Privacy C O M P U T I N G ... S E C T I O N I...
Download
Report
Transcript Privacy C O M P U T I N G ... S E C T I O N I...
Privacy
COMPUTING AT CARNEGIE MELLON
SECTION I2
Introduction
Lauren Milisits
What is PRIVACY?
The ability to seclude information and oneself
Possible violations of privacy:
Cookies
Google Maps (street view)
Criminal Registration
Criminal justice & inmates
Background Information
Erika Tang
History of Information Protection
Pre-Digital Era
primary modes of communication and exchange had
physical evidence (i.e. paper trails)
hard to invade a person's privacy without finding
tangible records of personal information
Dawn of the Digital Age
new modes of communication and exchange
social networking sites
email
on-line shopping
greater avenues for the violation of privacy
identity theft, fraud,etc.
no longer need paper trail to invade privacy
Positive Aspects and Benefits
Emerson Hum
Positive Aspects of Having Sufficient Privacy
Individual can do work in seclusion without
revealing certain information about themselves
Individual has a level of security and confidentiality
when on the computer
Individual has protection in conducting interactions
with others such as payment transactions or chatting
Steps Taken to Improve Privacy and Lessen the
Effects of Privacy Invasion
Using non-common passwords
HTTPS connections provide security to servers
Ability to remove cookies
Avoiding sites that seem unreliable or fishy
Privacy invasion laws specific for computer crimes
Internet regulation to prevent others committing
frauds/scams to steal information
Criticism
Like Li
Increased Internet Privacy?
IN SUPPORT OF
IN OPPOSITION OF
Users should be able to
Government
know exactly how their
data is being used
Users should be able to
express their views
completely
anonymously on the
Internet
intervention to protect
consumer privacy
would stifle innovation
Having some way to
track users decreases
threats to safety (i.e.
Internet stalkers,
criminals, etc.)
Opinion
Lauren Milisits
What do we think?