Social issues in IT

Privacy and personal information

What is privacy?

Being free from instrusion or disturbance in one private life

Aspects of privacy

Control of information about oneself

Freedom from surveillance

Freedom from intrusion

Importance of privacy

Security

Safety

Privacy threat in several categories such as

Unauthorized use or release

Theft of information

Terminology and principles for data collection and use

Terminology

Privacy principles for personal information

Invible information gathering

Secondary Use

Computer Profiling

Data Mining

Computer matching

collect only the data needed

Provide stronger protection for sensitive data

Maintain accuracy of data

Protect security of data

Impact of computer technology

Example of government database with personal information

Marriage and divorce records

Tax records

Medical records

Communication

Faster Access to Information

Business Transactions

Shopping

Research tool

Education

Recreation

Meeting people

Privacy risk, protecting privacy, communication privacy

Privacy risk

Marketing, personalization and customer records

Targeted Marketing

Protective Privacy

Stolen and Lost Data

Location Tracking

Use computer tehnology to store, analyze

Financial information

Online activity

Customer Purchase

Why business do marketing?

Find new customer

Encourage old one to continue

Advertise product, service

Personalized marketing

What people like about personalization

What people don't like about personalization

Recommendation based on prior purchase

The private information might get leaked

Data firms and customer profile

maintain huge customer database collect data from huge number of source

GPS

RFID

Risk

Used in various identity document

For who did not supposed to get this information

Tracking people location or place

Storage of information of where a person location over time

Criminal Steals/uses the information

Spyware collects

Children : The Risk

Bullying

Illegal Behaviour

Inapproptiate material

Personal Information

chat or text message make them embarrassed,depressed or afraid

Awareness

For customer

For Business manager

Aware of the problems and potential solution

More careful about information we give out

Learn and implementation techniques to respond to privacy to privacy demands of customer

Design system with privacy protection in mind

Privacy-enhancing technology for consumer

Browser added option to alert user whenever website is about to store a cookie and alow user to reject it

Software to block pop-up advertisement

Registration and password

Encryption

The process of transforming information (referred to as plaintext using an algorithm) to make it unreadable to anyone except those those possessing special knowledge, usually referred to as a key

Business tools and policies for protecting personal data

A well designed database for sensitive information includes several features to protect against leaks, intruders, and unauthorized employee access

Right and law

To prevent deceptive software transmission practices in order to safeguard computer privacy, maintain computer control and protect internet commerce

Communication privacy

Communication

Communication assistance for law enforcement act, which require that technology used in commence systems be designed of modified to ensure ability of law enforcement agencies to intercept communication

Secret intelligence gathering

National security agency

Collects and analyzes foreign intelligence information related to US national security from others

Encryption Policy

The purpose is to provide guidance that limits the use of encryption to those algorithms

Risk of New Technology

Risk is an uncertain event or outcome (good or bad) that occurs in decision making

An organization will cope high risks when there are new technologies being deployed or employed in the organization

New Technology Risk

High cost of maintenance

Insufficiency of expertise

Unachieved goals

Difficult to be adapted

Computer System Errors and Failure

Error and failure

The state or condition of being wrong, or do not function as planned

Factors of computer system errors

Faulty design

Sloppy implementation

Insufficiency trained users

Poor user interface

Impact of computer system errors to human

Safety - Death

Economic - loss

Safety - critical computer systems

A safety critical system is a system where human safety is dependent upon the correct operation of the system

Type of safety - critical computer system

Military

Medical

Train

Reliability and safety

Reliability

The ability of a person or system to perform and maintain its functions in routine circumstances

Safety

The freedom from danger, injury and damage and to personal security

Factors that makes computer system fails

Job is difficult

Job done poorly

Overconfidence

Inappreciative risk

Ignore warning

Dependence, risk and progress

Most new technologies were not very safe when first developed

As time progress, technologies improve to reduce the risk

Risk is not restricted to technology and machines.It is part life

Redundancy and self-checking

redundancy check is a system of hecking for erroes in computer functioning

Self checking is a system that checks and monitors itself for errors

click to edit