Professional Documents
Culture Documents
Privacy
Ethics for the Information Age
Forth Edition
by
Michael J. Quinn
Chapter Overview
Introduction
Perspectives on privacy
Disclosing information
Ways information becomes public
U.S. legislation
Public records
Covert government surveillance
U.S. legislation authorizing wiretapping
Data mining
Identity theft
Encryption
1-2
5-2
Introduction
Information collection, exchange,
combination, and distribution easier than
ever
More information access less privacy
Trade-offs
Privacy vs. need for credentials
Privacy vs. desire for free expression
Privacy vs. safety / security
1-3
Copyright Pearson Education, Inc. Publishing as Pearson Addison-Wesley
5-3
Defining Privacy
Privacy related to notion of access
Access
Physical proximity to a person
Knowledge about a person
1-4
5-4
Harms of Privacy
Cover for illegal or immoral activities
Burden on the nuclear family
To care for all its members
5-5
Benefits of Privacy
5-6
1-7
Copyright Pearson Education, Inc. Publishing as Pearson Addison-Wesley
5-7
1-8
5-8
Disclosing Information
Public record: information for public access
Ex: birth certificates
Types of disclosures
Voluntary :
Involuntary : body and luggage search at airport
Statutory : Record of arrests and convicted persons
Cameras on streets
1-9
Copyright Pearson Education, Inc. Publishing as Pearson Addison-Wesley
5-9
5-10
Public Records
Examples of Public Records
Census records
Many ways to use these records
1-11
Copyright Pearson Education, Inc. Publishing as Pearson Addison-Wesley
5-11
Census Records
Census required to ensure every state has
fair representation
Number of questions steadily rising
Sometimes Census Bureau has broken
confidentiality requirement
World War I: provided names and addresses
of young draft resistors
World War II: used info. About JapaneseAmericans
Round them up and send them to arrest camps.
Copyright Pearson Education, Inc. Publishing as Pearson Addison-Wesley
1-12
5-12
1-13
Copyright Pearson Education, Inc. Publishing as Pearson Addison-Wesley
5-13
5-14
5-15
Data Mining
Data mining
Searching for patterns or relationships in one or more
databases
Way to generate new information by combining facts
found in multiple transactions
Way to predict future events
1-16
5-16
5-17
5-18
5-19
5-20
1-21
5-21
5-22
Phishing
Gathering financial info through spam asking you to visit
a web site and the update personal info (fake Paypal)
1-23
Copyright Pearson Education, Inc. Publishing as Pearson Addison-Wesley
5-23
Encryption
Process of transforming a message in
order to conceal its meaning
Valuable tool for maintaining privacy
1-24
Copyright Pearson Education, Inc. Publishing as Pearson Addison-Wesley
5-24