ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
COMM5110
NEW MEDIA POLICY
PRIVACY AND SECURITY
AGENDA
> fyi and recap
> discuss privacy
> how to protect yourself
> class debate
FYI
> deadline second short paper: friday 5pm
RECAP (1/2)
> what is the internet? what makes it different?
> what is internet policy and regulation? why does it
matter?
> what drives regulation? and how does regulation
affect the internet?
RECAP (2/2)
> how to make a persuasive argument
> from multiple sides
> both in written and spoken form
watch greenwald on privacy
PRIVACY
> what is it and why is it important?
> how has internet changed it?
> how can we protect ourselves?
WHAT IS IT?
> privacy as the right to be left alone
> privacy as control of your information
> privacy as contextual integrity (nissenbaum)
> privacy not as one definition but multiple related
concepts (solove)
2016 comm5110-week10
2016 comm5110-week10
HOW TO PROTECT YOURSELF
> why do we need to protect ourselves?
HOW TO PROTECT YOURSELF
> 2 step verification
> device encryption
> end-to-end encryption
> password manager
> google dashboard
2016 comm5110-week10
MOTION
China should continue to enforce the real name
registration system for social media.

More Related Content

2016 comm5110-week10

  • 2. AGENDA > fyi and recap > discuss privacy > how to protect yourself > class debate
  • 3. FYI > deadline second short paper: friday 5pm
  • 4. RECAP (1/2) > what is the internet? what makes it different? > what is internet policy and regulation? why does it matter? > what drives regulation? and how does regulation affect the internet?
  • 5. RECAP (2/2) > how to make a persuasive argument > from multiple sides > both in written and spoken form
  • 7. PRIVACY > what is it and why is it important? > how has internet changed it? > how can we protect ourselves?
  • 8. WHAT IS IT? > privacy as the right to be left alone > privacy as control of your information > privacy as contextual integrity (nissenbaum) > privacy not as one definition but multiple related concepts (solove)
  • 11. HOW TO PROTECT YOURSELF > why do we need to protect ourselves?
  • 12. HOW TO PROTECT YOURSELF > 2 step verification > device encryption > end-to-end encryption > password manager > google dashboard
  • 14. MOTION China should continue to enforce the real name registration system for social media.