CmpE 25 10/25/2011 – 10/27/2011. Identity and Privacy How important is identity online? How...

26
CmpE 25 10/25/2011 CmpE 25 10/25/2011 – 10/27/2011 – 10/27/2011
  • date post

    21-Dec-2015
  • Category

    Documents

  • view

    218
  • download

    3

Transcript of CmpE 25 10/25/2011 – 10/27/2011. Identity and Privacy How important is identity online? How...

CmpE 25 10/25/2011 – CmpE 25 10/25/2011 – 10/27/201110/27/2011

Identity and PrivacyIdentity and Privacy

How important is identity online?How important is identity online?• Can you connect identity online with Can you connect identity online with

face to face identity?face to face identity? How do you define identity online?How do you define identity online?

Online Identity Online Identity

Most individuals have multiple Most individuals have multiple identities online.identities online.

Our online identities identify us Our online identities identify us within a specific context.within a specific context.• Passwords are about securing a specific Passwords are about securing a specific

identity.identity.

Online IdentityOnline Identity

Does online identity go in two Does online identity go in two directions?directions?• Who we are Who we are • Who we are communicating withWho we are communicating with

Online IdentityOnline Identity

How important is it to secure a How important is it to secure a specific online identity?specific online identity?

What elements are important within What elements are important within the context of our online identity?the context of our online identity?• Examples age, credit card numberExamples age, credit card number

To what lengths would you go To what lengths would you go through to secure your online through to secure your online identify?identify?

Online IdentityOnline Identity

Other types of online identity.Other types of online identity.• Virtual identity; not connected to live Virtual identity; not connected to live

person but consistent within the person but consistent within the context.context.

• Anonymous identity; not connected and Anonymous identity; not connected and not consistent.not consistent.

Online IdentityOnline Identity

How important is anonymous identity How important is anonymous identity to empowerment?to empowerment?

Does anonymous identity cause Does anonymous identity cause issues?issues?

PrivacyPrivacy

How is privacy defined?How is privacy defined?• The right to be left alone.The right to be left alone.• The right to control information about The right to control information about

you.you.• The right not to invade one’s space.The right not to invade one’s space.

PrivacyPrivacy

Traditional notions of privacy are Traditional notions of privacy are based on the idea of trespass.based on the idea of trespass.

Protections against government Protections against government intrusions into your space.intrusions into your space.• Fourth AmendmentFourth Amendment• Reasonable expectation of privacy.Reasonable expectation of privacy.

TelephoneTelephone GarbageGarbage Hair cutHair cut

PrivacyPrivacy

What protects one against intrusions What protects one against intrusions of other individuals?of other individuals?• Laws against trespassLaws against trespass

PrivacyPrivacy

What is your expectation of privacy?What is your expectation of privacy? Is that expectation reasonable?Is that expectation reasonable?

PrivacyPrivacy

What do we expose online?What do we expose online?• Our financial dataOur financial data• Our locationOur location• Our friends, likes, purchasesOur friends, likes, purchases• Our interestsOur interests

On what do we base our expectation On what do we base our expectation of privacy?of privacy?

Hasn’t much of this data been Hasn’t much of this data been exposed without being online?exposed without being online?

PrivacyPrivacy

While much of that data is exposed online, While much of that data is exposed online, mobile technology has allowed us to take mobile technology has allowed us to take data that was protected in our homes and data that was protected in our homes and offices out in public.offices out in public.

Once in public do we have the same Once in public do we have the same expectation of privacy?expectation of privacy?• Police searches of cell phones.Police searches of cell phones.• Private searches of cell phones.Private searches of cell phones.

If I read your email/text messages on a phone you If I read your email/text messages on a phone you left on your desk, but do not take the phone what left on your desk, but do not take the phone what crime have I committed? crime have I committed?

PrivacyPrivacy

Much of the data that we expect to Much of the data that we expect to be private is no longer only kept in be private is no longer only kept in our homes and offices where the our homes and offices where the laws of trespass provides a degree of laws of trespass provides a degree of protection.protection.• Data on smart phonesData on smart phones• Digital camerasDigital cameras• LaptopsLaptops

PrivacyPrivacy

What is different is that without What is different is that without technology much of what we expose technology much of what we expose is useless.is useless.

Technology provides:Technology provides:• The ability to capture vast amounts of The ability to capture vast amounts of

datadata• The ability to store vast amounts of dataThe ability to store vast amounts of data• The ability to analyze that dataThe ability to analyze that data

PrivacyPrivacy

Beside online intrusions technology Beside online intrusions technology provides:provides:• Cameras, stop light camerasCameras, stop light cameras• DNA scanningDNA scanning• GPS trackingGPS tracking

When we are in public to we have an When we are in public to we have an expectation to privacy or to be expectation to privacy or to be anonymous? anonymous?

PrivacyPrivacy

When does data or information that is When does data or information that is publicly available without any expectation publicly available without any expectation of privacy become an invasion of privacy?of privacy become an invasion of privacy?• What we buyWhat we buy• Where we goWhere we go

When was the last time you went to store When was the last time you went to store and had to agree to terms of service that and had to agree to terms of service that contains a privacy policy?contains a privacy policy?

PrivacyPrivacy

With the ability to process vast With the ability to process vast amounts of data, individual pieces of amounts of data, individual pieces of data become much more valuable.data become much more valuable.

With increased value comes a desire With increased value comes a desire to collect more and more to collect more and more information.information.

PrivacyPrivacy

Do different generations have Do different generations have different expectations of privacy?different expectations of privacy?• Can you identity the reasons behind the Can you identity the reasons behind the

differences?differences? Should we just get over the lack of Should we just get over the lack of

privacy?privacy?

Unit Test ReviewUnit Test Review

EmpowermentEmpowerment• What does it mean?What does it mean?• What has been accomplished?What has been accomplished?• How can it be used responsibly?How can it be used responsibly?

Net neutrality Net neutrality • What does it mean?What does it mean?• How might it affect you?How might it affect you?

Unit Test ReviewUnit Test Review

Social Network User’s Bill of RightsSocial Network User’s Bill of Rights• What is it?What is it?• Is it important?Is it important?• Why might there be different views on Why might there be different views on

it’s importance?it’s importance?

Unit Test ReviewUnit Test Review

Access to the internet as a basic Access to the internet as a basic human right.human right.• Why do many people believe it is a basic Why do many people believe it is a basic

human right?human right?• What are the issues in making it a basic What are the issues in making it a basic

human right?human right?

Unit Test ReviewUnit Test Review

The Cyber PersonalityThe Cyber Personality• What changes in personality and What changes in personality and

behavior occur when one is online?behavior occur when one is online?• Do the changes continue when one is no Do the changes continue when one is no

longer online?longer online?

Unit Test ReviewUnit Test Review

Social InteractionSocial Interaction• The use of Technology and Social Media The use of Technology and Social Media

have caused changes in the way we have caused changes in the way we interact. What are those changes and interact. What are those changes and what impact have they had on social what impact have they had on social relationships?relationships?

Unit Test ReviewUnit Test Review

Online IdentityOnline Identity• What are the elements that make up our What are the elements that make up our

on line identity?on line identity? Does our online identity revile our total or Does our online identity revile our total or

true self?true self? Are people honest in displaying their online Are people honest in displaying their online

self?self?

• What are the benefits and issues with What are the benefits and issues with being anonymous online?being anonymous online?

Unit Test ReviewUnit Test Review

PrivacyPrivacy• How does technology impact our How does technology impact our

expectation of privacy?expectation of privacy?• What makes data that is public What makes data that is public

information feel like an invasion of our information feel like an invasion of our privacy?privacy?

• Is it really about privacy or being Is it really about privacy or being anonymous? anonymous?