Upload
muhammad-sulaiman
View
29
Download
0
Embed Size (px)
Citation preview
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
IntroductionIntroduction
Group Members:
14: M Ali Shirwany
72: M Ali
1
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
ContentsContents
Privacy
Copyrights
2
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 3
OutlineOutlineWhat is privacy?
Privacy laws and self-regulation
Privacy risks from personalization
Reducing privacy risks
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 4
What is privacy?What is privacy?
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 5
Hard to defineHard to define“Privacy is a value so complex, so entangled in competing and contradictory dimensions, so engorged with various and distinct meanings, that I sometimes despair whether it can be usefully addressed at all.”
Robert C. Post, Three Concepts of Privacy, 89 Geo. L.J. 2087 (2001).
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 6
Realizing limited access and controlRealizing limited access and controlLimited access
• Laws to prohibit or limit collection, disclosure, contact
• Technology to facilitate anonymous transactions, minimize disclosure
Control• Laws to mandate choice (opt-in/opt-out)• Technology to facilitate informed consent, keep
track of and enforce privacy preferences
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 7
Privacy laws and self-regulationPrivacy laws and self-regulation
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 8
Privacy policiesPrivacy policiesPolicies let consumers know about site’s
privacy practices
Consumers can then decide whether or not practices are acceptable, when to opt-in or opt-out, and who to do business with
The presence of privacy policies increases consumer trust
What are some problems with privacy policies?
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 9
Privacy policy problemsPrivacy policy problemsBUT policies are often
• difficult to understand • hard to find• take a long time to read• change without notice
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/ 10
Risks may be magnified in futureRisks may be magnified in futureWireless location tracking
Semantic web applications
Ubiquitous computing
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
WHAT IS COPYRIGHT?WHAT IS COPYRIGHT?
Copyright is a form of protection given to authors/creators of original works.
This property right can be sold or transferred to others.
11
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
COPYRIGHT LAWCOPYRIGHT LAW Copyright is a form of protection grounded in the
U.S. Constitution and granted by law for original works of authorship.
The current copyright law, the Copyright Act of 1976, is codified in Title 17 of the U.S. Code.
12
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
AUTHOR´S RIGHTSAUTHOR´S RIGHTS Copyright law assures ownership, which comes with several
rights, that the author has exclusively. For example:
• Make copies of the work
• Distribute copies of the work
• Perform the work publicly
• Display the work publicly
• Make derivative works
13
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
The law provides certain ways in which copyright works may be used without the need to first obtain permission from the copyright holder - these include:
• Fair use (e.g. to make copies)• Public domain• Library privilege• Copying for examinations and copying for instruction
14
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
COPYRIGHT PROTECTIONCOPYRIGHT PROTECTION Copyright covers both published and unpublished
works.
Copyright protection is automatic at the moment the work is created and fixed in a tangible form that it is perceptible
15
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
COPYRIGHTABLE WORKS COPYRIGHTABLE WORKS Literary works
Dramatic works
Musical works
Artistic works
16
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
NON-COPYRIGHTABLE WORKSNON-COPYRIGHTABLE WORKSNot everything is protected by copyright
law.
Copyright does not protect facts, ideas, systems, or methods of operation.
17
Usable Privacy and Security • Carnegie Mellon University • Spring 2008 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/ups.html/
Copyright VS. Patent and Copyright VS. Patent and TrademarkTrademark Copyright protects original works of authorship,
while a patent protects inventions or discoveries.
A trademark protects words, phrases, symbols, or designs identifying the source of the goods or services of one party and distinguishing them from those of others.
18