Lect4 ch05
Lect4 ch05
Cyberspace
9/2020
1
Overview
Aim s & requirem ents :
Providing students understandings about Cyberethics related to Privacy.
Requirements:
- Reading materials before the lecture
- Attending required
Lecturing form at:
Content:
Privacy in the Digital Age
What Is Personal Privacy? Why Is Privacy Important?
Gathering Personal Data: Surveillance, Recording, and Tracking Techniques
Exchanging Personal Data: Merging and Matching
Mining: Big Data, Data Mining, and Web Mining
Protecting Personal Privacy in Public Space
Privacy-enhancing technologies
Privacy Legislation and Industry Self‐Regulation
Discussion: Importance of Privacy?
Self-study: Data protection techniques
Exercise: Conduct a survey of Privacy Laws and Data Protection Principles.
Reading m aterial: Chapter 5, Textbook
1. Privacy and Cyberspace
Concerns about personal privacy existed
long before the advent of computers and
cybertechnology.
Prior to the information era, for example,
technologies such as the camera and the
telephone presented challenges for
privacy.
So we can ask: what, if anything, is special
about the privacy concerns that are
associated with cybertechnology?
1. Privacy and Cyberspace
Consider the impact that changes involving this
technology have had on privacy with respect to
the:
amount of personal information that can be
collect,
speed at which personal information can be
transmitted,
duration of time that the information can be
retained,
kind of information that can be acquired and
exchanged.
2. What is Personal Privacy
Although many definitions of privacy have been
put forth, there is no universally agreed upon
definition of this concept.
To illustrate this point, consider some of the
metaphors that are typically associated with
privacy:
"lost,"
"diminished,"
"intruded upon,"
"invaded,"
"violated,"
"breached," and so forth.
What is Privacy (continued)?
Privacy is sometimes viewed as an "all-
or-nothing" concept – that is,
something that one either has (totally)
or does not have.
At other times, privacy is viewed as
something that can be diminished.
For example, as a repository of personal
information that can be eroded gradually.
Table 5-1: Three Theories
of Privacy
Accessibility Privacy Privacy is defined in terms of one's
physically "being let alone," or
freedom from intrusion into one's
physical space.
According to Moor:
an individual has privacy in a situation if in that
particular situation the individual is protected from
intrusion, interference, and information access by
others.
Moor’s Theory of Privacy
(continued)
An important aspect in this definition is
Moor's notion of a situation.
A situation is left deliberately broad so that it
can apply to a range of contexts or "zones.“
Situations can be "declared private" in a
normative sense.
For example, a situation can be an "activity," a
"relationship," or the "storage and access of
information" in a computer or on the Internet.
Moor’s Privacy Theory
(continued)
Moor’s distinction between naturally private
and normatively private situations enables us
to differentiate between the conditions
required for:
(a) having privacy (in a descriptive sense)
(b) having a right to privacy
With this distinction we can differentiate
between a:
loss of privacy
violation of privacy
Two Scenarios
Scenario 1: Someone walks into the
computer lab and sees you using a
computer.
Your privacy is lost but not violated.
Scenario 2: Someone peeps through the
keyhole of your apartment door and
sees you using a computer.
Your privacy is not only lost but is violated.
3. Why is Privacy Important?
What kind of value is privacy?
Is it one that is universally valued?
So the relative importance of privacy
may vary considerably among the
generations; however, we will proceed
on the assumption that privacy has
value and thus is important.
Privacy as a Universal Value
Not valued the same in all cultures.
Has at least some value in all societies.
It may be difficult to get universal
agreement on privacy laws and policies
in cyberspace.
Is Privacy an Intrinsic or
Instrumental Value?
Not valued for its own sake.
But is more than an instrumental value in the
sense that it is necessary (rather than merely
contingent) for achieving important human
ends.
Fried – privacy is necessary for human ends
such as trust and friendship.
Moor – privacy is an expression of the core
value security.
Privacy as an Important Social
Value
Privacy is an important social, as well as an
individual, value.
Regan (1995) points out that we often frame
debates over privacy simply in terms of how to
balance privacy interests as individual goods
against interests involving the larger social
good;
in such debates, Regan believes, interests
benefiting the social good will generally
override concerns regarding individual privacy.
Three Ways Privacy is Threat-
ened by Cybertechnology?
(A) data-gathering techniques used to collect and
record personal information, often without the
knowledge and consent of users.
(B) data-exchanging techniques used to transfer and
exchange personal data across and between
computer databases, typically without the knowledge
and consent of users.
(C) data-mining techniques used to search for
patterns implicit in large databases in order to
generate consumer profiles based on behavioral
patterns discovered in certain groups.
4. Gathering Personal Data
Personal data has been gathered since
Roman times (census data).
“Dataveillance” – a term coined by
Roger Clarke to capture two techniques
made possible by computer technology:
(a) the surveillance (data-monitoring):
(b) data-recording.
Dataveillance (Continued)
Video cameras monitor an individual's
physical movements – when they shop at
certain department stores.
Some motorists are now subject to new
schemes of highway surveillance while driving
in their motor vehicles, because of new forms
of scanning devices such as E-ZPASS.
Even the number of "clickstreams" – key
strokes and mouse clicks – entered by a Web
site visitor can be monitored and recorded.
Internet Cookies
“Cookies” are files that Web sites send to and
retrieve from the computer systems of Web
users.
Cookies technology enables Web site owners
to collect certain kinds of data about the
users who access their sites.
Because of "cookies technology," information
about an individual's on-line browsing
preferences can be "captured" whenever a
person visits a Web site.
Cookies (Continued)
The data recorded (via cookies) about the
user is then stored on a file placed on the
hard drive of the user's computer system.
No other data-gathering mechanism actually
stores the data it collects on the user’s computer.
The information can then be retrieved from
the user's system and resubmitted to a Web
site the next time the user accesses that site.
The exchange of data typically occurs without
a user's knowledge and consent.
Can Cookies be Defended?
Web sites that use cookies maintain that they
are performing a service for repeat users of a
Web site by customizing a user's means of
information retrieval.
They also point out that, because of cookies,
they are able to provide a user with a list of
preferences for future visits to that Web site.
Arguments Against Cookies
Privacy advocates argue that activities
involving the monitoring and recording an
individual's activities while visiting a Web site
and the subsequent downloading of that
information onto a user's PC (without
informing the user), violate privacy.
They also point out that information gathered
about a user via cookies can eventually be
acquired by on-line advertising agencies, who
could then target that user for on-line ads.
RFID technology
Another mode of surveillance made possible by cybertechnology
involves the use of RFID technology.
In its simplest form, RFID technology consists of a tag
(microchip) and a reader.
The tag has an electronic circuit, which stores data, and an antenna that
broadcasts data by radio waves in response to a signal from a reader.
The reader also contains an antenna that receives the radio signal, and it has a
demodulator that transforms the analog radio information into suitable data for
any computer processing that will be done
Like Internet cookies and other online data gathering and
surveillance techniques, RFIDclearly threatens individual
privacy.
But unlike surveillance concerns associated with cookies, which
track a user’s habits while visiting Web sites, RFID technology
can be used to track an individual’s location in the offline world.
5. Exchanging personal data
In the previous section, we examined ways in which personal
data could be gathered using surveillance techniques and then
recorded electronically in computer databases.
Other tools have been devised to transfer and exchange those
records across and between computer databases.
Simply collecting and recording personal data, per se, might not
seem terribly controversial if, for example, the data were never
used, transferred, exchanged, combined, or recombined.
Some would argue, however, that the mere collection of
personal data is problematic from a privacy perspective,
assuming that if data are being collected, there must be some
motive or purpose for their collection. Of course, the reason, as
many now realize, is that transactions involving the sale and
exchange of personal data are a growing business.
Computerized Merging and
Matching Operations
Computer merging is a technique of
extracting information from two or more
unrelated databases, which contain data
about some individual or group of individuals,
and incorporating it into a composite file.
Computer merging occurs whenever two or
more disparate pieces of information
contained in separate databases are
combined.
Computer Merging
Consider a scenario in which you voluntarily give
information about yourself to three different
organizations.
First, you give information about your income and
credit history to a lending institution in order to
secure a loan.
You next give information about your age and
medical history to an insurance company to purchase
life insurance.
You then give information about your views on
certain social issues to a political organization you
wish to join.
Computer Merging (continued)
Each organization has a legitimate need for
information to make decisions about you.
Insurance companies have a legitimate need
to know about your age and medical history
before agreeing to sell you life insurance.
Lending institutions have a legitimate need to
know information about your income and
credit history before agreeing to lend you
money to purchase a house or a car.
Computer Merging (continued)
Suppose that, without your knowledge and consent,
information about you contained in the insurance
company's database is merged with information
about you that resided in the lending institution's
database or in the political organization's database.
You voluntarily gave certain information about
yourself to three different organizations.
You authorized each organization to have the specific
information you voluntary granted.
However, it does not follow that you thereby
authorized any one organization to have some
combination of that information.
Computer Merging (continued)
Case Illustration
Double-Click, an on-line advertising
company attempted to purchase
Abacus, Inc. an off-line database
company.
Double-Click would have been able to
merge on-line and off-line records.
Computer Matching
Computer matching is a technique that
involves the cross checking of information in
two or more databases that are typically
unrelated in order to produces certain
"matching records" or "hits."
Matching or cross-referencing records in two
or more databases in order to generate one
or more hits is used for the express purpose
of creating a new file, which typically contains
a list of potential law violators.
Computer Matching
(continued)
In federal and state government applications,
computerized matching has been used by
various agencies and departments to identify:
potential law violators;
individuals who have actually broken the law
or who are suspected of having broken the
law (welfare cheats, deadbeat parents, etc.).
Computer Matching
(continued)
A scenario could be federal income tax
records matched against state motor
vehicle registration (looking for low
income and expensive automobiles).
Consider an analogy in physical space in
which your mail in monitored and
secretly matched or opened by
authorities.
Computer Matching
(continued)
Those who defend matching argue:
If you have nothing to hide, you have nothing to
worry about.
Another argument is:
Privacy is a legal right.
Legal rights are not absolute.
When one violates the law (i.e., commits a crime),
one forfeits one's legal rights.
Therefore, criminals have forfeited their right to
privacy.
Computer Matching
(continued)
Case illustration involving biometrics:
At Super Bowl XXXV in January 2001, a facial-
recognition technology was used to scan the
faces of individuals entering the stadium.
The digitized facial images were then
instantly matched against images contained
in a centralized database of suspected
criminals and terrorists.
This practice was, at the time, criticized by
many civil-liberties proponents.
6. Mining Personal Data
Data mining involves the indirect gathering of
personal information through an analysis of
implicit patterns discoverable in data.
Data-mining activities can generate new and
sometimes non-obvious classifications or
categories.
Individuals whose data is mined could
become identified with or linked to certain
newly created groups that they might never
have imagined to exist.
Data Mining (Continued)
Current privacy laws offer individuals no
protection regarding information about them
that is acquired through data-mining activities
is subsequently used.
Important decisions can be made about those
individuals based on the patterns found in the
mined personal data.
So some uses of data-mining technology raise
special concerns for personal privacy.
Data Mining (Continued)
Unlike personal data that resides in explicit
records in databases, information acquired
about persons via data mining is often
derived from implicit patterns in the data.
The patterns can suggest "new" facts,
relationships, or associations about that
person, such as that person's membership in
a newly "discovered" category or group.
Data Mining (Continued)
Much personal data collected and used
in data-mining applications is generally
considered to be neither confidential
nor intimate in nature.
So there is a tendency to presume that
such data must by default be public
data.
Data Mining (Continued)
Hypothetical Scenario (Lee):
Lee is a 35-year old junior executive;
Lee applies for a car loan;
Lee has an impeccable credit history;
A data mining algorithm “discovers” that Lee
belongs to a group of individuals likely to
start their own business and declare
bankruptcy;
Lee is denied the loan based on data mining.
Techniques for Manipulating
Personal Data
Data Merging A data-exchanging process in which personal
data from two or more sources is combined to
create a "mosaic" of individuals that would not
be discernable from the individual pieces of data
alone.