SlideShare una empresa de Scribd logo
1 de 47
Privacy and Education in the
Internet Age
Cliff Landis
Honors Freshman Seminar
Fall 2013
Cliff gets a phone call…
FERPA to the rescue!

http://www.ed.gov/policy/gen/guid/fpco/ferpa/index.html
You only have the rights that you know
you have and that you know how to
use and enforce.
Who is this
guy?
• Web Services
Librarian @ Georgia
State University
• Author, A Social
Networking Primer
for Librarians (2010)
• Researcher on the
intersection of
human culture and
technology
THE SLIDING SCALE:
PRIVACY VS CONVENIENCE
PRIVACY
What do we mean by privacy?

http://thosecrazyliberals.com/wp-content/uploads/2013/06/fourthamendment.jpg
Mr. Otis
regrets…
general
warrants

http://en.wikipedia.org/wiki/File:James_Otis.jpg
Supreme Court
Justice Louis
Brandeis

“the right
to be let
alone”
Harvard Law Review
Dec. 15, 1890, on
"The Right to Privacy."
http://en.wikipedia.org/wiki/File:Brandeisl.jpg
USA PATRIOT Act
• Uniting (and) Strengthening America (by) Providing
Appropriate Tools Required (to) Intercept (and) Obstruct
Terrorism Act of 2001.
• Includes:
–
–
–
–
–
–
–

Title I: Enhancing domestic security against terrorism
Title II: Surveillance procedures
Title III: Anti-money-laundering to prevent terrorism
Title IV: Border security
Title V: Removing obstacles to investigating terrorism
Title VI: Victims and families of victims of terrorism
Title VII: Increased information sharing for critical infrastructure
protection
– Title VIII: Terrorism criminal law
– Title IX: Improved Intelligence
– Title X: Miscellaneous
USA PATRIOT Act
• Criticisms Include:
– authorization of indefinite detentions of immigrants;
– the permission given law enforcement officers to search a home or
business without the owner’s or the occupant’s consent or
knowledge;
– the expanded use of National Security Letters, which allows the
Federal Bureau of Investigation (FBI) to search telephone, e-mail,
and financial records without a court order; and
– the expanded access of law enforcement agencies to business
records, including library and financial records
• On May 26, 2011, President Barack Obama signed the PATRIOT Sunsets
Extension Act of 2011, a four-year extension of three key provisions in the
USA PATRIOT Act: roving wiretaps, searches of business records (the
"library records provision"), and conducting surveillance of "lone
wolves"—individuals suspected of terrorist-related activities not linked to
terrorist groups
BIG DATA
The Stacks
• “In 2012 it made less and less sense to talk
about “the Internet,” “the PC business,”
“telephones,” “Silicon Valley,” or “the media,”
and much more sense to just study Google,
Apple, Facebook, Amazon and Microsoft.
These big five American vertically organized
silos are re-making the world in their image.”
-- Bruce Sterling
http://images.smh.com.au/2010/05/14/1450513/zuckerberg420-420x0.jpg
http://i.huffpost.com/gen/161782/FACEBOOK-PRIVACY.jpg
http://allfacebook.com/infographic-the-history-of-facebooks-privacy-changes_b116292
http://allfacebook.com/infographic-the-history-of-facebooks-privacy-changes_b116292
Another story…

http://casketglass.com/
http://i.i.cbsi.com/cnwk.1d/i/tim/2012/07/19/Harris_III_privacy_charts__final_7.17.12_Slide_1_Grocery,_Amazon,_more_trusted_than_FB_610x452.jpg
How many of you own an e-book that
you purchased from Amazon.com?
BIG EDUCATION
Learning Analytics

http://public.tableausoftware.com/static/images/Te/TestScoresOverTime/School-LevelEvaluation/1_rss.png
Who enforces
privacy?
WASHINGTON - February 1,
2010 -- The U.S. Education
Department has fired the top
federal official charged with
protecting student privacy, in
what the dismissed official
says was a conflict with the
agency's political leaders over
their zeal to encourage the
collection of data about
students' academic
performance.
http://www.insidehighered.com/news/2010/02/01/ferpa
Risky cloud computing
• Unsuitable Privacy Policies: "Cloud providers may deliberately
or inadvertently force schools to accept policies or terms of
service that authorize user profiling and online behavioral
advertising."
• Poor Consent Policies: "Some cloud privacy policies...stipulate
that individual data subjects (students) are also bound by
these policies, even when these subjects have not had the
opportunity to grant or withhold their consent."
• Commercial Data Mining: "It may be difficult for the cloud
provider to turn off [ad-supported user profiling features and
tracking algorithms] even when ads are not being served."
• Shady Contracts: "Some cloud providers leave the door open
to future imposition of online advertising as a condition for
allowing schools to continue receiving cloud services for free."
http://blogs.edweek.org/edweek/DigitalEducation/2013/09/cloud_computing_jeopardizes_st.html
All it takes is one person

http://static.guim.co.uk/sys-images/Guardian/Pix/pictures/2013/6/23/1372015020195/Edward-Snowden-008.jpg
SURVEILLANCE
Surveillance
monitoring of the
behavior, activities, or
other changing
information, usually of
people for the
purpose of
influencing, managing,
directing, or
protecting them
Lyon, David. 2007. Surveillance Studies:
An Overview. Cambridge: Polity Press.

http://crapaganda.com/wp-content/uploads/2012/11/surveillance_big.gif
http://www.youtube.com/watch?v=QGxNyaXfJsA
Robbins v. Lower Merion School
District

http://media.nbcphiladelphia.com/images/722*542/Webcamgate-photo.jpg
Sousveillance

http://en.wikipedia.org/wiki/File:SurveillanceSousveillanceLifeGloggingMannSensecamMemoto.jpg
THE INTERNET
Privacy concerns are growing
• The study reported that privacy concerns among Americans
are on the rise, with 50 per cent of internet users saying they
are worried about the information available about them
online, up from 33 per cent in 2009.
• Meanwhile, 86 per cent of people surveyed have tried at least
one technique to hide their activity online or avoid being
tracked, such as clearing cookies or their browser history or
using encryption.
• While trying to avoid snooping - at least in some
circumstances - is now commonplace, people cite varying
reasons for doing so. About one-third said they had tried to
conceal their activity from hackers or criminals, while 28 per
cent have tried to block advertisers. Others said they wanted
to keep information private from family members or spouses,
employers or the government.
http://www.theaustralian.com.au/higher-education/us-study-exposes-internet-privacy-fears/story-e6frgcjx-1226712002951
http://xkcd.com/1269/
Anonymity Online

https://drupal.org/files/project-images/proxy.png
http://upload.wikimedia.org/wikipedia/commons/thumb/1/15/Tor-logo-2011-flat.svg/306px-Tor-logo-2011-flat.svg.png
http://peterblogs.de/wp-content/uploads/2013/05/VPN-Lock.png
THE SLIDING SCALE:
PRIVACY VS CONVENIENCE
http://1.bp.blogspot.com/-Z9ZRKB-gihM/TXv0-_EsIGI/AAAAAAAAAPI/yRfPpubDBWE/s1600/convenience_vs_privacy_tension.jpg
CONTROLLING YOUR PRIVACY
Chose what you show the world
http://www.flickr.com/photos/95572727@N00/216941152
Multiple accounts
http://www.iatsmartdial.com/wp-content/uploads/2012/10/Clones.jpg
Know your audience

http://www.flickr.com/photos/71214885@N00/2093047797
If you tell it to one other person, it is
no longer private
http://www.flickr.com/photos/20722444@N00/224674200
Manage your privacy settings

http://www.flickr.com/photos/47691521@N07/4638981545
Watch out for changes to the TOS
http://www.tosback.org/timeline.php
http://tosdr.org/
Stalk yourself
For the truly paranoid…

http://www.magnet.fsu.edu/education/tutorials/tools/images/faradaycage.gif

Más contenido relacionado

La actualidad más candente

What's New and Exciting in Scholarly Publishing
What's New and Exciting in Scholarly PublishingWhat's New and Exciting in Scholarly Publishing
What's New and Exciting in Scholarly Publishing
TeeTee
 
Safe Internet Use
Safe Internet UseSafe Internet Use
Safe Internet Use
schalman
 
10 most successful college entrepreneurs
10 most successful college entrepreneurs10 most successful college entrepreneurs
10 most successful college entrepreneurs
Qwaliti.com
 
Text generation
Text generationText generation
Text generation
nmason1
 

La actualidad más candente (20)

Preparing our students for Web 3.0 learning
Preparing our students for Web 3.0 learningPreparing our students for Web 3.0 learning
Preparing our students for Web 3.0 learning
 
What's New and Exciting in Scholarly Publishing
What's New and Exciting in Scholarly PublishingWhat's New and Exciting in Scholarly Publishing
What's New and Exciting in Scholarly Publishing
 
Beyond Alt-Metrics: Identities & Influence Online
Beyond Alt-Metrics: Identities & Influence OnlineBeyond Alt-Metrics: Identities & Influence Online
Beyond Alt-Metrics: Identities & Influence Online
 
Digital Citizenship Conversations
Digital Citizenship ConversationsDigital Citizenship Conversations
Digital Citizenship Conversations
 
SOPA
SOPASOPA
SOPA
 
Public engagement. Public empowerment.
Public engagement. Public empowerment.Public engagement. Public empowerment.
Public engagement. Public empowerment.
 
Safe Internet Use
Safe Internet UseSafe Internet Use
Safe Internet Use
 
Rahm 2.0
Rahm 2.0Rahm 2.0
Rahm 2.0
 
Networking education: Identities & Presence
Networking education: Identities & PresenceNetworking education: Identities & Presence
Networking education: Identities & Presence
 
Impact of the Web on Youth and Future Legislation
Impact of the Web on Youth and Future LegislationImpact of the Web on Youth and Future Legislation
Impact of the Web on Youth and Future Legislation
 
Going to the Need - Virtual & Mobile Library Services
Going to the Need - Virtual & Mobile Library ServicesGoing to the Need - Virtual & Mobile Library Services
Going to the Need - Virtual & Mobile Library Services
 
10 most successful college entrepreneurs
10 most successful college entrepreneurs10 most successful college entrepreneurs
10 most successful college entrepreneurs
 
Civic Technology on the Front Lines
Civic Technology on the Front LinesCivic Technology on the Front Lines
Civic Technology on the Front Lines
 
Web2.0 Primer
Web2.0 PrimerWeb2.0 Primer
Web2.0 Primer
 
Web 3.0 and english language teaching by dr meenu pandey
Web 3.0 and english language teaching by dr meenu pandeyWeb 3.0 and english language teaching by dr meenu pandey
Web 3.0 and english language teaching by dr meenu pandey
 
Peerto Peer File Sharing
Peerto Peer File SharingPeerto Peer File Sharing
Peerto Peer File Sharing
 
Microsoft Power Point Lib1 #1262264 V1 Social Networking
Microsoft Power Point   Lib1 #1262264 V1 Social NetworkingMicrosoft Power Point   Lib1 #1262264 V1 Social Networking
Microsoft Power Point Lib1 #1262264 V1 Social Networking
 
Young Adults And On Line Privacy
Young Adults And On Line PrivacyYoung Adults And On Line Privacy
Young Adults And On Line Privacy
 
Text generation
Text generationText generation
Text generation
 
Internet life skills wb
Internet life skills wbInternet life skills wb
Internet life skills wb
 

Destacado

Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
padler01
 
Information Security
Information SecurityInformation Security
Information Security
Mohit8780
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
Trevschic
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
vineetkathan
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
m8817
 

Destacado (12)

Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
Information Security
Information SecurityInformation Security
Information Security
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
 
07 E-commerce Advertising
07 E-commerce Advertising07 E-commerce Advertising
07 E-commerce Advertising
 
Copyright & related rights (1 of 2)
Copyright & related rights (1 of 2)Copyright & related rights (1 of 2)
Copyright & related rights (1 of 2)
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
E-Business & E-Commerce Basics
E-Business & E-Commerce BasicsE-Business & E-Commerce Basics
E-Business & E-Commerce Basics
 
Skimming & Scanning
Skimming & ScanningSkimming & Scanning
Skimming & Scanning
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 

Similar a Privacy and education in the internet age

Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillance
NANDI AYANA
 
Social media background
Social media backgroundSocial media background
Social media background
Mo Krochmal
 

Similar a Privacy and education in the internet age (20)

The digital divide in the post-Snowden era
The digital divide in the post-Snowden eraThe digital divide in the post-Snowden era
The digital divide in the post-Snowden era
 
The Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era PresentationThe Digital Divide in the Post Snowden Era Presentation
The Digital Divide in the Post Snowden Era Presentation
 
Privacy flip book assignment film 260 queensu kc
Privacy flip book assignment  film 260  queensu kcPrivacy flip book assignment  film 260  queensu kc
Privacy flip book assignment film 260 queensu kc
 
Social media and Missing workshop
Social media and Missing workshopSocial media and Missing workshop
Social media and Missing workshop
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: Privacy
 
Safe use of cloud - alternative cloud
Safe use of cloud - alternative cloudSafe use of cloud - alternative cloud
Safe use of cloud - alternative cloud
 
Cyber security issues part a
Cyber security issues  part a Cyber security issues  part a
Cyber security issues part a
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillance
 
The case for privacy (2012)
The case for privacy (2012)The case for privacy (2012)
The case for privacy (2012)
 
A Social Web, A Social World
A Social Web, A Social WorldA Social Web, A Social World
A Social Web, A Social World
 
US Office of Personnel Management: Notes on "Big Data"
US Office of Personnel Management: Notes on  "Big Data" US Office of Personnel Management: Notes on  "Big Data"
US Office of Personnel Management: Notes on "Big Data"
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
Online Policy Primer
Online Policy PrimerOnline Policy Primer
Online Policy Primer
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
 
Public policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie questionPublic policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie question
 
Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
Social media background
Social media backgroundSocial media background
Social media background
 

Más de Cliff Landis

Lets Play: Libraries, Games & the Future
Lets Play: Libraries, Games & the FutureLets Play: Libraries, Games & the Future
Lets Play: Libraries, Games & the Future
Cliff Landis
 

Más de Cliff Landis (20)

Selecting a Digital Collections Management System: Getting Large Projects Don...
Selecting a Digital Collections Management System: Getting Large Projects Don...Selecting a Digital Collections Management System: Getting Large Projects Don...
Selecting a Digital Collections Management System: Getting Large Projects Don...
 
Linked Open Data for Archives
Linked Open Data for ArchivesLinked Open Data for Archives
Linked Open Data for Archives
 
Get a (Library-ish) Job!
Get a (Library-ish) Job!Get a (Library-ish) Job!
Get a (Library-ish) Job!
 
An Introduction to Linked Data for Librarians (2018-06-28)
An Introduction to Linked Data for Librarians (2018-06-28)An Introduction to Linked Data for Librarians (2018-06-28)
An Introduction to Linked Data for Librarians (2018-06-28)
 
Digitization at the AUC Robert W. Woodruff Library - A Case Study
Digitization at the AUC Robert W. Woodruff Library - A Case StudyDigitization at the AUC Robert W. Woodruff Library - A Case Study
Digitization at the AUC Robert W. Woodruff Library - A Case Study
 
Conflict!
Conflict!Conflict!
Conflict!
 
Archival Technologies 2014
Archival Technologies 2014Archival Technologies 2014
Archival Technologies 2014
 
Archival Technologies
Archival TechnologiesArchival Technologies
Archival Technologies
 
Get the Word Out: Using Facebook and Twitter for Outreach and Community Building
Get the Word Out: Using Facebook and Twitter for Outreach and Community BuildingGet the Word Out: Using Facebook and Twitter for Outreach and Community Building
Get the Word Out: Using Facebook and Twitter for Outreach and Community Building
 
Social Networking for Communities & Businesses
Social Networking for Communities & BusinessesSocial Networking for Communities & Businesses
Social Networking for Communities & Businesses
 
Beyond 2.0: Evolving to the Next Level of Amazing Library Service
Beyond 2.0: Evolving to the Next Level of Amazing Library ServiceBeyond 2.0: Evolving to the Next Level of Amazing Library Service
Beyond 2.0: Evolving to the Next Level of Amazing Library Service
 
Tomorrow’s Technology, Tomorrow's User, Tomorrow's Library
Tomorrow’s Technology, Tomorrow's User,  Tomorrow's LibraryTomorrow’s Technology, Tomorrow's User,  Tomorrow's Library
Tomorrow’s Technology, Tomorrow's User, Tomorrow's Library
 
Starting a Text Reference Service
Starting a Text Reference ServiceStarting a Text Reference Service
Starting a Text Reference Service
 
Say What You Mean: Professional Communication Skills for Librarians
Say What You Mean: Professional Communication Skills for LibrariansSay What You Mean: Professional Communication Skills for Librarians
Say What You Mean: Professional Communication Skills for Librarians
 
Library 2.0 and Beyond
Library 2.0 and BeyondLibrary 2.0 and Beyond
Library 2.0 and Beyond
 
Online Job Resources for Valdosta
Online Job Resources for ValdostaOnline Job Resources for Valdosta
Online Job Resources for Valdosta
 
Tech
TechTech
Tech
 
Learn
LearnLearn
Learn
 
Lets Play: Libraries, Games & the Future
Lets Play: Libraries, Games & the FutureLets Play: Libraries, Games & the Future
Lets Play: Libraries, Games & the Future
 
Solving The Interest Problem
Solving The Interest ProblemSolving The Interest Problem
Solving The Interest Problem
 

Último

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

Privacy and education in the internet age

Notas del editor

  1. I had a parent call and complain moments after I gave a student an F for plagiarizing the conclusion on her paper.
  2. Educational institutions can’t give away a student’s educational information without appropriate authorization.
  3. A recurring theme throughout today’s talk
  4. until 1750, in fact, the only type of warrant defined in the handbooks for justices of the peace was the general warrant.[3] During what scholar William Cuddihy called the "colonial epidemic of general searches", the authorities possessed almost unlimited power to search for anything at any time, with very little oversight.[5]In mid-January 1761, a group of over 50 merchants represented by James Otis petitioned the court to have hearings on the issue. During the five-hour hearing on February 23, 1761, Otis vehemently denounced British colonial policies, including their sanction of general warrants and writs of assistance.[8] Future US President John Adams, who was present in the courtroom when Otis spoke, viewed these events as "the spark in which originated the American Revolution.”[9] However, the court ruled against Otis.[10]Seeing the danger general warrants presented, the Virginia Declaration of Rights (1776) explicitly forbade the use of general warrants. This prohibition became a precedent for the Fourth Amendment:[12]That general warrants, whereby any officer or messenger may be commanded to search suspected places without evidence of a fact committed, or to seize any person or persons not named, or whose offense is not particularly described and supported by evidence, are grievous and oppressive and ought not to be granted.[13]Because the Bill of Rights did not initially apply to the states, and federal criminal investigations were less common in the first century of the nation's history, there is little significant case law for the Fourth Amendment before the 20th century. The amendment was held to apply to the states in Mapp v. Ohio (1961).
  5. Brandeis defined modern notions of the individual right to privacy in a path-breaking article he published with his partner, Warren, in the Harvard Law Review of Dec. 15, 1890, on "The Right to Privacy." Stimulated by anger at offensive publicity concerning the social activities of Warren's family, it adumbrated a new legal concept that has had lasting influence. Building on diverse analogies in the law of defamation, of literary property, and of eavesdropping, Brandeis argued that the central, if unarticulated, interest protected in these fields was an interest in personal integrity, "the right to be let alone," that ought to be secured against invasion except for some compelling reason of public welfare. Brandeis saw emotions as a positive expression of human nature, and so desired privacy protection for them as protection against repression of the human spirit.[11]
  6. They want your identity, your allegiance, and all of your data.
  7. E. C. Steiner, (formerly King Unicorn), who was locked out of all his accounts by one of the Stacks.
  8. None of you. Because you don’t own the books that you purchase from Amazon.com, you lease them. They can be revoked at any point in time.Amazon has performed price-fixing on its products, selling products for higher prices to people who it recognizes will pay a higher price, based on their purchasing habitshttp://www.cnn.com/2005/LAW/06/24/ramasastry.website.prices/
  9. The ARGUS array is made up of several cameras and other types of imaging systems. The output of the imaging system is used to create extremely large, 1.8GP high-resolution mosaic images and video.
  10. The lawsuit was filed after 15-year-old high school sophomore Blake Robbins was disciplined at school, for his behavior in his home.[5][13] The school's "evidence" that triggered his discipline was a photograph that the school had secretly taken of him in his bedroom, via the webcam in his school-issued laptop. Without telling its students, the schools remotely accessed their school-issued laptops to secretly snap pictures of students in their own homes, their chat logs, and records of the websites they visited. The school then transmitted the snapshots to servers at the school, where school authorities reviewed them and shared the snapshots with others.[14] In one widely published photo, the school had photographed Robbins in his bed.[15] The Federal Bureau of Investigation (FBI), U.S. Attorney's Office, and Montgomery County District Attorney all initiated criminal investigations of the matter, which they combined and then closed because they did not find evidence "that would establish beyond a reasonable doubt that anyone involved had criminal intent". In addition, a U.S. Senate Judiciary subcommittee held hearings on the issues raised by the schools' secret surveillance, and Senator Arlen Specter introduced draft legislation in the Senate to protect against it in the future. Parents, media, and academics criticized the schools, and the matter was cited as a cautionary example of how modern technology can be used to infringe on personal privacy.[16]
  11. Multiple accounts can be used for different purposes to help organize your life.It can also be used to add noise to the system.