Title: Privacy Policy, Law and Technology Course Overview Conceptions of Privacy
1Privacy Policy, Law and TechnologyCourse
OverviewConceptions of Privacy
208-533 / 08-733 / 19-608 / 95-818 Privacy
Policy, Law andTechnology Fall
2008 Tuesday/Thursday 3-420 pm Instructor
Lorrie Cranor How can we preserve our privacy
in an increasingly digital world? This course
provides an in-depth look into privacy, privacy
laws, and privacy-related technologies and
self-regulatory efforts. Students will study
privacy from philosophical, historical, legal,
policy, and technical perspectives and learn how
to engineer systems for privacy.
Only a goldfish can live without privacy
http//cups.cs.cmu.edu/courses/privpolawtech.html
3Introductions
- About me
- About you
- Name
- Where are you from?
- What program are you in?
- Why are you takingthis class
- Make a name tag
EPP
4Syllabus
- http//cups.cs.cmu.edu/courses/privpolawtech-fa08
/
5Course number
- Course is cross-listed as 8-533 / 8-733 / 19-608
/ 95-818 - 8-733,19-608, and 95-818 are 12 units
- 8-533 is 9 units
- Please check which number you are signed up for
and switch if necessary
6Cheating will not be tolerated
- You must do your own homework
- It is acceptable to discuss the reading
assignments and general approaches to solving
homework problems with your classmates - It is not acceptable to discuss detailed homework
answers or to copy homework answers from other
students - Hopefully you already knew this.
7Homework 1
- All homework assignments will be linked from
course web site - http//cups.cs.cmu.edu/courses/privpolawtech-fa08/
hw/hw1.html - Due September 4
8Course Preview Picture Tour
9What is privacy? What does privacy mean to you?
10Discussion questions
- What does privacy mean to you?
- How would you define privacy?
- What does it meant to you for something to be
private? - How has your privacy been invaded?
- Describe an incident in which your privacy was
invaded by a friend or family member - Describe an incident in which your privacy was
invaded by a stranger - Describe an incident in which your privacy was
invaded by an institution - What is the funniest invasion of privacy that
ever happened to you or someone you know?
11Discussion questions
- Should everything be private all the time?
- Should everyone have an absolute right to control
what information about them is private? - What are the costs of privacy?
- Personal costs?
- Societal costs?
12Nothing to hide?
- What is the nothing to hide argument?
- How is it used to argue for limited privacy
rights? - What counter-arguments are there?
- Solove, Daniel J., "'I've Got Nothing to Hide'
and Other Misunderstandings of Privacy" . San
Diego Law Review, Vol. 44, 2007 Available at
SSRN http//ssrn.com/abstract998565 - Privacys functionis not to protect the
presumptively innocent from true but damaging
information, but rather to protect the actually
innocent from damaging conclusions drawn from
misunderstood information. -- Lawrence Lessig,
Privacy and Attention Span 2001
13Britney Spears We just need privacy
- You have to realize that we're people and that
we need, we just need privacy and we need our
respect, and those are things that you have to
have as a human being. - Britney Spears15 June 2006NBC Dateline
http//www.cnn.com/2006/SHOWBIZ/Music/06/15/people
.spears.reut/index.html
14 Only a goldfish can live without privacy
Is this true? Can humans live without privacy?
15Avoiding Plagiarism
16CMU Policy on Cheating and Plagiarism
- CMU Policy
- Plagiarism includes, but is not limited to,
failure to indicate the source with quotation
marks or footnotes where appropriate if any of
the following are reproduced in the work
submitted by a student - A phrase, written or musical.
- A graphic element.
- A proof.
- Specific language.
- An idea derived from the work, published or
unpublished, of another person. - http//www.cmu.edu/policies/documents/Cheating.ht
ml
17This is serious
- Consequences of plagiarism in this class range
from zero credit for entire assignment to failing
the course to recommendation of university
disciplinary action - Publishers and professional societies have
plagiarism policies too - The Internet makes it easy to plagiarize
- Students are frequently cutting and pasting off
the Internet without proper quotation and/or
citations - Students are buying papers off the Internet
- The Internet also makes it easy to catch
plagiarism
18Avoiding plagiarism
- If you use someones specific words, put them in
quotes and cite the source - If you use someones ideas expressed in your own
words, cite the source - If you paraphrase, summarize in your own words,
but still cite source - Dont use same sentence structure with a few word
substitutions - If you use some of the sources words, put them
in quotes - When in doubt, put it in quotes and cite the
source!
19Good resources on avoiding plagiarism
- See list on course website athttp//cups.cs.cmu.ed
u/courses/privpolawtech-fa08/skills.html
20Creating a Bibliography and Citing Sources
21Creating a bibliography and citing sources
- Do you know how to create a properly formatted
bibliography? - Why is a list of URLs not a proper bibliography?
22Citing sources
- Whenever you take words, images, or ideas from
another source you need to cite that source - Direct quotes and paraphrases
- Images, photographs, tables, graphs
- Ideas, measurements, computations
- Also use citations as evidence to back up
assertions - If you use somebody elses words, you must quote
them - Short excerpts appear in quotes
- Long excerpts (3 or more lines) are introduced
and then appear as indented text, often in a
smaller font, single spaced - If you leave out words in the middle use
- If you leave out words at the end use .
- If you substitute or add words, put them in
square brackets - If you add italics say emphasis added
- Failure to cite sources plagiarism
23Paraphrasing
- Usually paraphrasing ideas is preferable to
quoting unless - Exact wording is important
- You are quoting famous words
- You are critiquing or comparing specific words
rather than ideas - The original words say what you want to say very
well and succinctly - Usually paraphrasing lets you convey an idea more
succinctly because you can focus on the part of
the idea most relevant to your paper - If you end up using some of the original words in
your paraphrase, use quotes around those words
24Forms of citation
- Full bibliographic citation inline
- Typically used on a slide
- Footnote or endnote
- Used in legal writing, many books, some
conferences and journals - Inline short citation with bibliography,
references cited section, or reference list - Used by most technical conferences and journals,
some books, most dissertations
25Citations in text
- Format depends on style you are using
- Usually a number or author and date, sometimes a
page number reference too - Citation usually goes at the end of the sentence
- Privacy is not absolute, (Westin 1967).
- Privacy is not absolute, 3.
- If Author is mentioned, in sentence, name does
not appear in citation - Westin (1967, p. 7) claims that individuals must
balance a desire for privacy with a desire to
participate in society. - Multiple citations can appear together
- 3, 4, 5
- (Westin 1967 Cranor 2002)
26Footnotes
- Used heavily in legal writing
- Usually used sparingly in technical writing
- Each footnote appears only once
- If you reference the same source multiple times
you must repeat the reference information,
however you can abbreviate it on second and
subsequent references and use ibid to indicate
same as previous reference
27Creating a bibliography
- Similar rules apply to other forms of citation
(footnotes, etc.) - Pick an appropriate style and use it consistently
throughout your paper - Most conferences and journals have style
requirements - Popular styles Chicago/Turabian, MLA, APA, APSA,
ACM, IEEE - Complete bibliographic entry includes author,
title, date, publisher, place of publication,
pages, volume number, etc. - Bibliographic entries should be ordered - usually
either alphabetically or in order referenced in
the text
28Word processing tools
- Microsoft Word
- Word has built in support for footnotes and
endnotes - Use cross reference feature for numbered
reference lists - Third party bibliographic add-ons may be useful
- Latest version of Word has built-in bibliography
support - LaTeX
- Built in support for footnotes and endnotes
- Use Bibtex!