Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 3 : SOCIAL ISSUES IN IT - Coggle Diagram
Chapter 3 : SOCIAL ISSUES IN IT
Privacy and Personal Information
Key aspect of Privacy :star:
Freedom from intrusion (Being left alone)
Control of information about oneself
Freedom from surveillance (from being followed, tracked, watched)
Privacy threats come in several category :check:
Intentional, institutional uses of personal information
Unauthorized use or release by "insider"
Theft of information
Unintentional leakage of information
Our own actions
Managing Personal Data :pencil2:
Personal Information
- Any information relating to an individual person
Information
- Users being aware of what information is collected and how it is used
Invisible Information Gathering
- Collection of personal information about a user without the user's knowledge
Cookies
- Files a website stores on a visitor's computer.
Secondary Use
- Use of personal information for a purpose other than the purpose for which it was provided
Data Mining
- Searching and analyzing masses of data to find patterns and develop new information of knowledge
Computer Matching
- Combining and comparing information from diff db
Computer Profiling
- Analyzing data to determine characteristic of people most likely to engage in a certain behaviour
Out put
- Person must request that an organization not use information
Out in
- the collector of the information may use information only if person explicitly permits use
Tips on safeguarding our personal information :star:
Read the posted privacy policies of the web sites you visit.
If you can’t find the web site’s privacy policy, contact the administrator and ask for a copy of their privacy policy.
Before responding to online sweepstakes, online games or surveys, read both the privacy policy and any additional information to find out who will be using your personal information.
Check whether any website that collects your personal information allows you to opt out in the future.
Impact of Computer Technology
Marketing & Personalization
Transaction online
Advertisment
Social & Personal Activity
Networking
Time management
Social skills
Tools for Parents
Education
Navigation
Child's activities
Privacy Risks, Protecting Privacy & Communication Privacy
Privacy Risk - the enormous increases in the collection, storage, use and disclosure of personal data, and the imposition of many intrusive tech, have cause increased concern about individual privacy
Fall into 2 category :warning:
Risk to the individual as a result of contravention of their rights in relation to privacy, or loss, damage, misuse or abuse of their personal information
Risk to the organization as a result of:
perceived harm to privacy;
a failure to meet public expectations on the protection of personal information;
low adoption rates or poor participation in the scheme from both the public and partner organizations;
the costs of redesigning the system or retro-fitting solutions;
collapse of a project or completed system;
withdrawal of support from key supporting organizations due to perceived privacy harms; and/ or
enforcement action from the regulator; or
compensation claims from individuals.
Privacy Protection - An effective privacy protection regime requires all of the following to be in place:
clear specifications of privacy protections;
clear prohibitions against breaches of protections;
clear sanctions or penalties for breaches of protections;
mechanisms in place to detect and report breaches; and
resources for investigating breaches and applying sanctions.
Protecting Privacy : Education - Must include awareness of:
How the technology works.
How the technology is being used.
The risks brought on by the technology.
How to limit unwanted use of personal information.
Applicable state and federal laws and regulations.
Protecting Privacy : Technology - Enhance privacy using:
Cookie disablers.
Opt-in/opt-out options.
Anonymous Web services.
P3P (Platform for Privacy Preferences).
‘Good’ passwords.
Audit trails.
Protecting Privacy : Market Response - Markets can protect your privacy by:
Using trusted third parties.
Adhering to established privacy policies.
Purchasing consumer information directly from the consumer.
Developing and selling privacy-enhancing technologies and services.
Communication Privacy
It refers on media tech that will be used in personal to share or communicated some information with another
Example : Telephone communication. 2 persons communicated the line and heard the conversation, it become invasions privacy
Risk of New Technology
Video Surveillance & Face Recognition
Search Query Data
Smartphone & Laptops
Computer Errors & Failure
Computer-Related Mistakes
Computer-related mistakes: Errors, failures, and other computer problems that make computer output incorrect or not useful
Causes
Failure by users to follow proper procedures
Unclear expectations and a lack of feedback
Program development that contains errors
Incorrect data entry by data-entry clerk
Effects of Computer Errors
Inconvenience
Financial loses
Fatalities
Errors in Computer System
Data-related errors
Erroneous information in databases
Misinterpretation of database information
Software errors
System failures
Causes of Failures
Technical
Use of very new technology, with unknown reliability and problems
Reuse of software, without adapting to new conditions
Lack of clear, well thought out goals and specifications
Lack of thorough testing
ManageriaL
Poor management and poor communication among customers, designers, programmers
Pressures that encourage unrealistically low bids and underestimates of time requirements
Refusal to recognize or admit project problems