80 likes | 175 Vues
Final Presentation CS408-03. By: Brittany Roy. My Book. Title: Privacy Lost: How Technology Is Endangering Your Privacy Author: David H. Holtzman Year Published: 2006. Overview. Topics discussed in book Identity Theft No-Fly list Strategies for resisting privacy violations.
E N D
Final PresentationCS408-03 By: Brittany Roy
My Book • Title: • Privacy Lost: How Technology Is Endangering Your Privacy • Author: • David H. Holtzman • Year Published: • 2006
Overview • Topics discussed in book • Identity Theft • No-Fly list • Strategies for resisting privacy violations
Identity Theft • Most common information stolen is SSNs and mother’s maiden names • SSNs are important to one’s identity but are poorly protected • Marketing companies are guilty of buying information (ex. Doctors offices) • Example in book: Military would contact students asking for them to enlist
No-fly list • Made after 9/11 • Not made public • You don’t know why you are put on the list • ACLU (American Civil Liberties Union) sued the TSA to find out how many people were on the list • Caused a lot of problems
Strategies • Best strategy is to minimize the amount of private information you give out • The Ignorer: • Pretend there is no problem • The Avoider: • Duck situations when needing to give information • The Deceiver: • Strategic liars, give the wrong information • The Curmudgeon: • Cranky complainers who refuse to give out info. • The Vigilante: • Take matters into their own hands
Topic Applies • We discussed privacy in Chapter 2 of the Gift of Fire • Identity Theft • Giving out information
Recommend? • Yes, if you are interested in learning a lot more about Privacy. • You can learn a lot from this book if you are looking for ways to avoid giving out your information.