SlideShare a Scribd company logo
1 of 23
Characteristics of the Internet
 (+) public and available for anyone,
 (+) a useful tool for opening access to data of
public interest
 (+) serves freedom of thinking and freedom of
expression on a global level
BUT
 (-) rather vulnerable in terms of data security
 (-) a potential source of inaccurate or untruthful
information;
 (-) apt to make room for illegal activity
What is Privacy?
 Privacy is the right to be left alone and free from
surveillance and unreasonable personal intrusions.
 Information privacy is the right to determine when
and to what extent information about oneself can be
communicated to others.
 This applies to individuals, groups, and institutions.
Internet privacy
ability to control what information one reveals about
oneself over the Internet, and to control who can
access that information
Privacy issues
 There are a number of privacy issues that are of
concern, including
 electronic surveillance
 Email
 Web
 availability of personal information,
 cookies and spyware
 workplace monitoring
Privacy Issues
 Employers search social networking sites for
background information on applicants
 Monitoring systems are adopted by employers to
check employee performance
 Information technology has aided in the easy
availability of personal information
• Information in databases can be used for direct
marketing and for credit checks on potential
borrowers or renters
E-surveillance
 Electronic surveillance involves
 monitoring people with technology, often without their
knowledge
 Video recordings
 photography
 audio recordings
E-mail
 Spam: Unsolicited e-mail sent for advertising
purposes
• Sent in bulk using automated mailing software
 Ease of access
• Individuals should assume that others have access to
their messages
• Any e-mails sent on company-owned computers are
the property of the organization
Data Collection on the Web
 Due to the increase in online shopping, personal
details of individuals are prone to misuse
• Issue of personal information being sold to
telemarketing firms resulting in spam
 Information provided on the Web can be combined
with other information and technologies to produce
new information
Technologies Used for Data
Collection
 Cookies: Small text files with unique ID tags that
are embedded in a Web browser and saved on the
user’s hard drive
• Help websites customize pages for users
• Considered an invasion of privacy when users’
information is used without prior consent
• Installing a cookie manager helps users disable
cookies
• Log files: Generated by Web server software,
record a user’s actions on a website
Personal Information
• Personal information can be disclosed in a number of ways:
• Loans
• Orders via mail
• Magazine subscriptions
• Tax forms
• Applications for schools, jobs, clubs
• Insurance claim
• Hospital stay
• Sending checks
• Advertisers
Cookies
Cookie
 Stores information about you
 Located on your hard drive
 Beneficial uses
 Viewing preferences
 Online shopping
 Secure sites retain password in cookie
 Controversial use
 Tracking surfing habits for advertisers
 Can set browser to refuse cookies or warn before storing
 Software available to manage cookies
Spyware
 Spyware is unwanted software that infiltrates your
computing device, stealing your internet usage data
and sensitive information.
 Spyware is classified as a type of malware —
malicious software designed to gain access to or
damage your computer, often without your knowledge.
Workplace monitoring
Monitoring software
 Screens
 E-mail
 Keystrokes per minute
 Length of breaks
 What computer files are used and for how long
Risks to Internet privacy
User-tracking:
 Internet Service Providers (capable to observe any Internet-related
activity of the user)
 Cookies (parcels of text sent by a server) tracking and maintaining
specific information of the user
 Data logging (may include recording times when the computer is in
use, or which web sites are visited)
 Spyware programs
 Web bug
 Social engineering
 Phishing
 Malicious proxy server
 Search engines
Risks to Internet privacy (ctd.)
On-line social networks:
 Participants are offering self-profile in order to contact
or being contacted.
 Risks range from identity theft to online and physical
stalking, embarrasment, discrimination and
blackmailing.
Guidelines to Minimize the Invasion of Privacy
 Conduct business only with websites having privacy
policies
 Limit access to personal information to those with
authorization
 Ensure data’s reliability and take precautions to
prevent misuse of the data
 Data collection must have a stated purpose
 Identify ways to prevent personal information
gathered being disclosed without consent
Guidelines to Minimize the Invasion of Privacy
 Organizations should use verification procedures to
ensure data accuracy
 Organizations must correct or delete incorrect data
• Prevent unauthorized access to data and misuse of
data
 Users should review their records and correct any
inaccuracies
 Transparency in record-keeping systems storing
personal data
RFID
 RFID stands for Radio-Frequency IDentification.
 The acronym refers to small electronic devices that
consist of a small chip and an antenna.
 The chip typically is capable of carrying 2,000 bytes of
data or less.
 The RFID device serves the same purpose as a bar code
or a magnetic strip on the back of a credit card or ATM
card; it provides a unique identifier for that object.
And, just as a bar code or magnetic strip must be
scanned to get the information, the RFID device must
be scanned to retrieve the identifying information.
RFID Works Better Than Barcodes
 A significant advantage of RFID devices over the
others mentioned above is that the RFID device does
not need to be positioned precisely relative to the
scanner. RFID devices will work within a few feet (up
to 20 feet for high-frequency devices) of the scanner.
 For example, you could just put all of your groceries or
purchases in a bag, and set the bag on the scanner. It
would be able to query all of the RFID devices and
total your purchase immediately.
Below are some additional benefits
of using RFID:
 RFID doesn’t need line of sight
 RFID tags are able to be rewritten and reused
 RFID tags can be extremely durable against impact and
environmental factors
 RFID tag data is encrypted and can also be locked for extra
security
 RFID tags can hold more data than other types of tags or labels
 RFID readers can read hundreds of tags within seconds
 RFID tags can have information printed on them like
instructions, barcodes, or company names
 RFID systems can be integrated with other internal systems or
processes
Applications of RFID
RFID technology may be used in a variety of applications
including:
 Passports
 Smart cards
 Airplane luggage
 Toll booth passes
 Home appliances
 Merchandise tags
 Animal and pet tags
 Automobile key-and-lock
 Monitoring heart patients
 Telephone and computer networks
 Operation of spacecraft and satellites
RFID: a threat to privacy?
 There is growing recognition that the same RFID
application which is employed exstensibly to prevent
counterfeiting or the theft of cash or goods could also
be used to track an individual’s spending habits,
preferences and even physical movements.
 From a privacy standpoint, the current simplicity of
the tag’s response, which does not differentiate
between requests based on origin or identity, is a flaw.
 Thieves could use the tags to locate the whereabouts of
valuables and interested persons could obtain access
to another’s medical records or passport details, or
trace another’s spending habits or physical
movements.

More Related Content

What's hot (20)

Ppt
PptPpt
Ppt
 
Phishing
PhishingPhishing
Phishing
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Cyber security
Cyber securityCyber security
Cyber security
 
Privacy in cyberspace
Privacy in cyberspacePrivacy in cyberspace
Privacy in cyberspace
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Phishing
PhishingPhishing
Phishing
 
ethical legal issues
ethical legal issuesethical legal issues
ethical legal issues
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Cyber law
Cyber lawCyber law
Cyber law
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 

Similar to Unit 6 Privacy technological impacts.ppt

protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...Rishav Gupta
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats07Deeps
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxMoizAhmed398372
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsKimarie Brown
 
Cyber crime - and digital device.pptx
Cyber crime - and digital device.pptxCyber crime - and digital device.pptx
Cyber crime - and digital device.pptxAlAsad4
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemssaltashict
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxFannyKwok1
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commercehidivin652
 
Information security
Information securityInformation security
Information securityIshaRana14
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxCabdullhiY
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism Accenture
 

Similar to Unit 6 Privacy technological impacts.ppt (20)

protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cyber crime - and digital device.pptx
Cyber crime - and digital device.pptxCyber crime - and digital device.pptx
Cyber crime - and digital device.pptx
 
TAMUC LO 7
TAMUC LO 7TAMUC LO 7
TAMUC LO 7
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptx
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 
Information security
Information securityInformation security
Information security
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Unit 6 Privacy technological impacts.ppt

  • 1.
  • 2. Characteristics of the Internet  (+) public and available for anyone,  (+) a useful tool for opening access to data of public interest  (+) serves freedom of thinking and freedom of expression on a global level BUT  (-) rather vulnerable in terms of data security  (-) a potential source of inaccurate or untruthful information;  (-) apt to make room for illegal activity
  • 3. What is Privacy?  Privacy is the right to be left alone and free from surveillance and unreasonable personal intrusions.  Information privacy is the right to determine when and to what extent information about oneself can be communicated to others.  This applies to individuals, groups, and institutions.
  • 4. Internet privacy ability to control what information one reveals about oneself over the Internet, and to control who can access that information
  • 5. Privacy issues  There are a number of privacy issues that are of concern, including  electronic surveillance  Email  Web  availability of personal information,  cookies and spyware  workplace monitoring
  • 6. Privacy Issues  Employers search social networking sites for background information on applicants  Monitoring systems are adopted by employers to check employee performance  Information technology has aided in the easy availability of personal information • Information in databases can be used for direct marketing and for credit checks on potential borrowers or renters
  • 7. E-surveillance  Electronic surveillance involves  monitoring people with technology, often without their knowledge  Video recordings  photography  audio recordings
  • 8. E-mail  Spam: Unsolicited e-mail sent for advertising purposes • Sent in bulk using automated mailing software  Ease of access • Individuals should assume that others have access to their messages • Any e-mails sent on company-owned computers are the property of the organization
  • 9. Data Collection on the Web  Due to the increase in online shopping, personal details of individuals are prone to misuse • Issue of personal information being sold to telemarketing firms resulting in spam  Information provided on the Web can be combined with other information and technologies to produce new information
  • 10. Technologies Used for Data Collection  Cookies: Small text files with unique ID tags that are embedded in a Web browser and saved on the user’s hard drive • Help websites customize pages for users • Considered an invasion of privacy when users’ information is used without prior consent • Installing a cookie manager helps users disable cookies • Log files: Generated by Web server software, record a user’s actions on a website
  • 11. Personal Information • Personal information can be disclosed in a number of ways: • Loans • Orders via mail • Magazine subscriptions • Tax forms • Applications for schools, jobs, clubs • Insurance claim • Hospital stay • Sending checks • Advertisers
  • 12. Cookies Cookie  Stores information about you  Located on your hard drive  Beneficial uses  Viewing preferences  Online shopping  Secure sites retain password in cookie  Controversial use  Tracking surfing habits for advertisers  Can set browser to refuse cookies or warn before storing  Software available to manage cookies
  • 13. Spyware  Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.  Spyware is classified as a type of malware — malicious software designed to gain access to or damage your computer, often without your knowledge.
  • 14. Workplace monitoring Monitoring software  Screens  E-mail  Keystrokes per minute  Length of breaks  What computer files are used and for how long
  • 15. Risks to Internet privacy User-tracking:  Internet Service Providers (capable to observe any Internet-related activity of the user)  Cookies (parcels of text sent by a server) tracking and maintaining specific information of the user  Data logging (may include recording times when the computer is in use, or which web sites are visited)  Spyware programs  Web bug  Social engineering  Phishing  Malicious proxy server  Search engines
  • 16. Risks to Internet privacy (ctd.) On-line social networks:  Participants are offering self-profile in order to contact or being contacted.  Risks range from identity theft to online and physical stalking, embarrasment, discrimination and blackmailing.
  • 17. Guidelines to Minimize the Invasion of Privacy  Conduct business only with websites having privacy policies  Limit access to personal information to those with authorization  Ensure data’s reliability and take precautions to prevent misuse of the data  Data collection must have a stated purpose  Identify ways to prevent personal information gathered being disclosed without consent
  • 18. Guidelines to Minimize the Invasion of Privacy  Organizations should use verification procedures to ensure data accuracy  Organizations must correct or delete incorrect data • Prevent unauthorized access to data and misuse of data  Users should review their records and correct any inaccuracies  Transparency in record-keeping systems storing personal data
  • 19. RFID  RFID stands for Radio-Frequency IDentification.  The acronym refers to small electronic devices that consist of a small chip and an antenna.  The chip typically is capable of carrying 2,000 bytes of data or less.  The RFID device serves the same purpose as a bar code or a magnetic strip on the back of a credit card or ATM card; it provides a unique identifier for that object. And, just as a bar code or magnetic strip must be scanned to get the information, the RFID device must be scanned to retrieve the identifying information.
  • 20. RFID Works Better Than Barcodes  A significant advantage of RFID devices over the others mentioned above is that the RFID device does not need to be positioned precisely relative to the scanner. RFID devices will work within a few feet (up to 20 feet for high-frequency devices) of the scanner.  For example, you could just put all of your groceries or purchases in a bag, and set the bag on the scanner. It would be able to query all of the RFID devices and total your purchase immediately.
  • 21. Below are some additional benefits of using RFID:  RFID doesn’t need line of sight  RFID tags are able to be rewritten and reused  RFID tags can be extremely durable against impact and environmental factors  RFID tag data is encrypted and can also be locked for extra security  RFID tags can hold more data than other types of tags or labels  RFID readers can read hundreds of tags within seconds  RFID tags can have information printed on them like instructions, barcodes, or company names  RFID systems can be integrated with other internal systems or processes
  • 22. Applications of RFID RFID technology may be used in a variety of applications including:  Passports  Smart cards  Airplane luggage  Toll booth passes  Home appliances  Merchandise tags  Animal and pet tags  Automobile key-and-lock  Monitoring heart patients  Telephone and computer networks  Operation of spacecraft and satellites
  • 23. RFID: a threat to privacy?  There is growing recognition that the same RFID application which is employed exstensibly to prevent counterfeiting or the theft of cash or goods could also be used to track an individual’s spending habits, preferences and even physical movements.  From a privacy standpoint, the current simplicity of the tag’s response, which does not differentiate between requests based on origin or identity, is a flaw.  Thieves could use the tags to locate the whereabouts of valuables and interested persons could obtain access to another’s medical records or passport details, or trace another’s spending habits or physical movements.