Computer Privacy

In: Computers and Technology

Submitted By CindyLou
Words 799
Pages 4
| Computer Privacy | For Managing Information Systems |

C Potts10-26-2015 |

Privacy can be a key aspect of the user experience with computers, online systems, and new technologies. Knowing what to consider about users and their views of computer systems can only improve privacy mechanisms.
Privacy is emerging as a critical design element for interactive systems in areas as diverse as e-commerce, health care, office work, and personal communications. These systems face the same fundamental tension. On the one hand, personal information can be used to streamline interactions, facilitate communication, and improve services. On the other hand, this same information introduces risks, ranging from mere distractions to extreme threats. Government reports, essays, books, and media coverage testify on peoples’ concerns regarding the potential for abuse and general unease over the lack of control over a variety of computer systems. Similarly, application developers worry that privacy concerns can impair the acceptance and adoption of their systems. No end-to-end solutions exist to design privacy-respecting systems that cater to user concerns. This paper will show that researchers in Human–Computer Interaction (HCI) and Computer Supported Cooperative Work (CSCW) can greatly improve the protection of individual’s personal information, because many of the threats and vulnerabilities associated with privacy originate from the interactions between the people using information systems, rather than the actual systems themselves. Approaching the topic of privacy can be daunting for the HCI practitioner, because the research literature on privacy is dispersed across multiple communities, including computer networking, systems, HCI, requirements engineering, management information systems (MIS), marketing, jurisprudence, and the social sciences. Even within…...

Similar Documents

Workplace Computer Privacy

...Workplace Computer Privacy Computer surveillance in the workplace is nothing new to people. It is commonly known that the employees are being monitored by the leader or boss. When computers and the Internet became prevalent, advanced surveillance increased. There are many employees monitoring software provided for employers to watch over employees' computers. The company administrators can monitor and supervise all of their employee computers including e-mails, chats, screens and even phone calls from time to time. Employees have few if any rights when it comes to electronic surveillance in the workplace. As Brown, Sonja D describes in the article “Naked at work: pssst! The boss is watching”, employees' right to privacy in the workplace is very limited. He asks a series of questions and presents us with several vivid scenes in the workplace, “Are there cameras in your workplace? Are the Websites you visit tracked regularly? Is someone else reading the e-mails you send and receive? How did your boss know that your three-day business trip with the company car was really two days at the client site and one day sightseeing?” (Brown, para. 2).  Should employers monitor their employees' uses of these technologies? For the sake of liability, discoverability, productivity and protection of trade secrets and intellectual property, the answer is commonly yes. Can workplace privacy be ignored? Definitely not! The right to privacy plays a unique role in American law and society.......

Words: 1629 - Pages: 7

Privacy and Computer Technology

...Privacy is a valuable interest and is now threatened more than ever by technological advances. Privacy is defined as the ability to control the collection, use, and dissemination of personal information (Fast Trac Course ). At one time people could once feel confident that what others may find out about them would be treated in a way that it would probably do any harm. Information technology has been beneficial for privacy. By having access to ATMs and online banking we rarely have to present ourselves to a teller. Online shopping offers similar benefits such as being able to shop without standing in long lines and being able to compare prices and research products before purchasing. However, since so much of what we do daily is done using a computer, it can pose a serious threat to privacy. This information can then be recreated to create detailed personal profiles that could not have transpired in pre-digital days. Furthermore, this information can be distributed far, wide, and immediately without our consent or even knowledge. Judicial remedies are unlikely to produce a satisfying or sensible balance between companies’ economic prerogatives and customers’ privacy interest. New technologies that has either unconsiously adopted or resourcefully applied privacy practices will continue to threaten personal privacy. Business will have to find ways to address this uneasiness. If companies remain complacent, underestimating the degree to which privacy matters to customers,......

Words: 1944 - Pages: 8


..."Information Protection and Privacy" Please respond to the following: Based on the e-Activity, evaluate the circumstances that contributed to the privacy violation, the consequence to the company to the breach, and management’s response to the breach, indicating the appropriateness of the response. Suggest how the company may have presented the breach and / or responded differently once the breach was discovered. Provide support for your rationale.  Assess the ethical considerations for information privacy, indicating how these considerations should be addressed with a corporate policy. Provide support for your rationale. "Information Protection and Privacy": The word 'privacy' means different things to different people, it affect both personal and business. As individuals, we need some amount of privacy to succeed. As a person we need to protect our thoughts from intruders because if others new our must intimate thoughts they could use that information to manipulate our decision making process. Business, need to protect their trade secret and information they collect from their customer to succeed. My objectives for this week e-activity consist of, evaluating the circumstances that contributed to the privacy violation, the consequence to the company to the breach, and management’s response to the breach, indicating the appropriateness of the response. Facebook is an online social network that allows users to create detailed online profiles and connect with other users,...

Words: 820 - Pages: 4


...Privacy and Security in America According to the Merriam Webster dictionary, the word privacy is defined as, “the quality or state of being apart from company or observation,” and the word security is defined as, “the state of being protected or safe from harm.” Now the question is, how do these words correlate? The answer is simple. If we did not have security, the idea of privacy would cease to exist. In the United States, we have the freedom to communicate freely, but if we wish to keep that freedom we must accept that the government may watch over us more closely from time to time. Regardless, I believe that the government respects us when it comes to our privacy. In an article posted on The Los Angeles Times website, columnist Andrew Liepman writes about the Snowden scandal and where he believes the government should draw the line between privacy and security. In May 2013, a former CIA (Central Intelligence Agency) and NSA (National Security Agency) employee named Edward Snowden deliberately disclosed classified information involving the top-secret United States and British government surveillance programs to the media. Liepman, a former CIA officer and deputy director of the National Counterterrorism Center, makes it clear that anyone following the Snowden, “saga,” should be made aware of two very important things. One being that, “many things need to be kept secret in today’s dangerous world, the line between “secret” and “not secret” is fuzzy rather than stark,......

Words: 1307 - Pages: 6


...Public Figures Do Not Have The Right To A Private Life Privacy is right to be let alone. People have different views about privacy life. People don’t want to discuss their private life in public because they want to keep their private life public. However, increasing the issue to privacy has been raised and it would seem that some journalists go too far in order to destroy the privacy life. Because some people don’t have right to private life. Therefore, this essay will discuss about public figures have no right to their private life , relating to politicians and celebrities and suggest that public figures should not be entitled to any privacy in their private lives. Politicians are the presenter of the countries; in addition, they take many responsibilities: ministry of law and ministry of finance. If politicians are doing something that might be considered immoral such as press stories about his affair with a woman, it causes embarrassment to the country. For example “ in interview with former president Clinton, Dan Rather asked Bill Clinton the tough question about his affair with White House intern Monica Lewinsky: Why? "For the worst possible reason. Just because I could," said Mr. Clinton” (CBSNEWS, June 20, 2004). The Ministry of law is responsible for making the law, which is used to control the societies to be a peaceful country. If they use the law in the wrong ways such as using the law for their advantages; as a result, it brings significant loss to the......

Words: 679 - Pages: 3

Computer Security & Privacy - Tjx

...Computer Security & Privacy - TJX Case Backgroud: TJX, largest apparel and home fashions retailers in the off-price segment was struck with Security Breach in all of its eight business units in US, Canada and Europe. Intruder had illegally accessed TJX payment system to hack personal and credit/debit card information of an unspecified number of customers. Security breach had affected Customers - pay for the purchases made by the intruders/ card invalidated / expiring the spending power, Financial Institutions –re-issue the cards for those customers whose information was compromised, Store Associates –change their credentials for system access, Vendors, Merchandisers - Modify the information shared due to mutual network and Richel Owen, CSO- design long and short term strategy to address the security breach issue. Intruders utilized the data stolen to produce bogus credit/debit cards that can be used at self-checkouts without any risks, and had also employed gift card float technique. Case Analysis: TJX learnt about the hacking on December, 2006 through the presence of suspicious software and immediately called in Security consultants for assistance. TJX had been intruded at multiple vulnerable points – Encryption, Wireless attack, USB drives, Processing logs, Compliance and Auditing practice. Encryption - Intruder had accessed the card information during the approval process and had the decryption key for the encryption software used in TJX. This can be addressed by......

Words: 620 - Pages: 3

Privacy had furnished the information in person to our field office representatives or had completed an application and mailed it in to us. In both cases the uses of the information is subject to the provisions of the Privacy Act. The retention period will be the same. If, however, you send us an email, for example as to how we can improve our web site, we will use the information you provide for that purpose only. The identifying information you give us, such as your email address and your name, will not be retained in a Privacy Act system of records, where we can retrieve your suggestion by your name or email address. For statistical purposes, we also collect non-personal information about you. Sometimes we analyze this data to determine customer interest in different parts of our website. The information we share is in a format that does not personally identify anyone. Who We Will Share Your Personal Information With We may disclose information you give us (e.g., to the Social Security Administration, Department of Veteran's Affairs) if authorized or required by Federal Law, such as the Privacy Act, Railroad Retirement Act, or the Railroad Unemployment Insurance Act. Your Choice About Who We Share Your Personal Information With If Federal laws (e.g., Privacy Act, Railroad Retirement Act, or the Railroad Unemployment Insurance Act) does not allow us to share information, we must get your written authorization before we can furnish your information to anyone else....

Words: 448 - Pages: 2


...Computers in Human Behavior 31 (2014) 48–56 Contents lists available at ScienceDirect Computers in Human Behavior journal homepage: My privacy is okay, but theirs is endangered: Why comparative optimism matters in online privacy concerns Young Min Baek a,⇑, Eun-mee Kim b, Young Bae c a Department of Communication, Yonsei University, Republic of Korea Department of Communication, Seoul National University, Republic of Korea c Department of Information Sociology, Soongsil University, Republic of Korea b a r t i c l e i n f o a b s t r a c t It is easy to trace and compile a record of individuals’ online activities, and cases of online privacy infringement (i.e., improper use of personal information) have been reported in advanced societies. Based on existing risk perception research, this study examines comparative optimism regarding online privacy infringement (i.e., users tend to believe privacy infringement is less likely to happen to oneself than to others) and its antecedents and consequences. Relying on large-scale online survey data in South Korea (N = 2028), this study finds: (1) comparative optimism is higher when the comparison targets are younger; (2) online knowledge and maternalistic personality traits increase comparative optimism mainly by influencing perceived risk to others, while prior experience of privacy infringement increases comparative optimism mainly by influencing perceived personal risk; and......

Words: 5399 - Pages: 22


...Running Head: THE EXISTENCE OF PRIVACY WITH TECHNOLOGY THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Obediah Howard Bellevue University   THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Abstract This research paper will discuss the relationship between privacy and technology. It will attempt to ascertain if technology and privacy can share the same plane of existence. Benefits and deficiencies of a particular technology are not hereditary to that technology, but are depend on their application. The public insists on accountability of technological innovation and assurance that privacy will remain intact. Striking a balance between enabling technology to enrich lives and restricting it from invading privacy has to be addressed. Implementing controls to protect private data is imperative. Technological advances over the years have challenged the public’s perception and expectation of privacy. Technology and one of its preeminent by-products, convenience, will continue to grow exponentially for the foreseeable future; there is no evidence to suggest otherwise. Privacy finds itself in a precarious position in the face of evolving technology. The collective concept of privacy has to be revisited. With the advent of technological innovations and the accessibilities they bring, privacy in its purest form does not exist. From an anthropological perspective, privacy is a relatively modern development. Ancient cultures practiced......

Words: 1783 - Pages: 8


...Privacy ‘The Limits of Privacy’ and ‘The Case for privacy’ are written by Amitai Etzioni and David D. Friedman respectively. Both of them have opposite views about privacy, which Etzioni states that less privacy is good for us and Friedman claims that more privacy makes the world a better place. In this paper, I will argue that Etzioni’s argument fails because privacy is really important for us to protect ourselves. I am going to explain in detail based on three different points in the next three paragraphs. First, in ‘The Limits of Privacy’, Etzioni argues that privacy is not important as many other goods. Based on his argument, he claims that “there are numerous values that trump or take precedence over privacy” (p.254) such as safety. However, I totally disagree his standpoint. Although safety also considers as a part of importance, it does not mean that safety can take priority over privacy consideration. Privacy does have significance effect for us to protect ourselves. Some people may think that it is worth to sacrifice their individual privacy in order to get freedom for safety. Once you give up your own privacy and allow anyone like governments to access to your information freely, your information is disclosed and you cannot get them back anymore. For example, after 9/11 attack in the United States, a lot of new measures about surveillance are introduced. The government can have authorities to wiretap, record or trace orders for email made by all Americans.......

Words: 1250 - Pages: 5

Examine Computer Forensics and Privacy

...Assignment 2 Examine Computer Forensics and Privacy Computers and the Internet have become a pervasive element in modern life. This technology is also used by those who engage in crime and other misconduct. Effective investigation of these offenses requires evidence derived from computers, telecommunications and the Internet. The need for digital evidence has led to a new areas of criminal investigations: Computer Forensics. Forensic investigators identify, extract, preserve and document computer and other digital evidence. This new field is less than fifteen years old, and is rapidly evolving. Education in this field has focused largely on its technical aspects. However, there are significant legal issues and ethical problems that investigators must deal with. Failure to follow proper legal procedure will result in evidence being ruled inadmissible in court. As a result, a guilty criminal might go free. Failure to behave in an ethical manner will erode public confidence in law enforcement, making its job more difficult and less effective. Investigators must have a working knowledge of legal issues involved in computer forensics. They must know what constitutes a legal search of a stand-alone computer as opposed to a network; what laws govern obtaining evidence and securing it so that the chain of evidence is not compromised; what telecommunications may lawfully be intercepted or examined after they have been received; what legally protected privacy rights......

Words: 823 - Pages: 4


...Are Law Enforcement Cameras an Invasion of Privacy? Are law enforcement and government cameras become a real threat to our privacy? In today's society, we've become accustomed to being tracked; complacent really. Many can't decide if this is a legitimate way to keep us secure, or just another move by the government to gain control. We are monitored with traffic cameras, police dashboard and body cameras, location services on our cell phones and store security cameras. How much is too much? Are we even aware of all the things that we encounter every day that are able to track our every move? Good questions. What will be your paper’s answer? The line is a thin one, that line between privacy and feeling as though we're in a fish bowl with people watching our every move. I think that TV shows such as "Person of Interest" that highlight a government system called "The Machine" which uses facial recognition and social security database information to warn the good guys of who is in danger based on a series of data information it compiled to determine their risk rating based on movements of both the target and the aggressor. While I believe this show only proves to ramp up the paranoid to believe that we live in a society where you're tracked and monitored every step of your day. Some people live with the belief that the police and government agencies truly are watching our every move, even in our own homes. And are they? What does the research say? While a little far......

Words: 1169 - Pages: 5

It Privacy

...Information Technology Practices and Privacy Concerns David Rebovich TS5536 – Ethical and Legal Considerations in Information Technology Professor Gold November 27, 2011 Technology has made it hard to live a life that is truly private. Many devices and services that people use on a daily basis are repositories for private information. Cell phones, with GPS services, can be helpful, but can also be used by authorities to track a person’s location. Social networking sites make it easy to stay in touch with people, but they also store personal information, and activity history that can be subpoenaed and used against a person if they are ever accused of a crime. Facebook postings in March, 2011 led to the arrest of one of the five suspects in the killing of a teenager in Queens New York. Anthony Collao, 18, was killed after attending a birthday party that was being hosted by gay hosts. The five suspects crashed the party, made slurs, and caused Collao, who was not gay, to leave because of the impending trouble. Collao, after leaving, was chased, beaten and killed, by the suspects. A fifth suspect charged in the fatal beating of a teen in Queens bragged about the attack in anti-gay Facebook postings, law enforcement sources said. (Mark Morales, 2011) The Patriot Act, signed into law shortly after the terrorist events of September 11, 2001, has the ability to be interpreted, by lawmakers, to allow the use of cell phone tracking by government agencies on......

Words: 1123 - Pages: 5


...Privacy and surveillance in the workplace In the modern workplace there are various tensions that exist between the privacy of employees and the level of surveillance that employers may employ in order to ensure that the organization functions optimally (Sprenger, P. (1999); Treacy, B. (2009); Wilkes, A. (2011)). Social networking sites are becoming more and more popular, and the internet is being used more and more to facilitate communication within organizations: “According to the Office for National Statistics' 2010 data, 30.1 million adults in the UK (60% of the population) access the internet every day or almost everyday. This is nearly double the 2006 estimate of 16.5 million. Social networking was a popular internet activity in 2010, with 43% of internet users posting messages to social networking sites or chat sites, blogs etc. While social networking activities prove to be most popular amongst 16–24 year olds, 31% of internet users aged 45–54 have used the internet to post messages on social network sites, while 28% uploaded content. Many of the adults that use social networks do so not only for social networking purposes but also for business networking purposes. Of the individuals listed in LinkedIn this year, there are over 52,000 people, predominantly in the US, Canada, India, Italy, UK and the Netherlands (in that order) with 'privacy' mentioned in their profile. Within LinkedIn there are also a considerable number of privacy related LinkedIn groups which......

Words: 379 - Pages: 2


...* Explain why you agree or disagree that Americans seem willing to sell their own privacy cheaply while simultaneously craving private information about one another. Americans want to believe that they aren’t willing to sell their own privacy cheaply. They would fill out surveys online to enter to win $1000 to Kmart or a chance to win a new car. People given the opportunity to win something will put all their private self out there. They will give name, number, address, email…they’ll tell you their buying habits and so on for the chance to win a NEW CAR (Forbes, 2012). As Alan Westin states “In democratic societies there is a fundamental belief in the uniqueness of the individual, in his basic dignity and worth as a creature of God and a human being, and in the need to maintain social processes that safeguard his sacred individuality (Halbert, 2010, pp 75)”. People act differently in school, work, with friends, when they go to the grocery store and when the time comes where they need to unwind and be themselves, they should be able to. Whether venting fear, anger, happiness, or anything else they have hidden throughout the day, people want that privacy. This is why people choose to live in a “free society”. * Describe what role you think technology has played in these trends towards privacy. Technology is ever encroaching on people’s lives whether they are aware of it or not. Camera’s videoing the parking lots, video’s watching the apartments’ you live in,......

Words: 464 - Pages: 2