Follow
Publications: 33 | Followers: 0

Abstract View of System Components - utc.edu

Publish on Category: Birds 0

Anonymity, Security, Privacy and Civil Liberties
IntroductionAnonymitySecurityPrivacyEthical and Social Issues
Ethical and Social...J.M.Kizza
1
Introduction
Information has increased in valueInformation can also be a liabilityThe demand for information is high due to:High digitalization of info & increasing bandwidth.Declining costs of digital communication.Increased miniaturizationPortable computersOther communications equipment.Greater public awarenessThe danger for misuse is real
2
Anonymity
Absence of identityThere are three types of identity:Pseudo – know by a pseudo-nameUntraceable – no name associationAnonymity with a pseudo addressNo name associationAddress associationAnonymity on the InternetAnonymous serversAnonymous usersThere is no 100% anonymity on the internet
3
Advantages and Disadvantages of Anonymity
AdvantagesUsed by or as a form of whistle-blowingNational securityPrevent intimidation and fear of reprisalSecurity of individualsDisadvantagesCriminalsDispute resolutionCircumventing the lawCyber-stalking
4
Security
Means to prevent unauthorized accessConsists of:Confidentiality - to prevent unauthorized disclosure of information to third parties.Integrity - to prevent unauthorized modification of files and maintain the status quoAvailability -: to prevent unauthorized withholding of information from those who need it when they need it.
5
Security…
Physical security – guaranteed by:DeterrencePreventionDetectionResponsePhysical Access ControlsAuthenticate the userInformation Security ControlsCryptographyAuthenticationAuditOperationalPolicies and guidelines
6
Privacy
Human valueConsists of:Right to control external influencesSolitude - right to be aloneAnonymity – right to have no public identityIntimacy – right not to be monitoredRight to control personal information:Reserve – right to control one’s information
7
Types of Privacy
Personal PrivacyPersonal spacePhysical searchesVideo recordingSurveillanceInformational PrivacyPersonal informationFinancial informationMedical informationInternetInstitutional Privacy
8
Value of Privacy
Considered valuableValue eroding because inability to guaranteeThree attributesPersonal identityAutonomySocial RelationshipsInformation gatheringBuying and selling informationWe provide some of this informationInternet crawlers
9
Privacy Violations
Intrusion – wrongful entry, seizing or acquiringMisuse of Information – selling of our informationInterception of Information – eavesdroppingSurveillanceInformation Matching
10
Ways We Give Out Information
Rewards or Loyalty ProgramsBody ScannersDigital Video RecordersAutomobile “Black Boxes”Enhanced 911 ServiceRFIDsImplanted ChipsMedical informationReplace creditcardsCookiesBiometricsSpyware
11
Privacy Protection and Civil Liberties
Most accepted set of civil libertiesCriminal JusticePolice powersPerson libertyRight to fair trailBasic freedomsSpeechAssemblyAssociationMovementNo DiscriminationFreedom of informationCommunications and privacy
12
Privacy Protection and Civil Liberties
SafeguardsTechnicalUse of software and technical safeguardsContractualContactsSpecial information – publicationsMust have actions and enforcement to be effectiveLegalLawsEnforcement of the laws
13

0

Embed

Share

Upload

Make amazing presentation for free
Abstract View of System Components - utc.edu