Privacy - PowerPoint PPT Presentation

1 / 30
About This Presentation
Title:

Privacy

Description:

Introduction Privacy Online Identity Theft Prevention of ID Theft Surveillance Sousveillance ... Natural Prevention of crime Counter Deleting a file ... – PowerPoint PPT presentation

Number of Views:83
Avg rating:3.0/5.0
Slides: 31
Provided by: Caro386
Category:

less

Transcript and Presenter's Notes

Title: Privacy


1
Privacy SurveillanceCOM125B
2
Introduction
  • Privacy
  • Online Identity Theft
  • Prevention of ID Theft
  • Surveillance
  • Sousveillance

3
Privacy
  • freedom from unauthorized intrusion state of
    being let alone and able to keep certain esp.
    personal matters to oneself

4
Types of Privacy
  • Bodily
  • Political
  • Medical
  • Genetic
  • Internet
  • From corporations
  • From government interference

5
We lose our privacy when
  • Entering sweepstakes / competitions
  • In order to have a chance of winning a prize
  • Giving personal information to potential
    employers
  • We use the Internet
  • - leave trails of information
  • - computer can reveal web browsers history,
    cache or logs
  • - websites also have own logs showing IP address
    and other demographic data

6
Cons of giving up Privacy
  • Details might be sold to other companies
  • Information voluntarily shared is later stolen or
    misused
  • - Identity Theft

7
  • According to 2 studies in July 2003, (Gartner
    Research and Harris Interactive), approximately 7
    million people became victims of identity theft
    in the prior 12 months. That equals 19,178 per
    day, 799 per hour, 13.3 per minute.
  • Source Identity Theft Resource Center

8
Identity Theft
  • Crimes in which someone wrongfully obtains and
    uses another persons personal data in some way
    that involves fraud or deception, typically for
    economic gain.
  • Personal data (Social Security Number, Bank
    account, credit card, telephone calling card
    number, etc) are unlink finger print which can
    be used easily.

9
Identity Theft
  • Some criminals engage in
  • Shoulder surfing
  • Dumpster driving
  • Recently, the Internet has been the most
    appealing place for criminals to obtain
    identifying data such as Password, Banking
    information
  • Online Identity Theft
  • Phishing bogus website addresses in
    spam email

10
Identity Theft
  • Online Identity Theft
  • - Pharming
  • - Vishing Getting details through telephone
    calls
  • - Spoof Page voluntary giving out of
    information
  • - Keystroke Logging
  • - Screen Scrapers
  • Source Readers Digest

11
Identity Theft
  • In 1998 , Congress passed this law and made it as
    a federal crime subject to as many as 15 years
    imprisonment.
  • In 2006, according to the Central District Court
    of California
  • a man was indicted ,pleaded guilty to federal
    charges and was sentenced to 27 months for
    obtaining private bank account information about
    a insurance companys policy holders and using
    this information to deposits 764,000 in
    counterfeit checks into a bank account he
    established .

12
Identity Theft Prevention
  • Dont give your personal information unless you
    have reason to trust them
  • If you have a credit or debit card, check whether
    you have been receiving the list of transactions
    for the most recent month or reporting period
  • Maintain careful records of your banking and
    financial account

13
  • BREAK

14
Surveillance
  • The act of monitoring behaviour
  • Maybe covert or overt

15
Types of Surveillance
  • Clinical
  • Occurrences of infectious diseases
  • Computer
  • Spyware
  • Natural
  • Prevention of crime
  • Counter
  • Deleting a file
  • Government
  • Carnivore
  • Echelon Spy System
  • Inverse (also known as Sousveillance)
  • Source http//en.wikipedia.org/wiki/Surveillance

16
Sousveillance
  • The watched become the watcher

17
What is sousveillance?
  • Sous watching from below derived from a
    contrasting French word, sur - surveillance
    watching from above (Wikipedia, 2006)
  • Recording an activity by a participant in the
    activity
  • Originated from Steve Mann, a University of
    Toronto computer engineering professor famous for
    turning himself into a cyborg.

18
What is sousveillance?
  • Bringing the camera down to the human level
  • Physically cameras on people not building
  • Hierarchically ordinary citizen taking photos of
    police

19
Sousveillance Today?
  • Citizen journalism enable one to contribute
    ones voices and views to the worlds knowledge
  • Examples
  • Global Viral from ABC

20
Sousveillance Today?
  • Examples
  • Virtual China

21
Sousveillance Today?
  • Examples
  • - The Straits Times STOMP
  • - Hybrid
  • - We want STOMP to become a forum of lively
    discussions - whether the topics are weighty
    national issues or where to get the best bak chor
    mee."

Image from www.stomp.com.sg
22
Sousveillance Today?
  • Inverse Sousveillance hierarchical
    sousveillance
  • Examples
  • citizens photographing police abuse

Image http//www.takingitglobal.org/understanding
/socialjustice/abuseofpower
23
Why sousveillance?
  • To hold authorities to account
  • To gather evidence for friends involved in
    confrontations with officials
  • To give people a sense of control over the
    constant oversight that take place in the public
    spaces
  • To document ones life from ones perspective
  • Source New Scientist. (2006, June 24). Reed
    Business Information UK. Vol. 190. I.2557

24
How Sousveillance developed?
  • The development of portable digital personal
    gadgets
  • Camera phone
  • Electronic eyeglasses eyetap
  • The growth of gift economy

25
EyeTap Development Past
26
Development of EyeTap - Today
27
New Trends of Sousveillance
  • World Sousveillance Day
  • CARPE 2004

28
  • Presented by
  • Charlotte Ng
  • Liu Jia Wen, Carol
  • Nashrin Banu
  • Raihana Omar
  • Siti Zawiyah
  • Thu Ha Vo

29
(No Transcript)
30
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com