Social issues in IT
Privacy and personal information
What is privacy?
Being free from instrusion or disturbance in one private life
Aspects of privacy
Control of information about oneself
Freedom from surveillance
Freedom from intrusion
Importance of privacy
Security
Safety
Privacy threat in several categories such as
Unauthorized use or release
Theft of information
Terminology and principles for data collection and use
Terminology
Privacy principles for personal information
Invible information gathering
Secondary Use
Computer Profiling
Data Mining
Computer matching
collect only the data needed
Provide stronger protection for sensitive data
Maintain accuracy of data
Protect security of data
Impact of computer technology
Example of government database with personal information
Marriage and divorce records
Tax records
Medical records
Communication
Faster Access to Information
Business Transactions
Shopping
Research tool
Education
Recreation
Meeting people
Privacy risk, protecting privacy, communication privacy
Privacy risk
Marketing, personalization and customer records
Targeted Marketing
Protective Privacy
Stolen and Lost Data
Location Tracking
Use computer tehnology to store, analyze
Financial information
Online activity
Customer Purchase
Why business do marketing?
Find new customer
Encourage old one to continue
Advertise product, service
Personalized marketing
What people like about personalization
What people don't like about personalization
Recommendation based on prior purchase
The private information might get leaked
Data firms and customer profile
maintain huge customer database collect data from huge number of source
GPS
RFID
Risk
Used in various identity document
For who did not supposed to get this information
Tracking people location or place
Storage of information of where a person location over time
Criminal Steals/uses the information
Spyware collects
Children : The Risk
Bullying
Illegal Behaviour
Inapproptiate material
Personal Information
chat or text message make them embarrassed,depressed or afraid
Awareness
For customer
For Business manager
Aware of the problems and potential solution
More careful about information we give out
Learn and implementation techniques to respond to privacy to privacy demands of customer
Design system with privacy protection in mind
Privacy-enhancing technology for consumer
Browser added option to alert user whenever website is about to store a cookie and alow user to reject it
Software to block pop-up advertisement
Registration and password
Encryption
The process of transforming information (referred to as plaintext using an algorithm) to make it unreadable to anyone except those those possessing special knowledge, usually referred to as a key
Business tools and policies for protecting personal data
A well designed database for sensitive information includes several features to protect against leaks, intruders, and unauthorized employee access
Right and law
To prevent deceptive software transmission practices in order to safeguard computer privacy, maintain computer control and protect internet commerce
Communication privacy
Communication
Communication assistance for law enforcement act, which require that technology used in commence systems be designed of modified to ensure ability of law enforcement agencies to intercept communication
Secret intelligence gathering
National security agency
Collects and analyzes foreign intelligence information related to US national security from others
Encryption Policy
The purpose is to provide guidance that limits the use of encryption to those algorithms
Risk of New Technology
Risk is an uncertain event or outcome (good or bad) that occurs in decision making
An organization will cope high risks when there are new technologies being deployed or employed in the organization
New Technology Risk
High cost of maintenance
Insufficiency of expertise
Unachieved goals
Difficult to be adapted
Computer System Errors and Failure
Error and failure
The state or condition of being wrong, or do not function as planned
Factors of computer system errors
Faulty design
Sloppy implementation
Insufficiency trained users
Poor user interface
Impact of computer system errors to human
Safety - Death
Economic - loss
Safety - critical computer systems
A safety critical system is a system where human safety is dependent upon the correct operation of the system
Type of safety - critical computer system
Military
Medical
Train
Reliability and safety
Reliability
The ability of a person or system to perform and maintain its functions in routine circumstances
Safety
The freedom from danger, injury and damage and to personal security
Factors that makes computer system fails
Job is difficult
Job done poorly
Overconfidence
Inappreciative risk
Ignore warning
Dependence, risk and progress
Most new technologies were not very safe when first developed
As time progress, technologies improve to reduce the risk
Risk is not restricted to technology and machines.It is part life
Redundancy and self-checking
redundancy check is a system of hecking for erroes in computer functioning
Self checking is a system that checks and monitors itself for errors
click to edit