Watch and listen to the video clip and describe the issue raised by this pizza order.
Read Gift of Fire Chapter 2
Main Risks ·Unauthorized use by insiders, the people who maintain the info ·Inadvertent leakage of info through negligence or carelessness and access my intruders ·Propagation of errors and the harm caused by them ·Intentional uses (marketing, decision making and surveillance) that some people find objectionable 3 key aspects of Privacy ·Freedom from intrusion, being left alone ·Control of information about oneself ·Freedom from surveillance (being watched) Discuss the risks and key aspects of privacy Real Life Examples
In the news there have been numerous examples where privacy rights have been invaded.
In 2005, there were concerns about cookies, ‘Google Desktop’; The Sony BMG system XCP which protected the copying of their cds.
In 2006 they were looking at the iTunes store as being a problem.
Visit the BBC News Technology pages and search for the following article:
Snooping fears plague new iTunes.
If you wish – look up these issues.
Identity Theft
In 2007, experts identify that the biggest threat to Internet users identify is themselves.More and more personal data is given by users to register for sites.
Read Feature: Identity Theft PC Pro June 2007 p 140 – 142
..and answer the following questions: a How would someone gather personal information about you on the Internet?
b. Describe some of the personal details that we easily give away?
c. Describe some of the uses for this information and by whom
d. Describe the sorts of sites that we give our information to
e. How can you have privacy on a social networking site f.What should you look for in a site before giving personal information
Privacy and the Internet & Social Networking Sites
The Information Commissioners Office, revealed in a press release 23 Nov 07 that 4.5 million young Brits’ futures could be compromised by their electronic footprint.The survey reveals that content from SNS could damage prospects of young people and leave them open to identity fraud.
a.Outline the top tips to stay safe online b.Outline the purpose of the Data Protection Act Inside Story: watch DVD and answer worksheet on Power and Privacy
How did M&S satisfy the potential privacy concerns?
Describe how RFID tags work.
Describe the privacy concerns.
And a more recent article: Everywhere at Once, PC Magazine p5, Malaysia, March 2007 and a more indepth read on RFID tags read How Stuff Works How RFID Works? http://www.howstuffworks.com/rfid.htm/printable
4.Describe the issues raised in this article about using RFID tags in passports.
More than 4 million surveillance cameras monitor our every move, making Britain the most watched nation in the world.Even in Brunei, more CCTV cameras are being installed, Giant Supermarket in Rimba has them by the checkouts and HSBC bank has them fitted in the ceilings.No signs indicate that CCTV cameras are in operation.Is this an invasion of our privacy?Are we being filmed without our permission?What happens to the video footage?Who has access to it?What is it being used for.
5.In class discuss the increased use of CCTV in Brunei.
Privacy and Storage of data
2008 BBC News, Anger over pupils database Plan, 13/02/08 The British Govt are planning on setting up a database of pupils exam results and personal information. The aim is to give employers access to this information so that school leavers cannot fake their qualifications. 6.Describe why critics are up in arms about this plan?
Also in 2008, British Government announced that they are going to set up a giant database to store all the information about our calls, texts, emails and website hits. 7.Read the article Daily Mail, 16th July 2008 – Big Brothers Gone too far. c.Outline the purpose of this database d.Identify the data recorded. e.Outline the concerns raised by critics.
Read the article: ITPro Data thefts and loss is in the UK – Timeline to support the view that we cannot trust the government to keep data secure
Google’s Tracking Service Raises Privacy Concerns,
February 2009.A new google service Google Latitude allows users to share their physical locations among a network of friends from their smart phones.Concerns include whether or not Google will have to give Govts this information if asked; lack of safeguards from someone secretly opting into the tracking system on someone elses device.
Phorm – is it a privacy risk?
Phorm’s online ad-tracking service called Webwise.This is when adverts that appear on the webpage you are viewing, takes into account what you are reading, what you read before and uses this to make assumptions about what you might want to buy and plugs adverts of these products.
Privacy
Introduction
A futuristic example
Final Cut - Watch the video sections and identify from this futuristic what the issues are about ‘The Final Cut’.
Exagerated example
Play the video clip at the following: www.aclu.org/pizza/index.html
Watch and listen to the video clip and describe the issue raised by this pizza order.
Read Gift of Fire Chapter 2Main Risks
· Unauthorized use by insiders, the people who maintain the info
· Inadvertent leakage of info through negligence or carelessness and access my intruders
· Propagation of errors and the harm caused by them
· Intentional uses (marketing, decision making and surveillance) that some people find objectionable
3 key aspects of Privacy
· Freedom from intrusion, being left alone
· Control of information about oneself
· Freedom from surveillance (being watched)
Discuss the risks and key aspects of privacy
Real Life Examples
In the news there have been numerous examples where privacy rights have been invaded.
In 2005, there were concerns about cookies, ‘Google Desktop’; The Sony BMG system XCP which protected the copying of their cds.
In 2006 they were looking at the iTunes store as being a problem.
Visit the BBC News Technology pages and search for the following article:
Snooping fears plague new iTunes.
If you wish – look up these issues.
Identity Theft
In 2007, experts identify that the biggest threat to Internet users identify is themselves. More and more personal data is given by users to register for sites.
- Read Feature: Identity Theft PC Pro June 2007 p 140 – 142
..and answer the following questions:a How would someone gather personal information about you on the Internet?
b. Describe some of the personal details that we easily give away?
c. Describe some of the uses for this information and by whom
d. Describe the sorts of sites that we give our information to
e. How can you have privacy on a social networking site
f. What should you look for in a site before giving personal information
Privacy and the Internet & Social Networking Sites
The Information Commissioners Office, revealed in a press release 23 Nov 07 that 4.5 million young Brits’ futures could be compromised by their electronic footprint. The survey reveals that content from SNS could damage prospects of young people and leave them open to identity fraud.
2. Visit the site http://www.ico.gov.uk/youth.aspx and read about how to stay safe while on a SNS.
a. Outline the top tips to stay safe online
b. Outline the purpose of the Data Protection Act
Inside Story: watch DVD and answer worksheet on Power and Privacy
Privacy & RFID Tags
Are you being watched? RFID tags and an invasion of privacy.
3. Read the article ‘Are you being watched? PC Pro 2004 and answer the following questions.
http://www.pcpro.co.uk/features/58487/are-you-being-watched/page5.html
And a more recent article: Everywhere at Once, PC Magazine p5, Malaysia, March 2007 and a more indepth read on RFID tags read How Stuff Works How RFID Works?
http://www.howstuffworks.com/rfid.htm/printable
4. Describe the issues raised in this article about using RFID tags in passports.
For more on this topic visit: http://www.spychips.com/
Big Brother Britain
More than 4 million surveillance cameras monitor our every move, making Britain the most watched nation in the world. Even in Brunei, more CCTV cameras are being installed, Giant Supermarket in Rimba has them by the checkouts and HSBC bank has them fitted in the ceilings. No signs indicate that CCTV cameras are in operation. Is this an invasion of our privacy? Are we being filmed without our permission? What happens to the video footage? Who has access to it? What is it being used for.
5. In class discuss the increased use of CCTV in Brunei.
Privacy and Storage of data
2008 BBC News, Anger over pupils database Plan, 13/02/08 The British Govt are planning on setting up a database of pupils exam results and personal information. The aim is to give employers access to this information so that school leavers cannot fake their qualifications.
6. Describe why critics are up in arms about this plan?
Also in 2008, British Government announced that they are going to set up a giant database to store all the information about our calls, texts, emails and website hits.
7. Read the article Daily Mail, 16th July 2008 – Big Brothers Gone too far.
c. Outline the purpose of this database
d. Identify the data recorded.
e. Outline the concerns raised by critics.
Read the article: ITPro Data thefts and loss is in the UK – Timeline to support the view that we cannot trust the government to keep data secure
Google’s Tracking Service Raises Privacy Concerns,
February 2009. A new google service Google Latitude allows users to share their physical locations among a network of friends from their smart phones. Concerns include whether or not Google will have to give Govts this information if asked; lack of safeguards from someone secretly opting into the tracking system on someone elses device.
Phorm – is it a privacy risk?
Phorm’s online ad-tracking service called Webwise. This is when adverts that appear on the webpage you are viewing, takes into account what you are reading, what you read before and uses this to make assumptions about what you might want to buy and plugs adverts of these products.
Read the following article to find out more: http://www.guardian.co.uk/technology/2008/mar/06/internet.privacy/print
Back