Identity and PrivacyIdentity and Privacy
How important is identity online?How important is identity online?• Can you connect identity online with Can you connect identity online with
face to face identity?face to face identity? How do you define identity online?How do you define identity online?
Online Identity Online Identity
Most individuals have multiple Most individuals have multiple identities online.identities online.
Our online identities identify us Our online identities identify us within a specific context.within a specific context.• Passwords are about securing a specific Passwords are about securing a specific
identity.identity.
Online IdentityOnline Identity
Does online identity go in two Does online identity go in two directions?directions?• Who we are Who we are • Who we are communicating withWho we are communicating with
Online IdentityOnline Identity
How important is it to secure a How important is it to secure a specific online identity?specific online identity?
What elements are important within What elements are important within the context of our online identity?the context of our online identity?• Examples age, credit card numberExamples age, credit card number
To what lengths would you go To what lengths would you go through to secure your online through to secure your online identify?identify?
Online IdentityOnline Identity
Other types of online identity.Other types of online identity.• Virtual identity; not connected to live Virtual identity; not connected to live
person but consistent within the person but consistent within the context.context.
• Anonymous identity; not connected and Anonymous identity; not connected and not consistent.not consistent.
Online IdentityOnline Identity
How important is anonymous identity How important is anonymous identity to empowerment?to empowerment?
Does anonymous identity cause Does anonymous identity cause issues?issues?
PrivacyPrivacy
How is privacy defined?How is privacy defined?• The right to be left alone.The right to be left alone.• The right to control information about The right to control information about
you.you.• The right not to invade one’s space.The right not to invade one’s space.
PrivacyPrivacy
Traditional notions of privacy are Traditional notions of privacy are based on the idea of trespass.based on the idea of trespass.
Protections against government Protections against government intrusions into your space.intrusions into your space.• Fourth AmendmentFourth Amendment• Reasonable expectation of privacy.Reasonable expectation of privacy.
TelephoneTelephone GarbageGarbage Hair cutHair cut
PrivacyPrivacy
What protects one against intrusions What protects one against intrusions of other individuals?of other individuals?• Laws against trespassLaws against trespass
PrivacyPrivacy
What is your expectation of privacy?What is your expectation of privacy? Is that expectation reasonable?Is that expectation reasonable?
PrivacyPrivacy
What do we expose online?What do we expose online?• Our financial dataOur financial data• Our locationOur location• Our friends, likes, purchasesOur friends, likes, purchases• Our interestsOur interests
On what do we base our expectation On what do we base our expectation of privacy?of privacy?
Hasn’t much of this data been Hasn’t much of this data been exposed without being online?exposed without being online?
PrivacyPrivacy
While much of that data is exposed online, While much of that data is exposed online, mobile technology has allowed us to take mobile technology has allowed us to take data that was protected in our homes and data that was protected in our homes and offices out in public.offices out in public.
Once in public do we have the same Once in public do we have the same expectation of privacy?expectation of privacy?• Police searches of cell phones.Police searches of cell phones.• Private searches of cell phones.Private searches of cell phones.
If I read your email/text messages on a phone you If I read your email/text messages on a phone you left on your desk, but do not take the phone what left on your desk, but do not take the phone what crime have I committed? crime have I committed?
PrivacyPrivacy
Much of the data that we expect to Much of the data that we expect to be private is no longer only kept in be private is no longer only kept in our homes and offices where the our homes and offices where the laws of trespass provides a degree of laws of trespass provides a degree of protection.protection.• Data on smart phonesData on smart phones• Digital camerasDigital cameras• LaptopsLaptops
PrivacyPrivacy
What is different is that without What is different is that without technology much of what we expose technology much of what we expose is useless.is useless.
Technology provides:Technology provides:• The ability to capture vast amounts of The ability to capture vast amounts of
datadata• The ability to store vast amounts of dataThe ability to store vast amounts of data• The ability to analyze that dataThe ability to analyze that data
PrivacyPrivacy
Beside online intrusions technology Beside online intrusions technology provides:provides:• Cameras, stop light camerasCameras, stop light cameras• DNA scanningDNA scanning• GPS trackingGPS tracking
When we are in public to we have an When we are in public to we have an expectation to privacy or to be expectation to privacy or to be anonymous? anonymous?
PrivacyPrivacy
When does data or information that is When does data or information that is publicly available without any expectation publicly available without any expectation of privacy become an invasion of privacy?of privacy become an invasion of privacy?• What we buyWhat we buy• Where we goWhere we go
When was the last time you went to store When was the last time you went to store and had to agree to terms of service that and had to agree to terms of service that contains a privacy policy?contains a privacy policy?
PrivacyPrivacy
With the ability to process vast With the ability to process vast amounts of data, individual pieces of amounts of data, individual pieces of data become much more valuable.data become much more valuable.
With increased value comes a desire With increased value comes a desire to collect more and more to collect more and more information.information.
PrivacyPrivacy
Do different generations have Do different generations have different expectations of privacy?different expectations of privacy?• Can you identity the reasons behind the Can you identity the reasons behind the
differences?differences? Should we just get over the lack of Should we just get over the lack of
privacy?privacy?
Unit Test ReviewUnit Test Review
EmpowermentEmpowerment• What does it mean?What does it mean?• What has been accomplished?What has been accomplished?• How can it be used responsibly?How can it be used responsibly?
Net neutrality Net neutrality • What does it mean?What does it mean?• How might it affect you?How might it affect you?
Unit Test ReviewUnit Test Review
Social Network User’s Bill of RightsSocial Network User’s Bill of Rights• What is it?What is it?• Is it important?Is it important?• Why might there be different views on Why might there be different views on
it’s importance?it’s importance?
Unit Test ReviewUnit Test Review
Access to the internet as a basic Access to the internet as a basic human right.human right.• Why do many people believe it is a basic Why do many people believe it is a basic
human right?human right?• What are the issues in making it a basic What are the issues in making it a basic
human right?human right?
Unit Test ReviewUnit Test Review
The Cyber PersonalityThe Cyber Personality• What changes in personality and What changes in personality and
behavior occur when one is online?behavior occur when one is online?• Do the changes continue when one is no Do the changes continue when one is no
longer online?longer online?
Unit Test ReviewUnit Test Review
Social InteractionSocial Interaction• The use of Technology and Social Media The use of Technology and Social Media
have caused changes in the way we have caused changes in the way we interact. What are those changes and interact. What are those changes and what impact have they had on social what impact have they had on social relationships?relationships?
Unit Test ReviewUnit Test Review
Online IdentityOnline Identity• What are the elements that make up our What are the elements that make up our
on line identity?on line identity? Does our online identity revile our total or Does our online identity revile our total or
true self?true self? Are people honest in displaying their online Are people honest in displaying their online
self?self?
• What are the benefits and issues with What are the benefits and issues with being anonymous online?being anonymous online?
Unit Test ReviewUnit Test Review
PrivacyPrivacy• How does technology impact our How does technology impact our
expectation of privacy?expectation of privacy?• What makes data that is public What makes data that is public
information feel like an invasion of our information feel like an invasion of our privacy?privacy?
• Is it really about privacy or being Is it really about privacy or being anonymous? anonymous?