CMN 140 Lecture 10: CMN 140 - Lecture 10

22 views4 pages
8 Mar 2017
School
Department
Course
Lecture 10 - 2/16 - Privacy - Chapter 16
Issue = the changes in media technologies have made it easier for marketers,
governments, & criminals to invade your privacy
- privacy = secluding of personal information by individuals about themselves
1) certain bits of information that belong to an individual should be kept private &
not shared with others
2) individual should have control over the sharing of this information & that if
another person/org takes control of an individual's personal information without the
individual's permission, that is an invasion of his or her privacy
3) privacy is a variable condition: a person might want to share some bits of
information with some ppl but not with others
4) when we set boundaries around our personal information, we expect ppl to
respect those boundaries
- businesses frequently collect all kinds of information on you & sell it behidn your back
to other businesses
- the issue of privacy is essentially the competition between threats and protections
- the threats come from criminals (hackers identity thieves, virus dessiminators)
- the protections come from consumer groups that push legislators to enact laws
protecting privacy
Criminal Threats to your Privacy
1. Stealing Private Information
a. Spyware is a small program that you inadvertently download into your computer,
which records keystrokes, sites visited & even personal information such as credit card
numbers, e-mail address, passwords, etc.
b. Phishing is a technique used to acquire sensitive inofrmation form unaware users
by seemingly trustworhy message snders
i.Carried out by email or instant messaging and almost identical to the legitimate that its
pretending to be (Ex: Security officer at ur bank wants u to increase security on ur
account for no charge)
c. Hacking is a set of computer programming techniques used to break through
“secure” data bases
2. Stealing One’s Identity
. If someone gains access to your name, date of birth and SSN they can steal your
identity
.Identity thieves ruined individual’s credit
1. Approximately 85% of victims of identity theft found out
about the crimes due to an adverse situation (denied
credit/employment, notification by police or collection
agency, receipt of credit cards or bills never ordered, and
so on)
2. Criminals can now buy verified credit card numbers for as
little as $1 takes a long time to recover from identity
theft
3. Each year in the US, 10 million ppl become victims of
identity theft
3. Hijacking
. Another invasion of privacy is when your computer is hijacked & used by hackers
without your permission & often without your knowledge
a. Bot network activity: Hijackers use botnets to allow spammers to send out
messages under your IP address(takinlg control of ur computer and linking up with
others)
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows page 1 of the document.
Unlock all 4 pages and 3 million more documents.

Already have an account? Log in

Get OneClass Notes+

Unlimited access to class notes and textbook notes.

YearlyBest Value
75% OFF
$8 USD/m
Monthly
$30 USD/m
You will be charged $96 USD upfront and auto renewed at the end of each cycle. You may cancel anytime under Payment Settings. For more information, see our Terms and Privacy.
Payments are encrypted using 256-bit SSL. Powered by Stripe.