0% found this document useful (0 votes)
127 views15 pages

Module 4 - Privacy in The Cyberspace

This document discusses privacy in cyberspace and covers several key topics: 1. It defines cyberethics as studying moral issues involving cybertechnology, while cybertechnology refers to computing and communication devices. 2. It outlines two categories of privacy - rights to fence off information seekers and rights to control information disclosure. It also describes three types of privacy and three attributes of privacy. 3. Privacy concerns are discussed, such as the amount of information collected and how long it is retained. Common privacy violations are also enumerated. 4. The document concludes by defining data mining and web mining as techniques for indirectly gathering personal information through patterns in data.

Uploaded by

Ochoa Bryan-san
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
0% found this document useful (0 votes)
127 views15 pages

Module 4 - Privacy in The Cyberspace

This document discusses privacy in cyberspace and covers several key topics: 1. It defines cyberethics as studying moral issues involving cybertechnology, while cybertechnology refers to computing and communication devices. 2. It outlines two categories of privacy - rights to fence off information seekers and rights to control information disclosure. It also describes three types of privacy and three attributes of privacy. 3. Privacy concerns are discussed, such as the amount of information collected and how long it is retained. Common privacy violations are also enumerated. 4. The document concludes by defining data mining and web mining as techniques for indirectly gathering personal information through patterns in data.

Uploaded by

Ochoa Bryan-san
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
You are on page 1/ 15

WEEK 4

Privacy in the Cyberspace

ITE-6202 Social Issues and Professional Practice


Week 4: Privacy in the Cyberspace
Course Learning Outcomes:

By the end of this module, a student is able to:


1. Determine the differences between cybertechnology and cyberethics
2. Understand the meaning of privacy
3. Enumerate and determine the differences of each type of privacy
4. Enumerate and determine the differences of each attibute of privacy
5. Understand the different privacy concerns related in cybertechnology
6. Understand the different privacy violations.
Topics Covered

• Cyberethics VS Cybertechnology

PRIVACY
• Categories of Privacy
• Types of Privacy
• Three Attributes of Privacy
• Privacy Concerns
• Privacy Violations and Legal
Implications
• Data and Web Mining
I. CYBERETHICS VS CYBERTECHNOLOGY
Cyberethics.
It can be defined as the study of moral, legal, and social
issues involving cybertechnology and evaluates the social
policies and laws that have been framed in response to
issues generated by its development and use.

Cybertechnology.
It refers to a wide range of computing and communication
devices, from stand-alone computers to connected, or
networked, computing and communication technologies.
I. PRIVACY: Categories of Privacy
Two categories of privacy
• The first category includes rights that an
individual can use to fence off personal
information seekers namely:
• Solitude
• Anonymity
• Intimacy
I. PRIVACY: Categories of Privacy
Two categories of privacy
• The second category contains those rights an
individual can use to control the amount and
value of personal information given out
• Reserve
I. PRIVACY: Types of Privacy
Types of privacy
• Personal Privacy
- The right to privacy of all personal attributes
would mean the prevention of anyone or
anything that would intrude or violate that
personal space where those attributes are.
I. PRIVACY: Types of Privacy
Types of privacy
• Informational Privacy
- Informational privacy concerns the protection
of unauthorized access to information itself.
Information such as:
• Personal information
• Financial information
• Medical information
• Internet
I. PRIVACY: Types of Privacy
Types of privacy
• Institutional Privacy
- The research data, the sales and product data,
the marketing strategies, and the activities of
the organization all need to be private.
I. PRIVACY: Attributes of Privacy
Attributes of Privacy
• Personal Identity
- Personal identity is valuable because it enshrines
personal privacy.
• Autonomy
- The less personal information people have about
an individual, the more autonomous that individual
can be, especially in decision making.
• Social Relationships
- These involves norms and practice.
I. PRIVACY: Privacy Concerns
Concerns about personal privacy existed long before the
advent of computers and cybertechnology. Such as:

1. Amount of personal information that can be collected.


2. Speed at which personal information can be
transmitted.
3. Duration of time that the information can be retained.
4. Kind of information that can be acquired and
exchanged.
I. PRIVACY: Privacy Violations
Contributing factors or causes of violations:
1. Consumers willingly give up information about themselves
when they register at Web sites, shopping malls in order to
win prizes, and in mailing solicitations.
2. Consumers lack the knowledge of how what they consider a
little bit of information can turn into a big invasion of privacy.
3. Inadequate privacy policies.
4. Failure of companies and institutions to follow their own
privacy policies.
5. Internet temptation that enables businesses to reach
individuals in a very short time in the privacy of their homes
and offices.
I. PRIVACY: Privacy Violations
Other privacy violations:
1. Intrusion: an invasion of privacy by wrongful entry,
seizing, or acquiring possession of the property of
others.
2. Misuse of Information: information is used for
unauthorized purposes.
3. Interception of information: unauthorized access to
private information via eavesdropping
4. Information Matching: no limit to what one can do with
the collected information
I. PRIVACY: Data and Web Mining
Data Mining
Data mining involves the indirect gathering of
personal information through an analysis of implicit
patterns discoverable in data.

Web Mining
The application of data mining techniques to discover
patterns from the Web.
END

You might also like