CMST 2LW3 Lecture Notes - Lecture 15: Computer Security, Human Computer, Social Theory

14 views2 pages

Document Summary

Pre-internet: preservation of privacy to sustain intimatee relationships with others. Privacy as surveillance of the bureaucratic state (foucault) Privacy as an extension of state limit on the seizure and search of property. Privacy laws as responses to technological developments (lindsay) What is privacy? it depends on the roles played by those who send and receive (information ow and whom the information is about) Depends on norms, negative (deny), or positive (allow) There is a realm of public information about persons to which no privacy norms apply. An aggregation of information doesn"t violate privacy if its parts, taken individually, do not. What is privacy: controlled by the individual, controlled by the collective. From privacy to con dentiality (not on the midterm: privacy as a component of security privacy often seen as a subset of security, security as a constraint on privacy.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents