The poorest man may in his cottage bid defiance to all the .ppt
《The poorest man may in his cottage bid defiance to all the .ppt》由会员分享,可在线阅读,更多相关《The poorest man may in his cottage bid defiance to all the .ppt(30页珍藏版)》请在麦多课文档分享上搜索。
1、1,“The poorest man may in his cottage bid defiance to all the force of the crown.”- William Pitt, Prime-minister of Great Britain, 1783 1801 and 1804- till his death in 1806,2,From “Fear and Freedom on the Internet “ -Peter Singer, Professor of Bio-ethics, Princeton University,“Theres really no way
2、to repress information today, and I think thats a wonderful advance we can all feel good about. This is a medium of total openness and total freedom, and thats what makes it so special.” - Bill Gates, October 2005Two newsitems of Jan 2006: At the request of Chinas rulers, Microsoft shut down the web
3、site of Zhao Jing , a Chinese blogger, who had been reporting on a strike by journalists at The Beijing News that followed the dismissal of the newspapers independent-minded editor The blog was hosted on MSN Spaces in USA. Microsofts blog tool in China filters words like “democracy” and “human right
4、s” from blog titles, to comply with local laws.,3,Todays news,Wednesday, Jan 25, 2006Google officially launched a new site that plans to filter out or block links to material likely to be considered politically sensitive by Chinas ruling Communist Party.,4,INTERNET PRIVACY: a DEFINITION,The ability
5、 to control what information one reveals about oneself over the Internet, and to control who can access that information. Experts in the field of Internet privacy: Internet privacy does not really exist. Privacy advocates believe that it should exist. Reference: http:/en.wikipedia.org/wiki/Internet_
6、privacy as of September 18, 2007,5,PRIVACY,Right to a sense of personal autonomy Right to have information about oneself used fairlyensuring that organizations act fairly in the way they (i) collect (ii) store (iii) use and (iv) disclose ones personal information Right to be left alone Right to deci
7、de what part of ones personal information is to be shared with (i) doctor (ii) employer (iii) banker (iv) neighbor (v) friend or (vi) stranger,6,Who cares?,2004:US government: introduced free do not call service: 28 million phone numbers registered within a month 2001 Survey in Australia: 90% Austra
8、lians consider it important how their personal information is used by organizations and to whom it is disclosed.,7,Costs of Privacy,Privacy of data its non-availability at some time, when required Attempts to retain privacy inconvenience or forgoing certain benefits,8,Privacy protection,To shield in
9、nocent persons from an overzealous governmentProfiling can lead to a misinterpretation of accurate information To permit every one to preserve her/his dignity and autonomyTo not let governments and big corporations to have and to exercise undue power over individuals,9,Privacy protection and Public
10、Interest,To support freedom of expression, freedom of speech and freedom of association. Anonymity fosters creativity. Permits individuals to make a fresh start and become useful members of society. Privacy protection is integral to trust. Trust is the cornerstone of a strong relationship.,10,How to
11、 protect?,Records should be kept for no longer than necessary. Records , if inaccurate, must be deleted or corrected.Sometimes not possible to delete: Example: Health records wrongly state that you have diabetes. Accordingly some wrong treatment was started. If the record is deleted, the reason why
12、the wrong treatment was given will also go and the medication history will not make sense. Be proactive in defense of privacy. The default barriers of time, distance and cost, against publication and retention of your private information, have vanished. PROBLEMS: Right to research vs autonomy; Right
13、 to forget vs. Right to know,11,Risks,Stealing information through Cookies (Example: Cross-site scripting ) Browsing profile Weak spot: ISP Spyware, Phishing, malicious proxy servers Web-bug: techniques used to track who is reading a web page or e-mail, when, and from what computer. They can also be
14、 used to see if an e-mail was forwarded to someone else.,12,The Google age,“We are becoming a transparent society of record such that documentation of our past history, current identity, location, communication and physiological and psychological states and behavior is increasingly possible. With pr
15、edictive profiles and DNA there are even claims to be able to know individual futures”. Gary Marx, “Privacy and Technology”, Telektronik, January 1996.,13,Health Information Acts stress PRIVACY,Apply to hospitals, doctors, laboratories, insurance companies, employers etc Allow individuals to be info
16、rmed about their health care Provide both privacy and legitimate access to health information,14,Facts and needs,Personal information: available in tens of data-bases under the control of different organizations. Onus on the person to correct his information, when he does not even know about all the
17、 places, where his information is. Ownership? vs Control? Needs: PRIVACY, CORRECTNESS OF INFORMATION, AVAILABILITY WHEREVER REQUIRED,15,Proposed Systems,IBM: a third party to maintain and release information by following certain rules Information to be maintained by the owner,16,Ownership of data,Ow
18、nership may not mean Write-access Ex: Government-owned information: social security number, passport ( A government can revoke a passport); Financial information: Annual Tax returns, bank balances Read- accessEx: Reports by: physicians, laboratories Reference: for the next set of slides: Carrie Gate
19、s, Jacob Slonim ,“ Owner-Controlled Information,” http:/flame.cs.dal.ca/gates/papers/nspw03.ps.,17,Ownership of data .continued,Ownership means Permitting others to access part of the information Role-based access control, augmented by location (say in a hospital, when both the owner and the doctor
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- THEPOORESTMANMAYINHISCOTTAGEBIDDEFIANCETOALLTHEPPT

链接地址:http://www.mydoc123.com/p-373089.html