269x Filetype PPT File size 0.67 MB Source: www.tau.ac.il
Privacy Privacy freedom from unauthorized intrusion freedom from unauthorized intrusionMerriam Webster’s Collegiate Dictionary Merriam Webster’s Collegiate Dictionary http://www.m-w.com/cgi-bin/dictionary http://www.m-w.com/cgi-bin/dictionary freedom from interference or intrusion freedom from interference or intrusion Oxford English Dictionary Oxford English Dictionary http://dictionary.oed.com/cgi/entry/00188918 http://dictionary.oed.com/cgi/entry/00188918 Agenda Agenda Computers and privacy Computers and privacy Threats to privacy Threats to privacy Protecting privacy Protecting privacy Three dilemmas Three dilemmas Individuals and privacy Individuals and privacy Organizations and privacy Organizations and privacy Governments and privacy Governments and privacy Privacy policy Privacy policy Privacy and Computers Privacy and Computers Why so Important? Why so Important? Privacy and Computers Privacy and Computers Computers are not necessary for Computers are not necessary for the invasion of privacy the invasion of privacy Computers embody many threats Computers embody many threats to privacy to privacy Computers make it faster and Computers make it faster and easier to violate privacy easier to violate privacy Much of our private information is Much of our private information is just ‘out there’ in computers just ‘out there’ in computers Government and private databases Government and private databases Risks Risks Unauthorized use by “insiders” Unauthorized use by “insiders” Inadvertent leakage through Inadvertent leakage through negligence, carelessness, hacking negligence, carelessness, hacking Propagation of errors Propagation of errors Intentional: marketing, decision Intentional: marketing, decision making, surveillance making, surveillance Cross-matching files Cross-matching files
no reviews yet
Please Login to review.