1 / 0

Why to study privacy?

Why to study privacy?. Understanding the risks and problems is a first step toward protecting privacy. For computer professionals, understanding the risks and problems is a step toward designing systems with built-in privacy protections and less risk. Key aspects of privacy.

trinh
Download Presentation

Why to study privacy?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Why to study privacy? Understanding the risks and problems is a first step toward protecting privacy. For computer professionals, understanding the risks and problems is a step toward designing systems with built-in privacy protections and less risk
  2. Key aspects of privacy There are three key aspects of privacy: Freedom from intrusion—being left alone Control of information about oneself Freedom from surveillance (from being followed, tracked, watched, and eavesdropped upon
  3. Critics of privacy Critics of privacy argue that it gives cover to deception, hypocrisy, and wrongdoing. It allows fraud. It protects the guilty. Concern for privacy may be regarded with a suspicious “What do you have to hide?”
  4. Supporters of privacy The desire to keep things private does not mean we are doing anything wrong. We might wish to keep health, relationship, and family issues private. We might wish to keep religious beliefs and political views private from some of the people we interact with. Privacy of some kinds of information can be important to safety and security as well. Examples include travel plans, financial data, and for some people, simply a home address.
  5. Privacy Threats Privacy threats come in several categories: Intentional, institutional uses of personal information (in the government sector primarily for law enforcement and tax collection, and in the private sector primarily for marketing and decision making) Unauthorized use or release by “insiders,” the people who maintain the information Theft of information Inadvertent leakage of information through negligence or carelessness Our own actions (sometimes intentional trade-offs and sometimes when we are unaware of the risks)
  6. Privacy issues arise in many contexts. Spam, the intrusion of junk email and text messages, Hacking and identity theft Monitoring of workplace communications and other issues of privacy for employees privacy risks result from the fact that so much of the data stored about us is incorrect. Databases contain errors. Files are not updated. Records of different people with similar names or other similarities get comingled or confused. Responsibilities of computer professionals.
  7. Point to understand We cannot expect complete privacy. Nor can we expect to be totally free from surveillance.
  8. Invasion of Privacy Information is most value able commodity today. For business information is ‘money’ For some governmental and military organizations, information is security and for this reason they manipulate personal data in the name of safety and public security. Although IT is related to privacy violation, it is not computers that invade privacy but people who have the tendency, in various ways, to invade the privacy of others.
  9. Invasion of privacy is a legal term which refers primarily to a person's right to keep his or her life private and free from the intrusion of others. Invasion of privacy charges are usually presented in a civil lawsuit against an organization that has crossed a perceived line into a celebrity or other person's private life. Employee Invasion Of Privacy. Since the employer owns the phone lines, he or she can get records of all phone calls made from workplace phones. Another issue of concern to employees is privacy while using work computers. Since the employer owns the computers and the network, employeeprivacy laws do little to protect employees while using the computer.
  10. Invasion of Privacy To select different kind of sensitive data such as banking records, police records, insurance records, phone calls, military records, medical records, airline reservation, passport registration, and credit card purchases,advanced information technologies used as instruments of surveillance, they include: Network databases Digital and Television cameras Microphone transmitters Camouflaging bug devices Monitoring hardware device and software programs
  11. Invasion of Privacy Invasion of Privacy by Government In some cases government collect personal data for identification reasons, in case of emergency, for security reasons, in case of criminal actions, and for information reasons, in case of national statistics. In a computerized world where only information has value, individuals are usually treated more as the sum of data than as free human beings. This issue underlies the problem of freedom and privacy in modern societies.
  12. Invasion of Privacy Rights of Privacy Solitude. I have the right to be alone without disturbance. Anonymity. I have the right to have no personal identity in public Intimacy. I have the right to do something privately (private cozy atmosphere) Reserve. I have right to control personal information about oneself as well as the methods of dissemination of that information. E.g. to limit disclosure to others
  13. Rights of Privacy Problems of Privacy involves: Territorial Privacy. Limiting the intrusion into domestic, professional, civil and recreational environment. Methods: Authentication control, Biometric scanning, Laser cards, Video Surveillance etc etc. 2. Location Privacy Managing geolocation technologies(such as GPS and satellite system)
  14. Rights of Privacy Bodily Privacy. Respecting the integrity of an individual’s body through restriction on invasive activity. Protection of people's physical selves against invasive procedures such as genetic tests, drug testing and cavity searches etc Topics of Bodily privacy include: Blood transfusion without consent Arbitrary arrest and detention, and kidnapping Torture
  15. Rights of Privacy 4. Communication Privacy. Include privacy of emails, teleconferences, postal mail etc. Information Privacy (It include legislation and industry codes…….credit information, medical record, government record). 6. Personal Privacy (undue interference, such as physical searches, and information gathering)
  16. Human Rights According to British Philosopher John Locke, most fundamental human rights are life, liberty, and property. Locke maintains that any threat to an individual’s private property is a potential threat to that individual’s personal life, and therefore, liberty and privacy have to be undeniably protected. It is further argued by Emmanuel Kant that rationality and autonomy are essential prerequisites in the freedom of a person.
  17. Methods of Privacy Violation Intrusion. (wrong entry or acquiring possession of property that belongs to another, violation of privacy) Misuse of information. Interception of information. Act of secretly listening to the private conversation of others without their consent Unauthorized access to private communication
  18. Methods of Privacy Violation 4. Data Matching It involves bringing together data from different sources, compiled it and applied to a range of public policy purposes. Much of the data-matching done by agencies subject to the Privacy Act aims to identify people for further action or investigation. Government agencies for Tax purpose as well. Data-matching poses a particular threat to personal privacy because it involves analysing information about large numbers of people without prior cause for suspicion.
  19. Methods of Privacy Violation Data Mining Compiling of masses of data into one or more databases in order to extract new information and knowledge that were previously hidden and/or unidentified. This technique uses artificial intelligence, neural networks It is used in direct marketing Commercial companies to discover patterns of behavior for consumer’s preferences and activities. e.g. Credit card company may determine how consumers have spend their money.
  20. Methods of Privacy Violation Computer databases and networks are not the only IT tools involved in the invasion of privacy. Video cameras, satellite, the internet, and ID cards are actively engaged in monitoring people and collecting information about them.
  21. Activity Think of any privacy related incident where you think your privacy got invaded.
  22. Key Privacy And Anonymity Issues Data encryption Identity theft Customer profiling Workplace monitoring Spamming Advanced surveillance techniques
  23. Data Encryption Cryptography •science of encoding messages •only sender and intended receiver can understand the messages •key tool for ensuring confidentiality, integrity, authenticity of electronic messages and online business transactions Encryption •process of converting electronic messages into a form understood only by the intended recipients
  24. Data Encryption Despite potential management and administration headaches most people agree encryption eventually must be built into •networks •file servers •tape backup systems
  25. Identity Theft Theft of key pieces of personal information to gain access to a person’s financial accounts •using this info, ID thief may apply for new credit or financial accounts, register for college courses, etc—all in someone else’s name Information includes: •name •address •date of birth •Social Security number •passport number •driver’s license number •mother’s maiden name
  26. Identity Theft Phishing •attempt to steal personal identity data •by tricking users into entering information on a counterfeit Web site (spoof emails) •spear-phishing - a variation in which employees are sent phony e-mails that look like they came from high-level executives within their organization
  27. Identity Theft Spyware •keystroke-logging software downloaded to user’s computer without consent •enables the capture of: -account usernames -passwords -credit card numbers -other sensitive information •operates even if an infected computer is not connected to the Internet •records keystrokes until users reconnects; data collected then emailed to spy or posted to a web site
  28. Consumer Profiling Companies can collect info about consumers without their explicit permission! Companies openly collect personal information about Internet users •when they register at web sites, complete surveys, fill out forms or enter contests online Cookies •text files a web site places on user’s hard drive so that it can remember info •examples: site preferences, contents of electronic shopping cart •cookie are sent back to server unchanged by browser each time it accesses that server Tracking software •identify visitors to your web site from e.g. pay-per-click accounts
  29. Consumer Profiling Similar methods used outside the Web environment •marketing firms warehouse consumer data •for example, credit card purchases, frequent flier points, mail-order catalogue purchases, phone surveys Databases contain a huge amount of consumer behavioral data Affiliated Web sites: •group of web sites served by single advertising network •DoubleClick tracks ad clicks and web purchases: useful for marketers and sellers Customized service for each consumer •marketers use cookies to recognize return visitors and store useful info about them
  30. Consumer Profiling Four ways to limit or even stop the deposit of cookies on hard drives •set the browser to limit or stop cookies •manually delete them from the hard drive •download and install a cookie-management program •use anonymous browsing programs that don’t accept cookies -e.g. anonymizer.com allows you to hide your identity while browsing
  31. Code of Fair Information Practices and 1980 OECD privacy guidelines •companies collect only personal info necessary to deliver its products/services •protects this info •informs customers if it intends to use this info for research or marketing •provides a means for customers to opt out
  32. Workplace Monitoring •ensure worker productivity without violating privacy rights of employees Employers monitor workers •record email, surfing activity, files, even videotaping employees on the job Inform employees of electronic monitoring devices; restrict type of info collected
  33. Spamming Transmission of same e-mail message to large number of people Extremely inexpensive method of marketing •$1K vs. $10K for direct-mail campaign •3 weeks to develop vs. 3 months •48hrs for feedback vs. 3 weeks Used by many legitimate organizations •example: product announcements Can contain unwanted and objectionable materials Last 2 bullets point to the ethical conundrum! Email considered Spam: 40% of all email; Daily Spam emails sent: 12.4 billion; Daily Spam received per person: 6; Annual Spam received per person: 2,200; Spam cost to all non-corp Internet users: $255 million; Spam cost to all U.S. Corporations in 2002: $8.9 billion: States with Anti-Spam Laws: 26
  34. The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act 2004 says it is legal to spam but -spammers cannot disguise their identity -there must be a label in the message specifying that the e-mail is an ad or solicitation -they must include a way for recipients to indicate they do not want future mass mailings (i.e. opt out) •may have actually increased the flow of spam as it legalizes the sending of unsolicited e-mail
  35. Advanced Surveillance Technology Provides exciting new data-gathering capabilities vs. personal-privacy issues •advocates: people have no legitimate expectation of privacy in public places •critics: creates potential for abuse – intimidation of political dissenters, blackmail of people caught with “wrong” person or in “wrong” place Camera surveillance •U.S. cities plan to expand surveillance systems London has one of world’s largest public surveillance systems •“Smart surveillance system” singles out people acting suspiciously
  36. Advanced Surveillance Technology Facial recognition software •identifies criminal suspects and other undesirable characters •yields mixed results Global Positioning System (GPS) chips •Placed in many devices to precisely locate users -cars, cellphones, etc. •Good: accurately respond to 911 callers; real-time location-aware marketing •Bad: wireless spamming from local restaurants etc, your whereabouts always known
  37. Advanced Surveillance Technology Facial recognition software •identifies criminal suspects and other undesirable characters •yields mixed results Global Positioning System (GPS) chips •Placed in many devices to precisely locate users -cars, cellphones, etc. •Good: accurately respond to 911 callers; real-time location-aware marketing •Bad: wireless spamming from local restaurants etc, your whereabouts always known
  38. EXAMPLES( CASE STUDIES )
  39. Search engines collect many terabytes of data daily Search engine companies want to know how many pages of search results users actually look at, how many they click on, how they refine their search queries, and what spelling errors they commonly make. The companies analyze the data to improve search services, to target advertising better, and to develop new services.
  40. Search engines The database of past queries also provides realistic input for testing and evaluating modifications in the algorithms search engines use to select and rank results. Search query data are valuable to many companies besides search engine companies. By analyzing search queries, companies draw conclusions about what kinds of products and features people are looking for. They modify their products to meet consumer preferences.
  41. Search engines In 2006, the federal government presented Google with a subpoena for two months of user search queries and all the Web addresses that Google indexes. Google protested, bringing the issue to public attention. A subpoena is a court order for someone to give testimony or provide documents or other information for an investigation or a trial
  42. Search engines the idea of the government gaining access to the details of people’s searches horrified privacy advocates and many people who use search engines. Google and privacy advocates opposed the precedent of government access to large masses of such data. A court reduced the scope of the subpoena, removing user queries.
  43. Search engines A few months later, release of a huge database of search queries at AOL showed that privacy violations occur even when the company does not associate the queries with people’s names. Against company policy, an employee put the data on a website for search technology researchers. This data included more than 20 million search queries by more than 650,000 people from a three-month period
  44. Example: Smartphones Some Android phones and iPhones send location data (essentially the location of nearby cell towers) to Google and Apple, respectively. Companies use the data to build location-based services that can be quite valuable for the public and for the companies.
  45. Smartphones Roughly half the apps in one test sent the phone’s ID number or location to other companies (in addition to the one that provided the app). Some sent age and gender information to advertising companies. The apps sent the data without the user’s knowledge or consent. Various apps copy the user’s contact list to remote servers. Android phones and iPhones allow apps to copy photos (and, for example, post them on the Internet) if the user permits the app to do certain other things that have nothing to do with photos. (Google said this capability dated from when photos were on removable memory cards and thus less vulnerable. This is a reminder that designers must regularly review and update security design decisions.)
  46. Smartphones A major bank announced that its free mobile banking app inadvertently stored account numbers and security access codes in a hidden file on the user’s phone. A phone maker found a flaw in its phones that allowed apps to access email addresses and texting data without the owner’s permission. Some iPhones stored months of data, in a hidden file, about where the phone had been and when, even if the user had turned off location services. Data in such files are vulnerable to loss, hacking, and misuse. If you do not know the phone stores the information, you do not know to erase it. Given the complexity of smartphone software, it is possible that the companies honestly did not intend the phones to do these things
More Related