Privacy Policy, Law and Technology Course Overview Conceptions of Privacy

About This Presentation
Title:

Privacy Policy, Law and Technology Course Overview Conceptions of Privacy

Description:

Britney Spears: 'We just need privacy' ... Britney Spears. 15 June 2006. NBC Dateline. http://www.cnn.com/2006/SHOWBIZ/Music/06/15/people.spears.reut/index.html ... –

Number of Views:194
Avg rating:3.0/5.0
Slides: 29
Provided by: lorrie2
Learn more at: http://cups.cs.cmu.edu
Category:

less

Transcript and Presenter's Notes

Title: Privacy Policy, Law and Technology Course Overview Conceptions of Privacy


1
Privacy Policy, Law and TechnologyCourse
OverviewConceptions of Privacy
  • August 26 and 28, 2008

2
08-533 / 08-733 / 19-608 / 95-818 Privacy
Policy, Law andTechnology Fall
2008 Tuesday/Thursday 3-420 pm Instructor
Lorrie Cranor How can we preserve our privacy
in an increasingly digital world? This course
provides an in-depth look into privacy, privacy
laws, and privacy-related technologies and
self-regulatory efforts. Students will study
privacy from philosophical, historical, legal,
policy, and technical perspectives and learn how
to engineer systems for privacy.
Only a goldfish can live without privacy
http//cups.cs.cmu.edu/courses/privpolawtech.html
3
Introductions
  • About me
  • About you
  • Name
  • Where are you from?
  • What program are you in?
  • Why are you takingthis class
  • Make a name tag

EPP
4
Syllabus
  • http//cups.cs.cmu.edu/courses/privpolawtech-fa08
    /

5
Course number
  • Course is cross-listed as 8-533 / 8-733 / 19-608
    / 95-818
  • 8-733,19-608, and 95-818 are 12 units
  • 8-533 is 9 units
  • Please check which number you are signed up for
    and switch if necessary

6
Cheating will not be tolerated
  • You must do your own homework
  • It is acceptable to discuss the reading
    assignments and general approaches to solving
    homework problems with your classmates
  • It is not acceptable to discuss detailed homework
    answers or to copy homework answers from other
    students
  • Hopefully you already knew this.

7
Homework 1
  • All homework assignments will be linked from
    course web site
  • http//cups.cs.cmu.edu/courses/privpolawtech-fa08/
    hw/hw1.html
  • Due September 4

8
Course Preview Picture Tour
9
What is privacy? What does privacy mean to you?
10
Discussion questions
  • What does privacy mean to you?
  • How would you define privacy?
  • What does it meant to you for something to be
    private?
  • How has your privacy been invaded?
  • Describe an incident in which your privacy was
    invaded by a friend or family member
  • Describe an incident in which your privacy was
    invaded by a stranger
  • Describe an incident in which your privacy was
    invaded by an institution
  • What is the funniest invasion of privacy that
    ever happened to you or someone you know?

11
Discussion questions
  • Should everything be private all the time?
  • Should everyone have an absolute right to control
    what information about them is private?
  • What are the costs of privacy?
  • Personal costs?
  • Societal costs?

12
Nothing to hide?
  • What is the nothing to hide argument?
  • How is it used to argue for limited privacy
    rights?
  • What counter-arguments are there?
  • Solove, Daniel J., "'I've Got Nothing to Hide'
    and Other Misunderstandings of Privacy" . San
    Diego Law Review, Vol. 44, 2007 Available at
    SSRN http//ssrn.com/abstract998565
  • Privacys functionis not to protect the
    presumptively innocent from true but damaging
    information, but rather to protect the actually
    innocent from damaging conclusions drawn from
    misunderstood information. -- Lawrence Lessig,
    Privacy and Attention Span 2001

13
Britney Spears We just need privacy
  • You have to realize that we're people and that
    we need, we just need privacy and we need our
    respect, and those are things that you have to
    have as a human being.
  • Britney Spears15 June 2006NBC Dateline

http//www.cnn.com/2006/SHOWBIZ/Music/06/15/people
.spears.reut/index.html
14
Only a goldfish can live without privacy
Is this true? Can humans live without privacy?
15
Avoiding Plagiarism
16
CMU Policy on Cheating and Plagiarism
  • CMU Policy
  • Plagiarism includes, but is not limited to,
    failure to indicate the source with quotation
    marks or footnotes where appropriate if any of
    the following are reproduced in the work
    submitted by a student
  • A phrase, written or musical.
  • A graphic element.
  • A proof.
  • Specific language.
  • An idea derived from the work, published or
    unpublished, of another person.
  • http//www.cmu.edu/policies/documents/Cheating.ht
    ml

17
This is serious
  • Consequences of plagiarism in this class range
    from zero credit for entire assignment to failing
    the course to recommendation of university
    disciplinary action
  • Publishers and professional societies have
    plagiarism policies too
  • The Internet makes it easy to plagiarize
  • Students are frequently cutting and pasting off
    the Internet without proper quotation and/or
    citations
  • Students are buying papers off the Internet
  • The Internet also makes it easy to catch
    plagiarism

18
Avoiding plagiarism
  • If you use someones specific words, put them in
    quotes and cite the source
  • If you use someones ideas expressed in your own
    words, cite the source
  • If you paraphrase, summarize in your own words,
    but still cite source
  • Dont use same sentence structure with a few word
    substitutions
  • If you use some of the sources words, put them
    in quotes
  • When in doubt, put it in quotes and cite the
    source!

19
Good resources on avoiding plagiarism
  • See list on course website athttp//cups.cs.cmu.ed
    u/courses/privpolawtech-fa08/skills.html

20
Creating a Bibliography and Citing Sources
21
Creating a bibliography and citing sources
  • Do you know how to create a properly formatted
    bibliography?
  • Why is a list of URLs not a proper bibliography?

22
Citing sources
  • Whenever you take words, images, or ideas from
    another source you need to cite that source
  • Direct quotes and paraphrases
  • Images, photographs, tables, graphs
  • Ideas, measurements, computations
  • Also use citations as evidence to back up
    assertions
  • If you use somebody elses words, you must quote
    them
  • Short excerpts appear in quotes
  • Long excerpts (3 or more lines) are introduced
    and then appear as indented text, often in a
    smaller font, single spaced
  • If you leave out words in the middle use
  • If you leave out words at the end use .
  • If you substitute or add words, put them in
    square brackets
  • If you add italics say emphasis added
  • Failure to cite sources plagiarism

23
Paraphrasing
  • Usually paraphrasing ideas is preferable to
    quoting unless
  • Exact wording is important
  • You are quoting famous words
  • You are critiquing or comparing specific words
    rather than ideas
  • The original words say what you want to say very
    well and succinctly
  • Usually paraphrasing lets you convey an idea more
    succinctly because you can focus on the part of
    the idea most relevant to your paper
  • If you end up using some of the original words in
    your paraphrase, use quotes around those words

24
Forms of citation
  • Full bibliographic citation inline
  • Typically used on a slide
  • Footnote or endnote
  • Used in legal writing, many books, some
    conferences and journals
  • Inline short citation with bibliography,
    references cited section, or reference list
  • Used by most technical conferences and journals,
    some books, most dissertations

25
Citations in text
  • Format depends on style you are using
  • Usually a number or author and date, sometimes a
    page number reference too
  • Citation usually goes at the end of the sentence
  • Privacy is not absolute, (Westin 1967).
  • Privacy is not absolute, 3.
  • If Author is mentioned, in sentence, name does
    not appear in citation
  • Westin (1967, p. 7) claims that individuals must
    balance a desire for privacy with a desire to
    participate in society.
  • Multiple citations can appear together
  • 3, 4, 5
  • (Westin 1967 Cranor 2002)

26
Footnotes
  • Used heavily in legal writing
  • Usually used sparingly in technical writing
  • Each footnote appears only once
  • If you reference the same source multiple times
    you must repeat the reference information,
    however you can abbreviate it on second and
    subsequent references and use ibid to indicate
    same as previous reference

27
Creating a bibliography
  • Similar rules apply to other forms of citation
    (footnotes, etc.)
  • Pick an appropriate style and use it consistently
    throughout your paper
  • Most conferences and journals have style
    requirements
  • Popular styles Chicago/Turabian, MLA, APA, APSA,
    ACM, IEEE
  • Complete bibliographic entry includes author,
    title, date, publisher, place of publication,
    pages, volume number, etc.
  • Bibliographic entries should be ordered - usually
    either alphabetically or in order referenced in
    the text

28
Word processing tools
  • Microsoft Word
  • Word has built in support for footnotes and
    endnotes
  • Use cross reference feature for numbered
    reference lists
  • Third party bibliographic add-ons may be useful
  • Latest version of Word has built-in bibliography
    support
  • LaTeX
  • Built in support for footnotes and endnotes
  • Use Bibtex!
Write a Comment
User Comments (0)
About PowerShow.com