+ All Categories
Home > Documents > Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha...

Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha...

Date post: 21-Dec-2015
Category:
View: 214 times
Download: 0 times
Share this document with a friend
51
Privacy and Civil Privacy and Civil Liberties Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong
Transcript
Page 1: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Privacy and Civil LibertiesPrivacy and Civil Liberties

Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg

Samantha WeitzmanHim Seng Wong

Page 2: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

An Ethical and Legal Basis for An Ethical and Legal Basis for Privacy ProtectionPrivacy Protection

By: Joseph Sharkey

Page 3: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

What do we mean by “privacy What do we mean by “privacy protection”?protection”?

Privacy- “freedom from unauthorized intrusion.” (Merriam-Webster)

Page 4: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Legal BasisLegal Basis

Fourth Amendment protects against unreasonable searches and seizures.

Acts such as the Patriot Act (2001) threaten privacy.

Several Supreme Court cases deal with privacy protection.

Page 5: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Ethical Concerns: How Ethical Concerns: How Technology Affects PrivacyTechnology Affects Privacy

“Between the ubiquity of television and the Internet -- and the utterly uninhibited manner in which people speak on their cell phones in public -- we live in an era of unprecedented exhibitionism”

-Ethan Bronner of the New York Times

Page 6: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Ethical Concerns: How Ethical Concerns: How Technology Affects PrivacyTechnology Affects Privacy

“Technology has revolutionized the exchange of not only money, but all kinds of information. And the convenience and security that change provides often comes at the expense of personal privacy”

-Rosamaria Mancini of the Long Island Business News

Page 7: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Who’s Responsible?Who’s Responsible?

According to William Stallings, developers are.

“While some of the [bad] effects…may be the ‘unintended consequences’ of…good intentions, they are consequences none the less”

Page 8: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

ConclusionConclusion

There is both a legal and ethical foundation for privacy protection.

Technology can significantly limit privacy.As Computer Science majors, we are

morally responsible for the consequences of the technology we develop.

Page 9: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Privacy Implications of Privacy Implications of Massive Database SystemsMassive Database Systems

By: Victor Murygin

Page 10: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

BriefBrief HistoryHistory

First Generation: File systems, 50’s – 60’s Second Generation: Hierarchical Database, late 60’s –

early 70’s Third Generation: Network Database, late 60’s – early 70’s Fourth Generation: Relational Database Systems, early

70’s Fifth Generation: Object-Oriented and Object-Relational

Database Systems, 80’s – Present– Access control through a three-level database schema architecture

Page 11: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

External External . . . . External Schema 1 Schema 2 Schema n

Conceptual Schema

Internal Schema

“Lecture Notes for CS 432”

Page 12: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Database Encryption TechnologyDatabase Encryption Technology

Ingrian Networks' DataSecure Platform– lets you encrypt certain fields before

you enter them in the database and automatically decrypts them on the way out

Page 13: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Database Encryption TechnologyDatabase Encryption Technology

All-or-nothing encryption– Big overhead cost– Application performance suffers, DB recovery takes

longer, troubleshooting bad queries is harder Encrypted data is presented as characters Ex. 4 byte integer becomes 8 or 16 byte character string Encrypted data will triple, quadruple in size

Some solutions:– Do not encrypt everything– Use encryption-acceleration tools to speed up the

performance

Page 14: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Ethical ImplicationsEthical Implications

Even with all this cost, encrypting data is essential if one wants to keep his records private

Most companies today go to extreme lengths to make sure their data is kept private.

Because of the history of corporate espionage, only few employees have access to the company’s databases.

Page 15: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Ethical ImplicationsEthical Implications

Problem: many IT professionals don’t know very much about privacy debate.

Database administrator’s responsibilities have increased

Besides ethical policies, there are specific laws dealing with data privacy

Page 16: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

The The FutureFuture

Most companies feel that IT professionals and database administrators need to learn more about privacy issues.

Some colleges (Iowa State) push to integrate ethics into the curriculum

There are 50 bills pending in Congress concerning privacy.

Page 17: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Technological Strategies for Technological Strategies for Privacy ProtectionPrivacy Protection

By: Dominic Tsang

Page 18: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Privacy In Technology TodayPrivacy In Technology Today

Often a complex tradeoff between the need for security and privacy

How privacy is usually implemented today:– Encryption of data streams to and from

computers to stop people from snooping data en-route

– Privacy certificates and privacy statements

Page 19: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Why Current Standards Aren’t Why Current Standards Aren’t EnoughEnough

Encryption of data streams is fine – but most breaches occur in the databases that stores data

Who reads through the certificates and privacy statements to see if they are stringent enough?

Page 20: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Identity ManagementIdentity Management

Identity management is the first step we use to ensure privacy

At its base encompasses logins and passwords A paradigm shift about its actual ineffectiveness

has been slow in coming as these are often easily compromised

What can be done:– Supplement with other systems such as the SecurID

system which adds a second part to PINs through hardware such as smart cards

Page 21: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Case Study – p2pCase Study – p2p

In reaction to the RIAA’s lawsuits against p2p service users it has become a perfect breeding ground for privacy technology development

Privacy as a trade-off in app efficiencyTechnologies already in place:

– Decentralized servers– Encrypted searches

Page 22: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Proxies in p2pProxies in p2p

The use of proxies in p2p technology has emerged as the next step in for ensuring

Privacy is abridged by IP addresses that can potentially uniquely identify a computer– Analogy as a “digital middleman”

A process of “handing off” a file chunk to a web server which then sends off the data to the file requester

Page 23: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Proxies In p2p (cont.)Proxies In p2p (cont.)

Taken from: http://www.eagle-software.com/CR_Diagramming_Sequence.htm

Page 24: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Built In PrivacyBuilt In Privacy

Future applications and other technologies must be built with both privacy and security in mind

Examples:– Cell phones with user tracking technology– DRM

Page 25: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Digital Rights Management Digital Rights Management (DRM)(DRM)

A technology under development that demonstrates the trade between security and privacy

Stated purposes of DRM:– User specific access to data– Tracking of data usage

Privacy is NOT a concern built into the current framework resulting in possible tracking of any and all activities of users

Page 26: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

DRM Diagram on a Mobile DRM Diagram on a Mobile PlatformPlatform

Taken from http://www.nds.com/mobile_solutions/mobile_system_diagram.html

Page 27: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Concluding Remarks…Concluding Remarks…

Privacy is often a concern that takes a backseat to usability and security

If we are to create better technology, this aspect can not be neglected least we find our advancements more harmful to mankind than helpful

Page 28: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

By: Ivy Weinberg

Freedom of ExpressionFreedom of Expressionin Cyberspacein Cyberspace

Page 29: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

First AmendmentFirst Amendment

“Congress shall make no law respecting an establishment of religion, or prohibiting the

free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble,

and to petition the government for a redress of grievances.”

Page 30: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Court CasesCourt Cases

Miller v. California (1973)– Established three part guidelines for determining if material is considered

obscene under the law Reno v. ACLU (1997)

– Found that the Communications Decency Act (1996), designed to protect

minors from harmful material on the Internet, was unconstitutional Yahoo Inc. v. La Ligue Contre Le Racisme et L’Antisemitisme (2001)

– Issued an order to dissuade any users from using Yahoo auction site because it displayed Nazi memorabilia.

Page 31: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Censorship RegulationsCensorship Regulations

Communications Decency Act (1996)Child Online Protection Act (1998) Children’s Internet Protection Act (2000)

Page 32: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.
Page 33: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Anti-Censorship OrganizationsAnti-Censorship Organizations

Peacefire.orgFamilies Against Internet CensorshipCitizens Internet Empowerment CoalitionAmerican Civil Liberties Union

Page 34: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Censorship ActivistsCensorship Activists

Senator Jim Exon, D-NebraskaDan Lungren, California Attorney General

Page 35: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

ConclusionConclusion

Should information portray values of individual or society as a whole?

Diversity and size of the Internet will prevent a standard from ever being established

Government and enthusiasts will continue to argue ethics until a “norm” is created

Page 36: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

By: Samantha Weitzman

International ImplicationsInternational Implications

Page 37: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Convention on Cyber CrimeConvention on Cyber Crime

International Cyber Crime Treaty (2001)

Page 38: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

International SecurityInternational Security

United States and European UnionTransfer of Air Passenger Name Record (P

NR) (2003)

Page 39: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Digital Civil Rights GroupsDigital Civil Rights Groups

World Privacy ForumEuropean Digital RightsPrivacy International

Page 40: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Concluding ThoughtsConcluding Thoughts

International Cooperation vs. Protection of Civil Liberties

Compromise Privacy for Security & Law Enforcement?

The price of freedom is eternal vigilance.  --  Thomas Jefferson

Page 41: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

By: Him Seng Wong

Intercultural ImplicationsIntercultural Implications

Page 42: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Intercultural ImplicationsIntercultural Implications

Interaction of people of different culturesInternational CompaniesWebsites design

Page 43: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Intercultural ImplicationsIntercultural Implications

Interaction of people of different culturesInternational CompaniesWebsites design

Page 44: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

What can be done?What can be done?

Do research and understand target’s market cultures

Websites – translation and localization

Page 45: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

World Language Statistical Facts World Language Statistical Facts

Source: http://global-reach.biz/globstats/index.php3

Page 46: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

World Language Statistical FactsWorld Language Statistical Facts "Web users are up to four times more likely to

purchase from a site that communicates in the customer's language" (www.idc.com)

"Site stickiness is doubled when a web site is translated - visitors stay for twice as long" (Forrester Research)

"Almost one-third of web sites are presented in a language other than English" (Messaging Online)

"By 2004, 50% of all-online sales are expected to occur outside the US" (Forrester Research)

Page 47: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Language and Cultural Language and Cultural differencesdifferences

In Taiwan, the translation of Pepsi slogan “Come alive with Pepsi” came out “Pepsi will bring your ancestors back from the dead.”

In Chinese, the Kentucky Fried Chicken slogan “Finger Lickin’ Good” translated as “Eat your fingers off.”

Source: http://lynn_meade.tripod.com/id52.htm

Page 48: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

More examplesMore examples

When General Motors introduced the Chevy Nova in South America, it was unaware that “nova” means “it won't go.”  After the company figured our why it wasn't selling many cars, it renamed the car “Caribe”.

Source: http://lynn_meade.tripod.com/id52.htm

Page 49: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

Greeting ritualsGreeting rituals Americans – shake hands and sometimes with

back pat

Korean and Asian cultures – bow and divert eye contact depending on the status

Japanese typically exchange business card-one should grab the card with both hands, carefully examine it and put it carefully in a shirt pocket (Never in a pant pocket that would show disrespect.)

Source: http://lynn_meade.tripod.com/id52.htm

Page 50: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

ConclusionConclusion

Companies having business relationship globally should consider culture as an important issue.

Cultures are not limited to verbal communication, non verbal communications such as gesture, facial expression, and other body languages are also very important.

Page 51: Privacy and Civil Liberties Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg Samantha Weitzman Him Seng Wong.

ReferencesReferences

http://lynn_meade.tripod.com/id52.htm http://global-reach.biz http://www.idc.com/ http://www.forrester.com/ http://www.messagingonline.com/


Recommended