You exercise your privacy when you : ▫ lock the door behind you when using a restroom ▫ choose not tell the clerk at the video shop your mobile number
  • 6. Defining Privacy • “Social arrangement that allows individuals to have some level of control of who is able to gain access to their physical selves and their personal information” • Violating someone’s privacy is considered an insult to the person’s dignity.
  • 7. Harms of Privacy • People may take advantage of privacy to plan and cover up illegal or immoral activities • Examples: ▫ Family violence ▫ Social and economics inequities • A challenge in parenting duties • Love thy neighbour – who is my neighbour?
  • 8. Benefits of Privacy • Individual growth, individual responsibility – a way society acknowledge and communicates to an individual that he/she is responsible or his own development as a unique person • Freedom to be yourself, allow us to remove our public persona • Shut out the world, be more creative • Development of loving, trusting, caring, intimate relationships – privacy ladder
  • 9. Privacy and Trust • Trusting is easier a couple of centuries ago • Greater emphasis on community, lesser on individual • Pressure to conform
  • 10. Privacy and Trust • Modern life more private • Challenge: living among strangers • How can we be sure that … ▫ Taxi driver will get us to our destination without hurting us? ▫ The teachers at school are not child molesters? ▫ Bank knows that if it loans someone money, it will be repaid?
  • 11. Privacy and Trust • In order to trust, we must rely on the reputations • This was easier in the past. • Today’s society must get information out of people to establish reputation: ▫ Through ordeal e.g. lie detector, drug test ▫ Through issuing/requesting credentials e.g. drivers license, badge, id, degree transcript etc • Establishing reputation → reducing privacy
  • 12. Disclosing Information • Public record • Contains information about an incident or action reported for the purpose of informing the public • E.g. ▫ Birth certificates, death certificates, criminal records, police report ▫ Census Record ▫ Internal Revenue (Taxation)
  • 13. Disclosing Information • Public information ▫ Information you have provided to an organization that has the right to share it with other organization ▫ E.g.  Listing in phone directory  Rewards, Loyalty Programs  Digital Video Recorder  Automobile Black Box  Implanted Chips  Spyware, Cookies
  • 14. Disclosing Information • Personal information ▫ undisclosed information, will remain personal information as long as you never disclose to a party that has the right to share with others ▫ E.g. Your religion, your mobile number • Types of disclosures ▫ Voluntary (e.g. form filling) ▫ Involuntary (e.g. CCTV) ▫ Statutory (e.g. obtaining license, loan)
  • 15. Data Mining • Data mining ▫ Searching for patterns or relationships in one or more databases ▫ Way to generate new information • Secondary use: information collected for one purpose used for another purpose • Information about customers is a valuable commodity
  • 16. Ownership of Transaction Information • Who controls transaction information? ▫ Buyer? ▫ Seller? ▫ Both? • Opt-in: consumer must explicitly give permission for the organization to share info • Opt-out: consumer must explicitly forbid an organization from sharing info
  • 17. Identity Theft • Identity theft: misuse of another person’s identity to take actions permitted to the owner • Credit card fraud #1 type of identity theft ▫ Ease of opening accounts contributes to problem ▫ 10 million victims in 2004 alone
  • 18. Identity Theft • Not necessary the result of IT, information can also be obtained through low-tech method : dumpster diving, shoulder surfing • Example of high-tech method : use of skimmer/wedges at ATM, credit card machines, phishing
  • 19. Encryption • The process of transforming a message in order to conceal its meaning • A valuable tool for maintaining privacy • Information can be deemed worthless unless it can be decoded
  • 20. Symmetric Encryption • Single key used to encrypt and decrypt a message • Both sender and receiver must have the key • Problem: How does sender get key to receiver? • If bad guy gets key, security is broken
  • 21. Public Key Encryption • An example of asymmetric encryption • Each person has two keys: public and private • To send R a message, encrypt it with R’s public key • R decrypts message with R’s private key • No need to communicate keys • Strong encryption: virtually impossible to figure out private key.
  • 22. Try this • Should parents implant microchips in their children? Why?
  • 23. Try this • Video surveillance is used widely at public places. Do you agree with this approach of ‘maintaining public safety’? What is the advantages and disadvantages.
  • 24. Try this • A CCTV is installed at a house to monitor the maid who is employed to do the housekeeping and babysitting job. Is this ethical? Which ethical theory do you plan to use in supporting your argument. Supposed you find that this is unethical, what can you do to ‘soften the blow’?