internet ethics presented by: daniel wu kalven wu
Post on 21-Dec-2015
214 views
TRANSCRIPT
Internet Ethics
Presented by:Daniel WuKalven Wu
Book Format Internet Ethics edited by Duncan
Langford Compilation of works written by
many authors Little opinions, mostly
informational Published in 2000
Relation to Report Report - Laws and the Internet
Copyrights Defamation John Mawhood and Daniel Tysver
Presentation - Privacy and Security Related to Everyday Use Herman T. Tavani
Outline What is Privacy? Privacy Theories Internet Enhanced Privacy
Concerns Internet Specific Privacy Concerns
Outline (cont.) What is Security? Two senses of Security Cryptography and Data Encryption Proposals for Internet Privacy and
Internet Security
What is Privacy? Interest that individuals have with
respect to protecting personal information, personal property, and personal space
Moral or Legal right ? Data Protection
Privacy Theories Non-Intrusion theory Seclusion theory Control theory Limitation theory Control/Restricted Access theory
Non-Intrusion Theory Article by Warren and Brandels
(1890) ‘Being let alone’ ‘Being free from intrusion’ Problem: could be left alone but
still no privacy.
Seclusion Theory ‘Being alone’ Physical means in a state of
solitude Differentiates Privacy with Liberty Confused Privacy with Solitude Person on a Deserted Island
Control Theory One has Privacy iff one has control over
information about oneself Choice – grant/deny access to info All or None Flaws
Practical – Never able to have complete control over information about onself
Theoretical – Can reveal every bit of information but still retain privacy
Limitation Theory Limiting and restricting access of
information in certain contexts Avoids confusion:
Autonomy Liberty Solitude
Problem: Underestimate role of control
Confused with secrecy
Control/Restricted Access Theory Privacy in a ‘situation’ if person is
‘protected from intrusion, interference, and information access by others’
Comprehensive account Situations
Activity, relationship, storage/access of information
Internet Enhanced Privacy Concern Privacy Issues before the Internet Dataveillance & Data Gathering Data Exchanging and Data Mining
Dataveillance & Data Gathering Monitoring people’s actions or
communications Not unique to Internet
Wiretapping Stalkers
Click streams Direct
Web forms Indirect
Log files
Data Exchanging and Data Mining Sale of data to third parties Merging and matching of
electronic records Data mining
Unearth patterns and relationships between data
Consumer groups
Internet Specific Privacy Concern Cookie Search Engine
Cookie Collect data With or without user’s knowledge Shopping cart Able to turn off
Search Engine Retrieving personal information Information about Individual
persons Persons with no knowledge of
information on databases Searching on listservers,
newsgroups, etc provides information about user history
What is Security? ECS153 Privacy concerns is losing control
of personal information to people who claim to need it
Security concerns is fear of unauthorized access and manipulation of data by people who does not have a legitimate need of it
Two senses of Security Concerns involving computer
system vulnerability Viruses, worms, and other ‘rogue’
programs Protection from unauthorized
access information that either Resides in databases Communicated over the Internet
Cryptography and Data Encryption Prof. Rogaway studies
cryptography Plain text, ciphertext, key Private Key
Roman Era: Julius Caesar Public and Private Key, “Strong
encryption”
Proposals for Internet Privacy and Internet Security Anonymizer Crowds Onion Router
Final Remarks Questions ? Comments Discussion