Privacy: Difference between revisions
Jump to navigation
Jump to search
(Created page with "{{ClassCalendar}} '''April 23''' A persistent fear throughout all of the Internet’s operation is the Internet’s treatment of a person’s own privacy. We have a hard eno...") |
No edit summary |
||
Line 17: | Line 17: | ||
* [http://www.zephoria.org/thoughts/archives/2011/11/01/parents-survey-coppa.html danah boyd, Why Parents Help Children Violate Facebook’s 13+ Rule] | * [http://www.zephoria.org/thoughts/archives/2011/11/01/parents-survey-coppa.html danah boyd, Why Parents Help Children Violate Facebook’s 13+ Rule] | ||
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, ''Code 2.0'' (Chapter 7)] (read “Solutions” through “Rules to | * [https://www.socialtext.net/codev2/privacy Lawrence Lessig, ''Code 2.0'' (Chapter 7)] (read “Solutions” through “Rules to Enable Choice About Privacy”) | ||
Enable Choice About Privacy”) | |||
* [http://iheid.revues.org/321 Johannes Köppel, The International Dimension of the SWIFT Affair] | * [http://iheid.revues.org/321 Johannes Köppel, The International Dimension of the SWIFT Affair] | ||
Line 32: | Line 31: | ||
* [http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html Chris Soghoian, 8 Million Reasons for Real Surveillance Oversight] | * [http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html Chris Soghoian, 8 Million Reasons for Real Surveillance Oversight] | ||
* [http://arxiv.org/pdf/cs/0610105v2.pdf Arvind Narayanan and Vitaly Shmatikov, Robust De-anonymization of Large | * [http://arxiv.org/pdf/cs/0610105v2.pdf Arvind Narayanan and Vitaly Shmatikov, Robust De-anonymization of Large Datasets (How to Break Anonymity of the Netflix Prize Dataset) (''Arxiv'')] | ||
Datasets (How to Break Anonymity of the Netflix Prize Dataset) (''Arxiv'')] | |||
* [https://www.nytimes.com/2011/03/26/business/media/26privacy.html?_r=0 Noam Cohen, It’s Tracking Your Every Move and You May Not | * [https://www.nytimes.com/2011/03/26/business/media/26privacy.html?_r=0 Noam Cohen, It’s Tracking Your Every Move and You May Not Even Know It (''New York Times'')] | ||
Even Know It (''New York Times'')] | |||
</onlyinclude> | </onlyinclude> |
Revision as of 07:17, 22 January 2013
April 23
A persistent fear throughout all of the Internet’s operation is the Internet’s treatment of a person’s own privacy. We have a hard enough time defining the term, much less determining what role it should play in deciding the whos, whats, and hows of Internet governance. Nevertheless, the Internet’s present evolution indicates that unless we spend time contemplating the reinforcing privacy online it way succumb to the interests of profitability, online behavior regulation, cybersecurity, and law enforcement. Today’s class will set a framework for classifying privacy issues and explore how these issues play out in online spaces.
Readings
- Hal Abelson, Ken Ledeen, and Harry Lewis, Blown to Bits (Chapter 2) (focus on pages 36-42: “Why We Lost Our Privacy, Or Gave it All Away”)
- Lawrence Lessig, Code 2.0 (Chapter 7) (read “Solutions” through “Rules to Enable Choice About Privacy”)
Optional Readings
Videos Watched in Class
Links
Class Discussion
Please remember to sign your postings by adding four tildes (~~~~) to the end of your contribution. This will automatically add your username and the date/time of your post, like so: Asellars 15:29, 21 January 2013 (EST)