CMST 2LW3 Lecture Notes - Lecture 15: Computer Security, Human Computer, Social Theory

14 views2 pages

Document Summary

Pre-internet: preservation of privacy to sustain intimatee relationships with others. Privacy as surveillance of the bureaucratic state (foucault) Privacy as an extension of state limit on the seizure and search of property. Privacy laws as responses to technological developments (lindsay) What is privacy? it depends on the roles played by those who send and receive (information ow and whom the information is about) Depends on norms, negative (deny), or positive (allow) There is a realm of public information about persons to which no privacy norms apply. An aggregation of information doesn"t violate privacy if its parts, taken individually, do not. What is privacy: controlled by the individual, controlled by the collective. From privacy to con dentiality (not on the midterm: privacy as a component of security privacy often seen as a subset of security, security as a constraint on privacy.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents