170 likes | 616 Views
Introduction to computers and Information Technology Chapter 33, Issues for Computer Users Lesson 33-1, Privacy Online. Robert Crawford, MBA West Middle School. UNIT O BJECTIVES. Summarize the danger of sharing personal information on the internet.
E N D
Introduction to computers and Information TechnologyChapter 33, Issues for Computer UsersLesson 33-1, Privacy Online Robert Crawford, MBA West Middle School
UNIT O BJECTIVES • Summarize the danger of sharing personal information on the internet. • Explain how cookies and global unique identifiers endanger privacy. Essential Question What are some of the threats to our privacy online?
KEY TERMS • Global Unique Identifier (GUID) • Infringe In book, but not listed as a key term (these are the ones you need to write down) : • Cookie Not in book: • Digital Footprint
Before we go too far in this unit • What is Privacy? • I will provide a couple of definitions: noun • the state or condition of being free from being observed or disturbed by other people. • the state of being free from public attention.
Privacy in Cyberspace Page 452 • We share information both: • Knowingly • Unknowingly
How Businesses Obtain Personal Information (pg. 452) • Sources Include: • Public Records • Directly from the individual • Website registration • Online Purchases • Warranty Registration • Sweepstakes Entries • This information is then, often, sold to other companies, such as marketing companies. • The information is also saved, forming your “digital footprint.”
Digital Footprint (not in text) • Digital Footprint (not in text) • A digital footprint is the data that is left behind by users on digital services. • There are two main classifications for digital footprints: passive and active. • A passive digital footprint is created when data is collected without the owner knowing • An active digital footprint is created when personal data is released deliberately by a user for the purpose of sharing information about oneself by means of websites or social media. Mention Amazon Adaptive Pricing http://en.wikipedia.org/wiki/Digital_footprint
Protecting Privacy (pg. 452) Different countries have different standards of online privacy Most restricted Restricted Some restrictions Minimal restrictions Effectively no restrictions No legislation or no information http://www.forrestertools.com/heatmap/
Protecting others Privacy (pg. 453) • It is not enough to guard your own privacy online. • You have an ethical, and increasingly legal, responsibility to protect the privacy of others online. • Infringe: • mid 16th century: from Latininfringere, from in- 'into' +frangere 'to break'.
Protecting others Privacy (pg. 453) • It is not enough to guard your own privacy online. • You have an ethical, and increasingly legal, responsibility to protect the privacy of others online. The “Golden Rule” isn’t enough
Expectations of Privacy (pg. 453) • Is your e-mail truly private? • This is particularly relevant as the school goes to a Google domain • Soon the school will be issuing you an e-mail address • Your e-mail is not private. • Firstly, it is easily forwarded. • Secondly, anything on a computer system belongs to whoever owns the system. • I am not saying this is right, only that it is. • Do not ever send anything by e-mail that you would be deeply embarrassed if it were to become public information.
New Technology and your privacy Page 453
New Technology and your privacy (pg. 453) • We frequently share information about ourselves knowingly (we are aware that we are sharing information). • Do we ever share information unknowingly? • Remember the Passive Digital Footprint. • A digital footprint is the data that is left behind by users on digital services. • A passive digital footprint is created when data is collected without the owner knowing Remarketing Related video
Cookies (pg. 453) • As relates to computers, what is a cookie? • As relates to computers, a cookie is a small file that is stored on your hard drive when you visit some websites. • What do cookies provide? • They provide the website with a means of storing information about you. • You can mange the cookie settings on your computer
Global Unique Identifiers (pg. 453) • Global unique Identifier (GUID) • A unique number assigned to a person, a piece of software, or a piece of hardware • Similar to a MAC Address, except that people are not aware of its presence. • A media access controladdress (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and WiFi. • getmacifconfig/all (can be spoofed) • Because people are not aware they are being tracked, the information can be abused. http://en.wikipedia.org/wiki/MAC_address
UNIT O BJECTIVES • Summarize the danger of sharing personal information on the internet. • Explain how cookies and global unique identifiers endanger privacy.
KEY TERMS • Global Unique Identifier (GUID) • Infringe In book, but not listed as a key term: • Cookie Not in book (these are the ones you need to write down) • Digital Footprint