personally identifiable information (PII)
information about an individual that identifies, links, relates, or
describes them
what can be used to create knowledge about an individual
most digital technology needs some kind of PII to work
ex: street navigation needs to know your location or PII stored online to simplify making online purchases
once data is made digital, especially once its shared online, its easier or harder to control?
much harder to control
how does our private data power computing innnovations positively
legal and ethical concerns are raised by:
privacy policies
privacy policies: “control”
privacy policies: “not”
privacy policies: “such as”
what are ways to enhance privacy
what are burner emails?
An email account set up to temporarily receive messages and attachments when people do not want to divulge their primary email address
facial recognition technology
what are concerns and uses of facial recognition technology
supreme court ruling on cell phone data
phishing
a technique that attempts to trick a user into providing personal information. that personal information can then be used to access sensitive online resources, such as bank accounts and emails
keylogging
the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
malware
software intended to damage a computing system or to take partial control over its operation
rogue access point
a wireless access point that gives unauthorized access to secure networks
encryption
a process of encoding messages to keep them secret, so only “authorized” parties can read it
decryption
a process that reverses encryption, taking a secret message and reproducing the original plain text
cipher
the generic term for a technique (or algorithm) that performs encryption
caesar’s cipher
a technique for encryption that shifts the alphabet by some number of characters
cracking encryption
when you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption