0% found this document useful (0 votes)
5 views

Lecture 11

Uploaded by

Mohsin Rasheed
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Lecture 11

Uploaded by

Mohsin Rasheed
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

CSC410 - Professional

Practices in IT
Instructor Name : Sidra Nasir
Email : [email protected]
6/5/2020
Lecture -2

Privacy Risks and Principles

2
Topics Covered in this
Lecture
• Privacy key issues
• Role of identity thefts
• Key Data Thefts
Learning outcomes of this Lecture

• To understand the Key Privacy issues


• Role of Identity theft in Privacy.
• To know different types of Identity threats under new era.
Key Privacy Issues
• The rest of this lecture discusses a number of
current and important privacy issues, including:
⮚ Identity theft
⮚ Customer profiling
⮚ Need to treat customer data responsibly
⮚ Workplace monitoring
⮚ Spamming
⮚ Advanced surveillance techniques
Identity Theft
• Theft of key pieces of personal information to gain
access to a person’s financial accounts
• when someone steals key pieces of personal
information to impersonate a person
• Information includes:
 Name
 Address
 Date of birth
 Social Security number
 Passport number
 Driver’s license number
 Mother’s maiden name
Identity Theft
• Fastest growing form of fraud in the United States
• Lack of initiative in informing people whose data
was stolen
• Using this information, an identity thief may apply
for new credit or financial accounts, rent an
apartment, set up utility or phone service, and
register for college courses—all in someone else’s
name.
Identity theft
• Four approaches are frequently used by identity thieves
to capture the personal data of their victims:
1. Create a data breach to steal hundreds,
thousands, or even millions of personal records.
2. Purchase personal data from criminals.
3. Use phishing to entice users to willingly give up
personal data.
4. Install spyware capable of capturing the
keystrokes of victims
1: Data Breech
• An alarming number of identity theft incidents involve
breaches of large databases to gain personal identity
information.
• The breach may be caused by hackers breaking into
the database or, more often than one would suspect,
by carelessness or failure to follow proper security
procedures.
2: Purchase of Personal Data
• There is a black market in personal data.
• Credit card numbers can be purchased in bulk
quantity for as little as $.40 each, while the login
name and PIN necessary to access a bank account
can be had for just $10.36
• A full set of identity information including: date of
birth, address, Social Security number, and
telephone number—sells for between $1 and $15.37
3: Phishing
 Attempt to steal personal identity data
 By tricking users into entering information on a
counterfeit Web site
 Spear-phishing - a variation in which employees are
sent e-mails that look like they came from high-level
executives within their organization
4: Spyware
• Keystroke-logging software downloaded to users’
computers without the knowledge or consent of the user
 Enables the capture of:
 Account usernames
 Passwords
 Credit card numbers
 Other sensitive information
 Operates even if an infected computer is not connected
to the Internet
• Identity Theft and Assumption Deterrence Act of 1998 was
passed to fight fraud
E-mail Used by Phishers
Consumer Profiling
• Companies openly collect personal information about
Internet users when they register at Web sites,
complete surveys, fill out forms, or enter contests
online
• Cookies
 Text files that a Web site puts on a user’s hard drive
so that it can remember the information later
• Tracking software: to allow their Web sites to analyze
browsing habits and deduce personal interests and
preferences
• Similar methods are used outside the Web environment
• Databases contain a huge amount of consumer
behavioral data
Aggregating Consumer Data
• Large-scale marketing organizations such as DoubleClick
employ advertising networks to serve ads to thousands of
Web sites. When someone clicks on an ad at a company’s
Website, tracking information about the person is gathered
and forwarded to DoubleClick, which stores it in a large
database. This data includes a record of the ad on which
the person clicked and what the person bought.
• Affi liated Web sites
 Group of Web sites served by a single advertising
network
• Customized service for each consumer
Collecting Data from Websites
Visits
• Marketers use cookies to recognize return visitors to
their sites and to store useful information about
them.
• Types of data collected while surfing the Web
 GET data
 POST data
 Click-stream data
Collecting Data from
Websites Visits
• Four ways to limit or even stop the deposit of cookies on hard
drives
 Set the browser to limit or stop cookies
 Manually delete them from the hard drive
 Download and install a cookie-management program
 Use anonymous browsing programs that don’t accept
cookies
Personalization software
• Used by marketers to optimize the number,
frequency, and mixture of their ad placements
 Rules-based
 Collaborative filtering
 Demographic filtering
 Contextual commerce
• Platform for Privacy Preferences (P3P)
 screening technology
 Shields users from sites that don’t provide the
level of privacy protection desired
Consumer Profiling (continued)
• Rules-based personalization software uses
business rules tied to customer-supplied preferences
or online behavior to determine the most
appropriate page views and product information to
display when a user visits a Web site. Car rental
adds on holiday booking websites etc.
• Collaborative filtering offers consumer
recommendations based on the types of products
purchased by other people with similar buying
habits. Same type of story writers etc
Consumer Profiling (continued)
• Demographic filtering is another form of
personalization software. It augments clickstream
data and user-supplied data with demographic
information associated with user zip codes to make
product suggestions.
• Contextual commerce, associates product
promotions and other e-commerce offerings with
specific content a user may receive in a news story
online.
THE END

You might also like