A Gift of Fire: Chapter 2: Privacy
A Gift of Fire: Chapter 2: Privacy
Fourth edition
Sara Baase
Chapter 2: Privacy
What We Will Cover
• Privacy and Computer Technology
• Privacy Topics
• Protecting Privacy
• Communications
Privacy and Computer Technology
• Computer technology is not necessary for the invasion of
privacy. However, the use of digital technology has made new
threats possible and old threats more potent. Computer
technologies—databases, digital cameras, the Web,
smartphones, and global positioning system (GPS) devices,
among others—have profoundly changed what people can
know about us and how they can use that information.
Understanding the risks and problems is a first step towards
protecting privacy.
• For computer professionals, understanding the risks and
problems is a step towards designing systems with built-in
privacy protections and less risk.
Privacy and Computer Technology
Key Aspects of Privacy:
• Freedom from intrusion (being left alone)
• Control of information about oneself
• Freedom from surveillance (being tracked,
followed, watched)
Privacy threats come in several categories
• Intentional, institutional uses of personal information (in the
government sector primarily for law enforcement and tax
collection, and in the private sector primarily for marketing
and decision making)
• Unauthorized use or release by “insiders,” the people who
maintain the information
• Theft of information
• Inadvertent leakage of information through negligence or
carelessness
• Our own actions (sometimes intentional trade-offs and
sometimes when we are unaware of the risks)
Privacy and Computer Technology (cont.)
•The important ethical issue is that if someone is not aware of the collection and use,
gathering can depend on the level of public awareness. Some people know about
Terminology (cont.):
• Data mining - searching and analyzing masses
of data to find patterns and develop new
information or knowledge
• Computer matching - combining and
comparing information from different
databases (using social security number, for
example, to match records)
Privacy and Computer Technology (cont.)
Terminology (cont.):
•Computer profiling - analyzing data in computer files to
determine characteristics of people most likely to engage in
certain behaviour
• Businesses use these techniques to find likely new customers.
•Government agencies use them to detect fraud, to enforce
other laws, and to find terrorists.
•Data mining, computer matching, and profiling are, in most
cases, examples of secondary use of personal information.
Privacy and Computer Technology (cont.)