419x Filetype PPT File size 0.67 MB Source: www.tau.ac.il
Privacy
Privacy
freedom from unauthorized intrusion
freedom from unauthorized intrusion
Merriam Webster’s Collegiate Dictionary
Merriam Webster’s Collegiate Dictionary
http://www.m-w.com/cgi-bin/dictionary
http://www.m-w.com/cgi-bin/dictionary
freedom from interference or intrusion
freedom from interference or intrusion
Oxford English Dictionary
Oxford English Dictionary
http://dictionary.oed.com/cgi/entry/00188918
http://dictionary.oed.com/cgi/entry/00188918
Agenda
Agenda
Computers and privacy
Computers and privacy
Threats to privacy
Threats to privacy
Protecting privacy
Protecting privacy
Three dilemmas
Three dilemmas
Individuals and privacy
Individuals and privacy
Organizations and privacy
Organizations and privacy
Governments and privacy
Governments and privacy
Privacy policy
Privacy policy
Privacy and Computers
Privacy and Computers
Why so Important?
Why so Important?
Privacy and Computers
Privacy and Computers
Computers are not necessary for
Computers are not necessary for
the invasion of privacy
the invasion of privacy
Computers embody many threats
Computers embody many threats
to privacy
to privacy
Computers make it faster and
Computers make it faster and
easier to violate privacy
easier to violate privacy
Much of our private information is
Much of our private information is
just ‘out there’ in computers
just ‘out there’ in computers
Government and private databases
Government and private databases
Risks
Risks
Unauthorized use by “insiders”
Unauthorized use by “insiders”
Inadvertent leakage through
Inadvertent leakage through
negligence, carelessness, hacking
negligence, carelessness, hacking
Propagation of errors
Propagation of errors
Intentional: marketing, decision
Intentional: marketing, decision
making, surveillance
making, surveillance
Cross-matching files
Cross-matching files
no reviews yet
Please Login to review.