Date post: | 21-Dec-2015 |
Category: |
Documents |
View: | 214 times |
Download: | 0 times |
Privacy and Civil LibertiesPrivacy and Civil Liberties
Victor Murygin Joseph Sharkey Dominic Tsang Ivy Weinberg
Samantha WeitzmanHim Seng Wong
An Ethical and Legal Basis for An Ethical and Legal Basis for Privacy ProtectionPrivacy Protection
By: Joseph Sharkey
What do we mean by “privacy What do we mean by “privacy protection”?protection”?
Privacy- “freedom from unauthorized intrusion.” (Merriam-Webster)
Legal BasisLegal Basis
Fourth Amendment protects against unreasonable searches and seizures.
Acts such as the Patriot Act (2001) threaten privacy.
Several Supreme Court cases deal with privacy protection.
Ethical Concerns: How Ethical Concerns: How Technology Affects PrivacyTechnology Affects Privacy
“Between the ubiquity of television and the Internet -- and the utterly uninhibited manner in which people speak on their cell phones in public -- we live in an era of unprecedented exhibitionism”
-Ethan Bronner of the New York Times
Ethical Concerns: How Ethical Concerns: How Technology Affects PrivacyTechnology Affects Privacy
“Technology has revolutionized the exchange of not only money, but all kinds of information. And the convenience and security that change provides often comes at the expense of personal privacy”
-Rosamaria Mancini of the Long Island Business News
Who’s Responsible?Who’s Responsible?
According to William Stallings, developers are.
“While some of the [bad] effects…may be the ‘unintended consequences’ of…good intentions, they are consequences none the less”
ConclusionConclusion
There is both a legal and ethical foundation for privacy protection.
Technology can significantly limit privacy.As Computer Science majors, we are
morally responsible for the consequences of the technology we develop.
Privacy Implications of Privacy Implications of Massive Database SystemsMassive Database Systems
By: Victor Murygin
BriefBrief HistoryHistory
First Generation: File systems, 50’s – 60’s Second Generation: Hierarchical Database, late 60’s –
early 70’s Third Generation: Network Database, late 60’s – early 70’s Fourth Generation: Relational Database Systems, early
70’s Fifth Generation: Object-Oriented and Object-Relational
Database Systems, 80’s – Present– Access control through a three-level database schema architecture
External External . . . . External Schema 1 Schema 2 Schema n
Conceptual Schema
Internal Schema
“Lecture Notes for CS 432”
Database Encryption TechnologyDatabase Encryption Technology
Ingrian Networks' DataSecure Platform– lets you encrypt certain fields before
you enter them in the database and automatically decrypts them on the way out
Database Encryption TechnologyDatabase Encryption Technology
All-or-nothing encryption– Big overhead cost– Application performance suffers, DB recovery takes
longer, troubleshooting bad queries is harder Encrypted data is presented as characters Ex. 4 byte integer becomes 8 or 16 byte character string Encrypted data will triple, quadruple in size
Some solutions:– Do not encrypt everything– Use encryption-acceleration tools to speed up the
performance
Ethical ImplicationsEthical Implications
Even with all this cost, encrypting data is essential if one wants to keep his records private
Most companies today go to extreme lengths to make sure their data is kept private.
Because of the history of corporate espionage, only few employees have access to the company’s databases.
Ethical ImplicationsEthical Implications
Problem: many IT professionals don’t know very much about privacy debate.
Database administrator’s responsibilities have increased
Besides ethical policies, there are specific laws dealing with data privacy
The The FutureFuture
Most companies feel that IT professionals and database administrators need to learn more about privacy issues.
Some colleges (Iowa State) push to integrate ethics into the curriculum
There are 50 bills pending in Congress concerning privacy.
Technological Strategies for Technological Strategies for Privacy ProtectionPrivacy Protection
By: Dominic Tsang
Privacy In Technology TodayPrivacy In Technology Today
Often a complex tradeoff between the need for security and privacy
How privacy is usually implemented today:– Encryption of data streams to and from
computers to stop people from snooping data en-route
– Privacy certificates and privacy statements
Why Current Standards Aren’t Why Current Standards Aren’t EnoughEnough
Encryption of data streams is fine – but most breaches occur in the databases that stores data
Who reads through the certificates and privacy statements to see if they are stringent enough?
Identity ManagementIdentity Management
Identity management is the first step we use to ensure privacy
At its base encompasses logins and passwords A paradigm shift about its actual ineffectiveness
has been slow in coming as these are often easily compromised
What can be done:– Supplement with other systems such as the SecurID
system which adds a second part to PINs through hardware such as smart cards
Case Study – p2pCase Study – p2p
In reaction to the RIAA’s lawsuits against p2p service users it has become a perfect breeding ground for privacy technology development
Privacy as a trade-off in app efficiencyTechnologies already in place:
– Decentralized servers– Encrypted searches
Proxies in p2pProxies in p2p
The use of proxies in p2p technology has emerged as the next step in for ensuring
Privacy is abridged by IP addresses that can potentially uniquely identify a computer– Analogy as a “digital middleman”
A process of “handing off” a file chunk to a web server which then sends off the data to the file requester
Proxies In p2p (cont.)Proxies In p2p (cont.)
Taken from: http://www.eagle-software.com/CR_Diagramming_Sequence.htm
Built In PrivacyBuilt In Privacy
Future applications and other technologies must be built with both privacy and security in mind
Examples:– Cell phones with user tracking technology– DRM
Digital Rights Management Digital Rights Management (DRM)(DRM)
A technology under development that demonstrates the trade between security and privacy
Stated purposes of DRM:– User specific access to data– Tracking of data usage
Privacy is NOT a concern built into the current framework resulting in possible tracking of any and all activities of users
DRM Diagram on a Mobile DRM Diagram on a Mobile PlatformPlatform
Taken from http://www.nds.com/mobile_solutions/mobile_system_diagram.html
Concluding Remarks…Concluding Remarks…
Privacy is often a concern that takes a backseat to usability and security
If we are to create better technology, this aspect can not be neglected least we find our advancements more harmful to mankind than helpful
By: Ivy Weinberg
Freedom of ExpressionFreedom of Expressionin Cyberspacein Cyberspace
First AmendmentFirst Amendment
“Congress shall make no law respecting an establishment of religion, or prohibiting the
free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble,
and to petition the government for a redress of grievances.”
Court CasesCourt Cases
Miller v. California (1973)– Established three part guidelines for determining if material is considered
obscene under the law Reno v. ACLU (1997)
– Found that the Communications Decency Act (1996), designed to protect
minors from harmful material on the Internet, was unconstitutional Yahoo Inc. v. La Ligue Contre Le Racisme et L’Antisemitisme (2001)
– Issued an order to dissuade any users from using Yahoo auction site because it displayed Nazi memorabilia.
Censorship RegulationsCensorship Regulations
Communications Decency Act (1996)Child Online Protection Act (1998) Children’s Internet Protection Act (2000)
Anti-Censorship OrganizationsAnti-Censorship Organizations
Peacefire.orgFamilies Against Internet CensorshipCitizens Internet Empowerment CoalitionAmerican Civil Liberties Union
Censorship ActivistsCensorship Activists
Senator Jim Exon, D-NebraskaDan Lungren, California Attorney General
ConclusionConclusion
Should information portray values of individual or society as a whole?
Diversity and size of the Internet will prevent a standard from ever being established
Government and enthusiasts will continue to argue ethics until a “norm” is created
By: Samantha Weitzman
International ImplicationsInternational Implications
Convention on Cyber CrimeConvention on Cyber Crime
International Cyber Crime Treaty (2001)
International SecurityInternational Security
United States and European UnionTransfer of Air Passenger Name Record (P
NR) (2003)
Digital Civil Rights GroupsDigital Civil Rights Groups
World Privacy ForumEuropean Digital RightsPrivacy International
Concluding ThoughtsConcluding Thoughts
International Cooperation vs. Protection of Civil Liberties
Compromise Privacy for Security & Law Enforcement?
The price of freedom is eternal vigilance. -- Thomas Jefferson
By: Him Seng Wong
Intercultural ImplicationsIntercultural Implications
Intercultural ImplicationsIntercultural Implications
Interaction of people of different culturesInternational CompaniesWebsites design
Intercultural ImplicationsIntercultural Implications
Interaction of people of different culturesInternational CompaniesWebsites design
What can be done?What can be done?
Do research and understand target’s market cultures
Websites – translation and localization
World Language Statistical Facts World Language Statistical Facts
Source: http://global-reach.biz/globstats/index.php3
World Language Statistical FactsWorld Language Statistical Facts "Web users are up to four times more likely to
purchase from a site that communicates in the customer's language" (www.idc.com)
"Site stickiness is doubled when a web site is translated - visitors stay for twice as long" (Forrester Research)
"Almost one-third of web sites are presented in a language other than English" (Messaging Online)
"By 2004, 50% of all-online sales are expected to occur outside the US" (Forrester Research)
Language and Cultural Language and Cultural differencesdifferences
In Taiwan, the translation of Pepsi slogan “Come alive with Pepsi” came out “Pepsi will bring your ancestors back from the dead.”
In Chinese, the Kentucky Fried Chicken slogan “Finger Lickin’ Good” translated as “Eat your fingers off.”
Source: http://lynn_meade.tripod.com/id52.htm
More examplesMore examples
When General Motors introduced the Chevy Nova in South America, it was unaware that “nova” means “it won't go.” After the company figured our why it wasn't selling many cars, it renamed the car “Caribe”.
Source: http://lynn_meade.tripod.com/id52.htm
Greeting ritualsGreeting rituals Americans – shake hands and sometimes with
back pat
Korean and Asian cultures – bow and divert eye contact depending on the status
Japanese typically exchange business card-one should grab the card with both hands, carefully examine it and put it carefully in a shirt pocket (Never in a pant pocket that would show disrespect.)
Source: http://lynn_meade.tripod.com/id52.htm
ConclusionConclusion
Companies having business relationship globally should consider culture as an important issue.
Cultures are not limited to verbal communication, non verbal communications such as gesture, facial expression, and other body languages are also very important.
ReferencesReferences
http://lynn_meade.tripod.com/id52.htm http://global-reach.biz http://www.idc.com/ http://www.forrester.com/ http://www.messagingonline.com/