SlideShare a Scribd company logo
1 of 8
Download to read offline
Understanding the ’Computer and Privacy’ Issue
Dr. Varun Kumar
Dr. Varun Kumar (IIIT Surat) Lecture-14 1 / 8
Outlines
1 Introduction to Understanding the ’Computer and Privacy’ Issue
2 Personal Privacy
3 Individual - Organizational Relationships
Dr. Varun Kumar (IIIT Surat) Lecture-14 2 / 8
Introduction to the ’Computer and Privacy’ Issue
⇒ Computer privacy is an important key factor, that protect us.
⇒ Multiple issues need to revolve:
Collection and use of data.
Information obtained from data versus loss of privacy.
The needs of the organization collecting and using the information
versus individuals right of privacy (considered a social good).
⇒ An example is that Amazon collects information on its clients in order
to be able to inform them of new books in their interest areas.
Dr. Varun Kumar (IIIT Surat) Lecture-14 3 / 8
Personal Privacy
⇒ What is personal privacy and why is it valuable?
⇒ Most people expect privacy in their personal space such as home - the
domain in which following should not interfere.
Government
Other organizations
⇒ Privacy is often seen as intrinsic goods − goods in itself
| {z }
privacy
− which can
lead to other goods.
⇒ Kant’s theory is that privacy is essential to autonomy and that
autonomy is inconceivable without privacy.
⇒ Technological development has changed how business is conducted.
⇒ It also has a huge impact on personal and community identities.
Dr. Varun Kumar (IIIT Surat) Lecture-14 4 / 8
Continued–
⇒ Do not consider just personal relationships consider professional
relationships as well.
⇒ When you are chatting or emailing on the Internet, nobody knows
who you are by anything other than the name you have given as your
identity.
⇒ Your physical characteristics
Skin color
Height
Physical features
are unknown.
⇒ Your online characteristics are formed by your messages.
⇒ What is known about you is only the image that you choose to give
of yourself.
Dr. Varun Kumar (IIIT Surat) Lecture-14 5 / 8
Impact on the Individual
⇒ Identity: Anonymity can be liberating.
⇒ Other users you come in contact by Internet cannot look at your
physical self or hear your accent and make assumptions about you.
⇒ You are judged on the opinions and information you express.
⇒ Intrusion on Privacy: Personal information can be captured at certain
sites through the information you have provided when you make an
Online transaction
Tracking the user by using cookies.
⇒ Data may be captured and analyzed without the user’s knowledge or
consent.
⇒ Their surfing patterns are collected and analyzed to classify them into
marketing categories.
Dr. Varun Kumar (IIIT Surat) Lecture-14 6 / 8
Continued
⇒ Many companies now monitor employee e-mail,
⇒ Company argument → Any email leaving the company is the business
of the company.
⇒ Should anyone wish to contact an employee with urgent personal
information there is a risk that this could become public knowledge.
Individual Organizational Relationships
⇒ It is said that information a person gives to an organization empowers
them over the person.
⇒ For example, a credit card company → Data mining perspective
⇒ Organizations can establish this relationship without any action by
the individual (e.g. Subscription information).
⇒ Government has tried to deal with this and to allay fears.
By passing laws that prevent different database.
Dr. Varun Kumar (IIIT Surat) Lecture-14 7 / 8
Continued
⇒ Laws have been passed on the privacy issues concerning medical and
credit records amongst others.
⇒ In the mid-1970s, the United States provided five principles to govern
fair information gathering practices:
1 No secret personal data keeping.
2 Individual must be able to discover their personal information and how
it is used.
3 Individual must be able to discover and stop information collected for
one purpose but is used for another.
4 Individual must be able to correct wrong information.
5 Database administrator of personal information must take necessary
precautions to prevent misuse and also to assure reliability of data.
Dr. Varun Kumar (IIIT Surat) Lecture-14 8 / 8

More Related Content

Similar to Understanding the computer and privacy issues

Computer Ethics: Some Case Study
Computer Ethics: Some Case StudyComputer Ethics: Some Case Study
Computer Ethics: Some Case StudyVARUN KUMAR
 
Introduction to Censorship
Introduction to Censorship Introduction to Censorship
Introduction to Censorship VARUN KUMAR
 
Professional Relationship
Professional RelationshipProfessional Relationship
Professional RelationshipVARUN KUMAR
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandHector Dominguez
 
Code of Ethics and Professional Conduct
Code of Ethics and Professional ConductCode of Ethics and Professional Conduct
Code of Ethics and Professional ConductVARUN KUMAR
 
confidentiality in the workplace
confidentiality in the workplaceconfidentiality in the workplace
confidentiality in the workplaceNova Zamora
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and SecurityAriantoMuditomo
 
Censorship and Controversy
Censorship and ControversyCensorship and Controversy
Censorship and ControversyVARUN KUMAR
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaProductNation/iSPIRT
 
Information-Control-and-Privacy.powerpoint
Information-Control-and-Privacy.powerpointInformation-Control-and-Privacy.powerpoint
Information-Control-and-Privacy.powerpointkathymolina568
 
Information-Control-and-Privacy.Powerpoint
Information-Control-and-Privacy.PowerpointInformation-Control-and-Privacy.Powerpoint
Information-Control-and-Privacy.Powerpointkathymolina568
 

Similar to Understanding the computer and privacy issues (12)

Computer Ethics: Some Case Study
Computer Ethics: Some Case StudyComputer Ethics: Some Case Study
Computer Ethics: Some Case Study
 
Introduction to Censorship
Introduction to Censorship Introduction to Censorship
Introduction to Censorship
 
Professional Relationship
Professional RelationshipProfessional Relationship
Professional Relationship
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
 
Code of Ethics and Professional Conduct
Code of Ethics and Professional ConductCode of Ethics and Professional Conduct
Code of Ethics and Professional Conduct
 
confidentiality in the workplace
confidentiality in the workplaceconfidentiality in the workplace
confidentiality in the workplace
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security
 
Censorship and Controversy
Censorship and ControversyCensorship and Controversy
Censorship and Controversy
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for India
 
Information-Control-and-Privacy.powerpoint
Information-Control-and-Privacy.powerpointInformation-Control-and-Privacy.powerpoint
Information-Control-and-Privacy.powerpoint
 
Information-Control-and-Privacy.Powerpoint
Information-Control-and-Privacy.PowerpointInformation-Control-and-Privacy.Powerpoint
Information-Control-and-Privacy.Powerpoint
 
Standard 14
Standard 14Standard 14
Standard 14
 

More from VARUN KUMAR

Distributed rc Model
Distributed rc ModelDistributed rc Model
Distributed rc ModelVARUN KUMAR
 
Electrical Wire Model
Electrical Wire ModelElectrical Wire Model
Electrical Wire ModelVARUN KUMAR
 
Interconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignInterconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignVARUN KUMAR
 
Introduction to Digital VLSI Design
Introduction to Digital VLSI DesignIntroduction to Digital VLSI Design
Introduction to Digital VLSI DesignVARUN KUMAR
 
Challenges of Massive MIMO System
Challenges of Massive MIMO SystemChallenges of Massive MIMO System
Challenges of Massive MIMO SystemVARUN KUMAR
 
E-democracy or Digital Democracy
E-democracy or Digital DemocracyE-democracy or Digital Democracy
E-democracy or Digital DemocracyVARUN KUMAR
 
Ethics of Parasitic Computing
Ethics of Parasitic ComputingEthics of Parasitic Computing
Ethics of Parasitic ComputingVARUN KUMAR
 
Action Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionAction Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionVARUN KUMAR
 
Geneva Plan of Action
Geneva Plan of ActionGeneva Plan of Action
Geneva Plan of ActionVARUN KUMAR
 
Fair Use in the Electronic Age
Fair Use in the Electronic AgeFair Use in the Electronic Age
Fair Use in the Electronic AgeVARUN KUMAR
 
Software as a Property
Software as a PropertySoftware as a Property
Software as a PropertyVARUN KUMAR
 
Orthogonal Polynomial
Orthogonal PolynomialOrthogonal Polynomial
Orthogonal PolynomialVARUN KUMAR
 
Patent Protection
Patent ProtectionPatent Protection
Patent ProtectionVARUN KUMAR
 
Copyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy LawCopyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy LawVARUN KUMAR
 
Property Right and Software
Property Right and SoftwareProperty Right and Software
Property Right and SoftwareVARUN KUMAR
 
Investigating Data Trials
Investigating Data TrialsInvestigating Data Trials
Investigating Data TrialsVARUN KUMAR
 
Gaussian Numerical Integration
Gaussian Numerical IntegrationGaussian Numerical Integration
Gaussian Numerical IntegrationVARUN KUMAR
 
Romberg's Integration
Romberg's IntegrationRomberg's Integration
Romberg's IntegrationVARUN KUMAR
 
Protect your online privacy-2
Protect your online privacy-2Protect your online privacy-2
Protect your online privacy-2VARUN KUMAR
 
Simpson's rule of integration
Simpson's rule of integrationSimpson's rule of integration
Simpson's rule of integrationVARUN KUMAR
 

More from VARUN KUMAR (20)

Distributed rc Model
Distributed rc ModelDistributed rc Model
Distributed rc Model
 
Electrical Wire Model
Electrical Wire ModelElectrical Wire Model
Electrical Wire Model
 
Interconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignInterconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI Design
 
Introduction to Digital VLSI Design
Introduction to Digital VLSI DesignIntroduction to Digital VLSI Design
Introduction to Digital VLSI Design
 
Challenges of Massive MIMO System
Challenges of Massive MIMO SystemChallenges of Massive MIMO System
Challenges of Massive MIMO System
 
E-democracy or Digital Democracy
E-democracy or Digital DemocracyE-democracy or Digital Democracy
E-democracy or Digital Democracy
 
Ethics of Parasitic Computing
Ethics of Parasitic ComputingEthics of Parasitic Computing
Ethics of Parasitic Computing
 
Action Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionAction Lines of Geneva Plan of Action
Action Lines of Geneva Plan of Action
 
Geneva Plan of Action
Geneva Plan of ActionGeneva Plan of Action
Geneva Plan of Action
 
Fair Use in the Electronic Age
Fair Use in the Electronic AgeFair Use in the Electronic Age
Fair Use in the Electronic Age
 
Software as a Property
Software as a PropertySoftware as a Property
Software as a Property
 
Orthogonal Polynomial
Orthogonal PolynomialOrthogonal Polynomial
Orthogonal Polynomial
 
Patent Protection
Patent ProtectionPatent Protection
Patent Protection
 
Copyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy LawCopyright Vs Patent and Trade Secrecy Law
Copyright Vs Patent and Trade Secrecy Law
 
Property Right and Software
Property Right and SoftwareProperty Right and Software
Property Right and Software
 
Investigating Data Trials
Investigating Data TrialsInvestigating Data Trials
Investigating Data Trials
 
Gaussian Numerical Integration
Gaussian Numerical IntegrationGaussian Numerical Integration
Gaussian Numerical Integration
 
Romberg's Integration
Romberg's IntegrationRomberg's Integration
Romberg's Integration
 
Protect your online privacy-2
Protect your online privacy-2Protect your online privacy-2
Protect your online privacy-2
 
Simpson's rule of integration
Simpson's rule of integrationSimpson's rule of integration
Simpson's rule of integration
 

Recently uploaded

data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spaintimesproduction05
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 

Recently uploaded (20)

data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 

Understanding the computer and privacy issues

  • 1. Understanding the ’Computer and Privacy’ Issue Dr. Varun Kumar Dr. Varun Kumar (IIIT Surat) Lecture-14 1 / 8
  • 2. Outlines 1 Introduction to Understanding the ’Computer and Privacy’ Issue 2 Personal Privacy 3 Individual - Organizational Relationships Dr. Varun Kumar (IIIT Surat) Lecture-14 2 / 8
  • 3. Introduction to the ’Computer and Privacy’ Issue ⇒ Computer privacy is an important key factor, that protect us. ⇒ Multiple issues need to revolve: Collection and use of data. Information obtained from data versus loss of privacy. The needs of the organization collecting and using the information versus individuals right of privacy (considered a social good). ⇒ An example is that Amazon collects information on its clients in order to be able to inform them of new books in their interest areas. Dr. Varun Kumar (IIIT Surat) Lecture-14 3 / 8
  • 4. Personal Privacy ⇒ What is personal privacy and why is it valuable? ⇒ Most people expect privacy in their personal space such as home - the domain in which following should not interfere. Government Other organizations ⇒ Privacy is often seen as intrinsic goods − goods in itself | {z } privacy − which can lead to other goods. ⇒ Kant’s theory is that privacy is essential to autonomy and that autonomy is inconceivable without privacy. ⇒ Technological development has changed how business is conducted. ⇒ It also has a huge impact on personal and community identities. Dr. Varun Kumar (IIIT Surat) Lecture-14 4 / 8
  • 5. Continued– ⇒ Do not consider just personal relationships consider professional relationships as well. ⇒ When you are chatting or emailing on the Internet, nobody knows who you are by anything other than the name you have given as your identity. ⇒ Your physical characteristics Skin color Height Physical features are unknown. ⇒ Your online characteristics are formed by your messages. ⇒ What is known about you is only the image that you choose to give of yourself. Dr. Varun Kumar (IIIT Surat) Lecture-14 5 / 8
  • 6. Impact on the Individual ⇒ Identity: Anonymity can be liberating. ⇒ Other users you come in contact by Internet cannot look at your physical self or hear your accent and make assumptions about you. ⇒ You are judged on the opinions and information you express. ⇒ Intrusion on Privacy: Personal information can be captured at certain sites through the information you have provided when you make an Online transaction Tracking the user by using cookies. ⇒ Data may be captured and analyzed without the user’s knowledge or consent. ⇒ Their surfing patterns are collected and analyzed to classify them into marketing categories. Dr. Varun Kumar (IIIT Surat) Lecture-14 6 / 8
  • 7. Continued ⇒ Many companies now monitor employee e-mail, ⇒ Company argument → Any email leaving the company is the business of the company. ⇒ Should anyone wish to contact an employee with urgent personal information there is a risk that this could become public knowledge. Individual Organizational Relationships ⇒ It is said that information a person gives to an organization empowers them over the person. ⇒ For example, a credit card company → Data mining perspective ⇒ Organizations can establish this relationship without any action by the individual (e.g. Subscription information). ⇒ Government has tried to deal with this and to allay fears. By passing laws that prevent different database. Dr. Varun Kumar (IIIT Surat) Lecture-14 7 / 8
  • 8. Continued ⇒ Laws have been passed on the privacy issues concerning medical and credit records amongst others. ⇒ In the mid-1970s, the United States provided five principles to govern fair information gathering practices: 1 No secret personal data keeping. 2 Individual must be able to discover their personal information and how it is used. 3 Individual must be able to discover and stop information collected for one purpose but is used for another. 4 Individual must be able to correct wrong information. 5 Database administrator of personal information must take necessary precautions to prevent misuse and also to assure reliability of data. Dr. Varun Kumar (IIIT Surat) Lecture-14 8 / 8