Скачать презентацию Privacy Policy Law and Technology History and Philosophy Скачать презентацию Privacy Policy Law and Technology History and Philosophy

0f942e276b3afb168713385e830efe8e.ppt

  • Количество слайдов: 36

Privacy Policy, Law and Technology History and Philosophy of Privacy August 31 and September Privacy Policy, Law and Technology History and Philosophy of Privacy August 31 and September 2, 2010 Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 1

Avoiding Plagiarism Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 2 Avoiding Plagiarism Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 2

CMU Policy on Cheating and Plagiarism CMU Policy*: Plagiarism includes, but is not limited CMU Policy on Cheating and Plagiarism CMU Policy*: Plagiarism includes, but is not limited to, failure to indicate the source with quotation marks or footnotes where appropriate if any of the following are reproduced in the work submitted by a student: 1. 2. 3. 4. 5. A phrase, written or musical. A graphic element. A proof. Specific language. An idea derived from the work, published or unpublished, of another person. *http: //www. cmu. edu/policies/documents/Cheating. html Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 3

This is serious § Consequences of plagiarism in this class range from zero credit This is serious § Consequences of plagiarism in this class range from zero credit for entire assignment to failing the course to recommendation of university disciplinary action § Publishers and professional societies have plagiarism policies too § The Internet makes it easy to plagiarize – Students are frequently cutting and pasting off the Internet without proper quotation and/or citations – Students are buying papers off the Internet § The Internet also makes it easy to catch plagiarism Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 4

Avoiding plagiarism § If you use someone’s specific words, put them in quotes and Avoiding plagiarism § If you use someone’s specific words, put them in quotes and cite the source § If you use someone’s ideas expressed in your own words, cite the source § If you paraphrase, summarize in your own words, but still cite source – Don’t use same sentence structure with a few word substitutions – If you use some of the source’s words, put them in quotes § When in doubt, put it in quotes and cite the source! Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 5

Good resources on avoiding plagiarism § See list on course website athttp: //cups. cmu. Good resources on avoiding plagiarism § See list on course website athttp: //cups. cmu. edu/courses/privpolawt ech-fa 10/skills. html Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 6

Creating a Bibliography and Citing Sources Cy. Lab Usable Privacy and Security Laboratory http: Creating a Bibliography and Citing Sources Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 7

Creating a bibliography and citing sources § Do you know how to create a Creating a bibliography and citing sources § Do you know how to create a properly formatted bibliography? § Why is a list of URLs not a proper bibliography? Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 8

Citing sources § Whenever you take words, images, or ideas from another source you Citing sources § Whenever you take words, images, or ideas from another source you need to cite that source – Direct quotes and paraphrases – Images, photographs, tables, graphs – Ideas, measurements, computations § Also use citations as evidence to back up assertions § If you use somebody else’s words, you must quote them – Short excerpts appear in quotes – Long excerpts (3 or more lines) are introduced and then appear as indented text, often in a smaller font, single spaced – If you leave out words in the middle use … – If you leave out words at the end use …. – If you substitute or add words, put them in square brackets [] – If you add italics say [emphasis added] § Failure to cite sources = plagiarism Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 9

Paraphrasing § Usually paraphrasing ideas is preferable to quoting unless – – Exact wording Paraphrasing § Usually paraphrasing ideas is preferable to quoting unless – – Exact wording is important You are quoting famous words You are critiquing or comparing specific words rather than ideas The original words say what you want to say very well and succinctly § Usually paraphrasing lets you convey an idea more succinctly because you can focus on the part of the idea most relevant to your paper § If you end up using some of the original words in your paraphrase, use quotes around those words Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 10

Forms of citation § Full bibliographic citation inline – Typically used on a slide Forms of citation § Full bibliographic citation inline – Typically used on a slide § Footnote or endnote – Used in legal writing, many books, some conferences and journals § Inline short citation with bibliography, references cited section, or reference list – Used by most technical conferences and journals, some books, most dissertations Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 11

Citations in text § Format depends on style you are using – Usually a Citations in text § Format depends on style you are using – Usually a number or author and date, sometimes a page number reference too § Citation usually goes at the end of the sentence – Privacy is not “absolute” (Westin 1967). – Privacy is not “absolute” [3]. § If Author is mentioned, in sentence, name does not appear in citation – Westin (1967, p. 7) claims that individuals must balance a desire for privacy with a desire to participate in society. § Multiple citations can appear together – [3, 4, 5] – (Westin 1967; Cranor 2002) Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 12

Footnotes § § Used heavily in legal writing Usually used sparingly in technical writing Footnotes § § Used heavily in legal writing Usually used sparingly in technical writing Each footnote appears only once If you reference the same source multiple times you must repeat the reference information, however you can abbreviate it on second and subsequent references and use ibid to indicate same as previous reference Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 13

Creating a bibliography § Similar rules apply to other forms of citation (footnotes, etc. Creating a bibliography § Similar rules apply to other forms of citation (footnotes, etc. ) § Pick an appropriate style and use it consistently throughout your paper – Most conferences and journals have style requirements – Popular styles: Chicago/Turabian, MLA, APSA, ACM, IEEE § Complete bibliographic entry includes author, title, date, publisher, place of publication, pages, volume number, etc. § Bibliographic entries should be ordered - usually either alphabetically or in order referenced in the text Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 14

Word processing tools § Microsoft Word – Word has built in support for footnotes Word processing tools § Microsoft Word – Word has built in support for footnotes and endnotes – Use cross reference feature for numbered reference lists – Third party bibliographic add-ons may be useful – Latest version of Word has built-in bibliography support § La. Te. X – Built in support for footnotes and endnotes – Use Bibtex! Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 15

Conceptualizing privacy Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 16 Conceptualizing privacy Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 16

Concept versus right § Privacy as concept – What is it – How and Concept versus right § Privacy as concept – What is it – How and why it is valued § Privacy as right – How it is (or should be) protected • By law • By policy • By technology Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 17

Hard to define “Privacy is a value so complex, so entangled in competing and Hard to define “Privacy is a value so complex, so entangled in competing and contradictory dimensions, so engorged with various and distinct meanings, that I sometimes despair whether it can be usefully addressed at all. ” Robert C. Post, Three Concepts of Privacy, 89 Geo. L. J. 2087 (2001). Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 18

Some definitions from the literature § § § Personhood Intimacy Secrecy Contextual integrity Limited Some definitions from the literature § § § Personhood Intimacy Secrecy Contextual integrity Limited access to the self Control over information Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 19

Limited access to self “the right to be let alone” - Samuel D. Warren Limited access to self “the right to be let alone” - Samuel D. Warren and Louis D. Brandeis, The Right to Privacy, 4 Harv. L. Rev. 193 (1890) “Being alone. ” - Shane (age 4) “our concern over our accessibility to others: the extent to which we are known to others, the extent to which others have physical access to us, and the extent to which we are the subject of others attention. - Ruth Gavison, “Privacy and the Limits of the Law, ” Yale Law Journal 89 (1980) Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 20

Control over information “Privacy is the claim of individuals, groups or institutions to determine Control over information “Privacy is the claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others. ” “…each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication…. ” Alan Westin, Privacy and Freedom, 1967 Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 21

Realizing limited access and control § Limited access – Laws to prohibit or limit Realizing limited access and control § Limited access – Laws to prohibit or limit collection, disclosure, contact – Technology to facilitate anonymous transactions, minimize disclosure § Control – Laws to mandate choice (opt-in/opt-out) – Technology to facilitate informed consent, keep track of and enforce privacy preferences Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 22

Westin’s four states of privacy Solitude – individual separated form the group and freed Westin’s four states of privacy Solitude – individual separated form the group and freed form the observation of other persons Intimacy – individual is part of a small unit Anonymity – individual in public but still seeks and finds freedom from identification and surveillance Reserve – the creation of a psychological barrier against unwanted intrusion - holding back communication Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 23

Westin’s four functions of privacy § Personal autonomy – control when you go public Westin’s four functions of privacy § Personal autonomy – control when you go public about info § Emotional release – be yourself – permissible deviations to social or institutional norms § Self-evaluation § Limited and protected communication Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 24

Solove’s privacy taxonomy § Information Collection – Surveillance – Interrogation § Information Processing – Solove’s privacy taxonomy § Information Collection – Surveillance – Interrogation § Information Processing – – – Aggregation Identification Insecurity Secondary Use Exclusion § Information Dissemination – – – – Breach of Confidentiality Disclosure Exposure Increased Accessibility Blackmail Appropriation Distortion § Invasion – Intrusion – Decisional Interference Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 25

Information vs. decisional privacy § Information privacy concerns the collection, use, and disclosure of Information vs. decisional privacy § Information privacy concerns the collection, use, and disclosure of personal information § Decisional privacy concerns the freedom to make decisions about one's body and family Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 26

Multiple facets of privacy § How can posting personal information about myself on my Multiple facets of privacy § How can posting personal information about myself on my web site result in a reduction of my privacy? How can it result in an increase in my privacy? Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 27

Privacy as animal instinct? § Is privacy necessary for species survival? Eagles eating a Privacy as animal instinct? § Is privacy necessary for species survival? Eagles eating a deer carcass http: //www. learner. org/jnorth/tm/eagle/Capture. E 63. html Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 28

History Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 29 History Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 29

Information privacy § In 17 th century America, colonists began to collect information about Information privacy § In 17 th century America, colonists began to collect information about each other – Census, birth and death records, school records, tax records § Informants reported people who behaved badly – Disorderly children, nightwalkers, Sabbath breakers, atheists, drunks Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 30

Privacy of personal space § Historically, depended a lot on the type and proximity Privacy of personal space § Historically, depended a lot on the type and proximity of available housing § In 18 th century Europe, most people lived in cities where houses were close together, but small number of people lived in each house § In 18 th century America, people lived far away from each other but many people lived in each house and even shared beds Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 31

Communication privacy § When all communication was oral, communication privacy depended on – Communicating Communication privacy § When all communication was oral, communication privacy depended on – Communicating without someone overhearing – Communicating with people who wouldn’t tell others § Written communications brought new opportunities for privacy violations § In 18 th century America, postal mail was not necessarily private – Sealing wax, basic encryption used to increase privacy How were regulation and law used – 1782 - Congress made it illegal to open other peoples’ mail to increase postal mail privacy? – Later the invention of the adhesive envelope increased communications privacy Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 32

Telegraph § In the late nineteenth century the telegraph became a popular means of Telegraph § In the late nineteenth century the telegraph became a popular means of long distance communication § Messages could be coded, but you could not recover damages due to transmission errors if the message was coded § Telegraph operators were supposed to keep messages confidential § Occasional subpoenas for telegraph messages Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 33

Cameras § Cameras, especially portable “snap” cameras (1888), raised new privacy concerns § Telephoto Cameras § Cameras, especially portable “snap” cameras (1888), raised new privacy concerns § Telephoto lenses § Video cameras § Hidden cameras § Web cams § Satellite images Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 34

Privacy History References § Robert Ellis Smith. 2000. Ben Franklin’s Web Site: Privacy and Privacy History References § Robert Ellis Smith. 2000. Ben Franklin’s Web Site: Privacy and Curiosity from Plymouth Rock to the Internet. Providence: Privacy Journal. § Alan Westin. 1967. Privacy and Freedom. New York: Atheneum. Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 35

Homework 1 discussion § Comments on reading assignments? § http: //cups. cmu. edu/courses/privpolawtec h-fa Homework 1 discussion § Comments on reading assignments? § http: //cups. cmu. edu/courses/privpolawtec h-fa 10/hw/hw 1. html Cy. Lab Usable Privacy and Security Laboratory http: //cups. cmu. edu/ 36