SlideShare una empresa de Scribd logo
1 de 34
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy
What We Will Cover ,[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy and Computer Technology ,[object Object],[object Object],[object Object],[object Object]
Privacy and Computer Technology (cont.) ,[object Object],[object Object],[object Object],[object Object]
Privacy and Computer Technology (cont.) ,[object Object],[object Object],[object Object]
Privacy and Computer Technology (cont.) ,[object Object],[object Object],[object Object]
Privacy and Computer Technology (cont.) ,[object Object],[object Object]
Privacy and Computer Technology (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy and Computer Technology Discussion Questions ,[object Object],[object Object],[object Object]
"Big Brother is Watching You" ,[object Object],[object Object],[object Object],[object Object]
"Big Brother is Watching You" (cont.) ,[object Object],[object Object],[object Object],[object Object]
"Big Brother is Watching You" (cont.) ,[object Object],[object Object],[object Object],[object Object]
"Big Brother is Watching You" (cont.) ,[object Object],[object Object],[object Object],[object Object]
"Big Brother is Watching You" (cont.)   Discussion Questions ,[object Object],[object Object],[object Object]
Diverse Privacy Topics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Diverse Privacy Topics (cont.) ,[object Object],[object Object],[object Object],[object Object]
Diverse Privacy Topics (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Diverse Privacy Topics (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Diverse Privacy Topics (cont.) ,[object Object],[object Object],[object Object],[object Object]
Diverse Privacy Topics (cont.) ,[object Object],[object Object],[object Object],[object Object]
Diverse Privacy Topics (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Diverse Privacy Topics (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Diverse Privacy Topics Discussion Questions ,[object Object],[object Object]
Protecting Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object]
Protecting Privacy (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protecting Privacy (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protecting Privacy (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protecting Privacy (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Protecting Privacy Discussion Question ,[object Object],[object Object]
Communication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Communication (cont.) ,[object Object],[object Object],[object Object],[object Object]
Communication (cont.) ,[object Object],[object Object],[object Object],[object Object]
Communication (cont.) ,[object Object],[object Object],[object Object]
Communication Discussion Questions ,[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
Hajarul Cikyen
 
human computer interface
human computer interfacehuman computer interface
human computer interface
Santosh Kumar
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
UMaine
 

La actualidad más candente (20)

Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Chapter 1_dp-pertemuan 1
 Chapter 1_dp-pertemuan 1 Chapter 1_dp-pertemuan 1
Chapter 1_dp-pertemuan 1
 
Chapter 2_dp-pertemuan 2&3
 Chapter 2_dp-pertemuan 2&3 Chapter 2_dp-pertemuan 2&3
Chapter 2_dp-pertemuan 2&3
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Accountability And Auditing In Professional Practice
Accountability And Auditing In Professional PracticeAccountability And Auditing In Professional Practice
Accountability And Auditing In Professional Practice
 
IP address & Domain name
IP address & Domain nameIP address & Domain name
IP address & Domain name
 
Human Computer Interaction (HCI)
Human Computer Interaction (HCI)Human Computer Interaction (HCI)
Human Computer Interaction (HCI)
 
2. information system
2. information system2. information system
2. information system
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
human computer interface
human computer interfacehuman computer interface
human computer interface
 
Ethics and computing profession
Ethics and computing professionEthics and computing profession
Ethics and computing profession
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Introduction to the internet
Introduction to the internetIntroduction to the internet
Introduction to the internet
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 

Destacado

Cebu educational tour
Cebu educational tourCebu educational tour
Cebu educational tour
Pibi Lu
 
Ohow Corporate Presentation
Ohow Corporate PresentationOhow Corporate Presentation
Ohow Corporate Presentation
Ken Hawkins
 
My 3 favorite technologies
My 3 favorite technologiesMy 3 favorite technologies
My 3 favorite technologies
Kling1229
 
Juliana tema5 town
Juliana tema5 townJuliana tema5 town
Juliana tema5 town
Jacket25
 
Margar mota tema5_town
Margar mota tema5_townMargar mota tema5_town
Margar mota tema5_town
Jacket25
 
Technology juliana
Technology julianaTechnology juliana
Technology juliana
Jacket25
 
Margar mota tema5_town
Margar mota tema5_townMargar mota tema5_town
Margar mota tema5_town
Jacket25
 
Technology juliana
Technology julianaTechnology juliana
Technology juliana
Jacket25
 
Final Cebu Educational Tour Format
Final Cebu Educational Tour FormatFinal Cebu Educational Tour Format
Final Cebu Educational Tour Format
Pibi Lu
 

Destacado (20)

Digital privacy
Digital privacyDigital privacy
Digital privacy
 
Cebu educational tour
Cebu educational tourCebu educational tour
Cebu educational tour
 
Geo23.1102 winter2015 session2
Geo23.1102 winter2015 session2Geo23.1102 winter2015 session2
Geo23.1102 winter2015 session2
 
"Cms SQC peace pals" from the ICT Seagulls Project designed by Dr. Hayal KÖKSAL
"Cms  SQC peace pals" from the ICT Seagulls Project designed by Dr. Hayal KÖKSAL"Cms  SQC peace pals" from the ICT Seagulls Project designed by Dr. Hayal KÖKSAL
"Cms SQC peace pals" from the ICT Seagulls Project designed by Dr. Hayal KÖKSAL
 
Ohow Corporate Presentation
Ohow Corporate PresentationOhow Corporate Presentation
Ohow Corporate Presentation
 
My 3 favorite technologies
My 3 favorite technologiesMy 3 favorite technologies
My 3 favorite technologies
 
Juliana tema5 town
Juliana tema5 townJuliana tema5 town
Juliana tema5 town
 
Margar mota tema5_town
Margar mota tema5_townMargar mota tema5_town
Margar mota tema5_town
 
Child brides
Child bridesChild brides
Child brides
 
Vincent
VincentVincent
Vincent
 
Paula
PaulaPaula
Paula
 
Pedro
PedroPedro
Pedro
 
Technology juliana
Technology julianaTechnology juliana
Technology juliana
 
Bm eği̇ti̇mi̇ bölüm 1
Bm eği̇ti̇mi̇ bölüm 1Bm eği̇ti̇mi̇ bölüm 1
Bm eği̇ti̇mi̇ bölüm 1
 
Geo23.1103 winter2015 session4
Geo23.1103 winter2015 session4Geo23.1103 winter2015 session4
Geo23.1103 winter2015 session4
 
Geo23.1103 winter2015 session7
Geo23.1103 winter2015 session7Geo23.1103 winter2015 session7
Geo23.1103 winter2015 session7
 
Margar mota tema5_town
Margar mota tema5_townMargar mota tema5_town
Margar mota tema5_town
 
"CMS SQC Peace Pals" within the International ICT Seagulls Project by Dr. Hay...
"CMS SQC Peace Pals" within the International ICT Seagulls Project by Dr. Hay..."CMS SQC Peace Pals" within the International ICT Seagulls Project by Dr. Hay...
"CMS SQC Peace Pals" within the International ICT Seagulls Project by Dr. Hay...
 
Technology juliana
Technology julianaTechnology juliana
Technology juliana
 
Final Cebu Educational Tour Format
Final Cebu Educational Tour FormatFinal Cebu Educational Tour Format
Final Cebu Educational Tour Format
 

Similar a Chapter2

Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
adnis1
 
Business And The Law
Business And The LawBusiness And The Law
Business And The Law
RobbieA
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
7wounders
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
blogzilla
 
identifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docxidentifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docx
mckerliejonelle
 

Similar a Chapter2 (20)

COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 Privacy
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
Chapter 4_dp-pertemuan 6
 Chapter 4_dp-pertemuan 6 Chapter 4_dp-pertemuan 6
Chapter 4_dp-pertemuan 6
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
TAMUC LO 7
TAMUC LO 7TAMUC LO 7
TAMUC LO 7
 
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
 
identifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docxidentifies several types of devices on which digital evidence could be.docx
identifies several types of devices on which digital evidence could be.docx
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Último (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Chapter2

  • 1. A Gift of Fire Third edition Sara Baase Chapter 2: Privacy
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.

Notas del editor

  1. If the class doesn't mention it, make sure to mention that online opt-in choices may be pre-checked and require you un-checking the box to avoid opting in. Be sure to mention the "subject to change without notice" clause found in most privacy policies.
  2. Use the list in Fig. 2.2 (page 58) to start the conversation. Probe for what concerns the class may have about the data that is collected.
  3. Except for hackers, these are not new to computer technology. Before computers, files were stolen, receipts were stolen, information was requested under false pretenses and employees were bribed. But, with computers, the extent and impact have grown.
  4. The meaning of pen register has changed over time. It originally referred to a device that recorded the numbers called from a phone. Now it also refers to logs phone companies keep of all numbers called, including time and duration.