You are on page 1of 35

BEING WATCHED.ETHICAL ISSUES ON PRIVACY IN LIFE.

GROUP MEMBERS :
FAKRUL RADZI AB RAHIM-1111113620 HAZMI IRFAN BIN ZAINAL ARIFFIN-1111113485 MOHD IZHAM BIN PADELI-1111114357 MOHAMED IRMAN BIN AHMAD NAWAWI-1111113417 AHMAD ASYRAF BIN SHAARI-1111114369

OVERVIEW OF THE STUDY


y Advance in technology has raise public concern of y y

invasion of personal privacy. Privacy concerns exacerbate by cyber technology. People have different interpretations on what they regard as private, and when/where that privacy is jeopardized or invaded. This research highlights some of the existing and emerging technologies and their implication on privacy. Biometrics system, credit card, mobile phones, social network and surveillance.

OBJECTIVE
y To evaluate the impacts of technology on the

protection of individual privacy. y To examine the technological trends that responsible for exacerbating privacy issues. y To suggest individual on how to protect their information from getting into the bad hands.

PROBLEM OF THE STUDY


y What are the ethical issues related to privacy and

human rights rises from advancement of technology? y How bad these issues can affects the individuals? y How many of us aware of the privacy issues that rise from technology has affected their lives? y How effective the existing security measure which employed by the professionals or organizations who collect public information?

SUMMARY LITERATURE REVIEW

Biometrics System
What is biometric system? A system that verify identity of a person based on his/her physical characteristics. Eg. Fingerprint,face,voice,DNA and etc. Have been used by government and many organizations for

many purposes.

facial recognition is used in airports, fingerprint to restrict access to

office, voice used for validating bank transaction over the phone.

Undeniably a successful security system but in the meantime, it

posses extremely serious implications for human rights towards privacy. There are two main issues arise from this system
Manipulation of information database Government surveillance

Manipulation of Information Database


Capable of distinguishing every single person on earth

because the unique human identity used in biometric system. The stores biometric data creates potential for personal information from different sources to be linked together (data mining) to form a detailed personal profile about that individual, without concern. Enables a person to be pinpointed, tracked and tagged.

Case Study-facial recognition and data matching.


Carnegie Mellon University researchers released a study detailing three experiments that reveal the possibility of identifying people, both online and in the real world, who may otherwise believe they are anonymous. The researchers took photos of people walking on campus and used facial recognition technology and information publicly available online to figure out their name, age, place of birth and, in some cases, even their Social Security number. Many individuals share a tremendous amount of information about themselves online, and the study demonstrates how easy it is to link this online information to a person using facial recognition technology.
(Amber Yoo, Facial Recognition: A Top Privacy Issue of Our Time , Aug 2011)

Government Surveillance
y Government posses huge power to control information

in the centralized database. y Enable them to keep track and record every citizen. y Huge pool of stored information increase potential to abuse power and information. y The fact that an individual knows the government controls his personal information and can monitor him at any time create a state of constant fear and distrust.

Case Study- US/Mexico Border Crossing Card (BCC).


y The United States has issued over four million new machine-readable

biometric Border Crossing Cards (BCCs) also called "laser visas," to Mexican citizens for the purpose of multiple short trips to the US. The new "laser visa" shows the cardholder's name, photo, and fingerprint on the front, but the back of the new card has a mirror-like optical stripe. Embedded in the optical stripe is the person's biographical data, digital photo, fingerprints, and a control number. These data are matched against images of suspected criminals and terrorist in the centralize database. Many groups and individuals, from all parts of the political spectrum, have expressed concerns over the privacy implications of a possible BCC card. However, the discussion appears stuck in an abstract consideration of security/privacy tradeoffs.

(Andrew Schulman, The US/Mexico Border Crossing Card (BCC): A Case Study in Biometric, Machine-Readable ID , April 2002)

Credit card
y Personal identity information is stored in a

number of different places including small and large corporation. y Small plastic issued to users as a system of payment. y Information such as your email and what you buy on that specific date is stored in the company database. y Information are static and reusable everywhere. y Data mining.

MOBILE
y The mobile threat model includes three types of

threats: y malware, grayware, and personal spyware. y We distinguish between the three based on their delivery method, legality, and notice to the user

MOBILE
yMalware
o Malware gains access to a device for the purpose of

stealing data, damaging the device, or annoying the user, etc. The attacker defrauds the user into installing the malicious application or gains unauthorized remote access by taking advantage of a device vulnerability. o Malware provides no legal notice to the acted user. This threat includes Trojans, worms,botnets, and viruses.

MOBILE
y Personal Spyware o Spyware collects personal information such as location

or text message history over a period of time. o With personal spyware, the attacker has physical access to the device and installs the software without the user's knowledge. o Personal spyware sends the victim's information to the person who installed the application onto the victim's device, rather than to the author of the application. For example, a person might install personal spyware onto a spouse's phone

MOBILE
y Grayware
o Some legitimate applications collect user data for the purpose of marketing or user profiling. o Grayware spies on users, but the companies that distribute grayware do not aim to harm users. o Pieces of grayware provide real functionality and value to the users. The companies that distribute grayware may disclose their collection habits in their privacy policies, with varying degrees of clarity. o Grayware sits at the edge of legality; its behavior may be legal or illegal depending on the jurisdiction of the complaint and the wording of its privacy policy.

SURVEILLANCE
Hard evidence and a sense of security Invasion of privacy laws

SURVEILLANCE
y Privacy in the workplace o Privacy laws :- to protect. o Invasion of privacy :-

-Unaware of being taped. -Private places such as restrooms.

SURVEILLANCE
y Breaches of Privacy o Deception - Lies the location of surveillance devices

(misleading). o Violation of confidentiality - Information to be kept off public eyes example: Interview tape. o Intrusive(Secret) Monitoring Monitored unknowingly. o Intrusions on private life Monitored off-word doings.

SURVEILLANCE
y When do video surveillance is permitted? o Assumed to be involved in illegal deeds . o Attain consent from the relevant authorities . o Security purposes

Facial Recognition Biometrics


y The 2001 Superbowl in Tampa, Florida:y Capable to identify individuals whose faces(Criminals)

are captured on videotape.


y Camera surveillance scans using biometric technology.

Social Network
y Involving the unwanted access of private

information such as identity theft (stealing user s photograph). y Give stalker to stalking users on social networking sites. (Reading and watching user s profile). y Sexual predators hide their identity to befriend the prey. y Unintentional fame that embarrass someone by posting something in internet (video, photograph or words).

DESCRIPTION OF CHOICE OF METHODS(SURVEY)


y In total we have 40 participants. y Age between 18-25. y Participants within Multimedia University.

DATA FINDING

RESULT

RESULT

RESULT

RESULT

RESULT

Participant

Social Network

Topic

RESULT

RESULT

DISCUSSION
y Each state has different privacy regulations and laws

and you should contact your state department of labour to find out the privacy rights in the workplace that apply to your office.

Discussion
y Refrain from giving out your personal information on

social networks y Each state has different privacy regulations and laws and you should contact your state department of labour to find out the privacy rights in the workplace that apply to your office.

Discussion
y According to Symatec, an individual full identity can

be bought for only $1-$15. y Refrain from downloading unknown source apps , Only the official source. y The restrictions of the cellular tradition are not malicious but are done to provide stability to the cellular network and maintain a stable service experience.

Discussion
y Know your rights in privacy law for Biometrics Facial

Recognition . y Who much privacy does the citizen willing to sacrifice for public safety? y A subject on cybertechnology-safety should be implemented on secondary education .

You might also like