SlideShare a Scribd company logo
1 of 14
Impact on Emerging
Technologies
Privacy in Computing
Contents
• Radio Frequency Identification (RFID) – Object for tracking people
• Electronic Voting – Technologies to facilitate elections
• Voice over Internet Protocols – Voice Grade telephone calls
Our main concern with the privacy in computing, has affect the emerging technologies
will consider 3 technologies.
These are:
Radio Frequency
Identification
Privacy in Computing
What it is and what it does
• Radio frequency identification or RFID is a technology that uses small, low-power
wireless radio transmitters called RFID tags.
• Tags are tuned to a particular frequency and each has a unique ID number.
• When a tag receives its signal, it sends its ID number signal in response.
• Most of these devices are passive until they receive a signal from an interrogating
reader.
• The distance at which they can receive and broadcast a receivable signal varies from
roughly five centimeters at the least powerful end to several meters at the most
powerful end.
Uses
• toll plaza payments
• transit system fare cards
• stock or inventory labels
• passports and identity cards
Current uses of RFID tags include
Applications of RFID
• Consumer products
• shirt, shoes, pen, wallet, credit card, mobile phone, media player, and candy bar wrapper
• RFID Tags for Individuals
Security and Privacy
• the ability to track individuals wherever they go
• the ability to discern sensitive data about people.
• The correctness of the data obtained.
• The reading sensor may malfunction or the software processing IDs may
fail.
• Forgery of an RFID tag.
Electronic Voting
Privacy in Computing
Computer Voting
• Each voter's choices must be kept secret.
• Each voter may vote only once and only for allowed offices.
• The voting system must be tamperproof, and the election officials must be
prevented from allowing it to be tampered with.
• All votes must be reported accurately.
• The voting system must be available for use throughout the election period.
• An audit trail must be kept to detect irregularities in voting, but without disclosing
how any individual voted.
Properties essential to a fair election were enumerated as:
Privacy and the Process
• Counting ballots,
• building and maintaining the list of eligible voters,
• recording who has voted,
• supporting absentee ballots,
• assisting voters at the wrong polling place, and
• transmitting election results to election headquarters.
The Computer Science and Telecommunications Board of the National Academy of Science:
• individual privacy in voter registration, the privacy of individual voters, and public confidence in the process.
VoIP and Skype
Privacy in Computing
What it is and how it works
• Voice over IP (VoIP) is a protocol for transmission of voice-grade
telephone traffic over the Internet.
• The major VoIP carrier is Skype.
• To call from Chennai to Accra, for example, you would invoke the VoIP
application, giving it the telephone number in Accra. A local office in Accra
would call the number in Accra and patch that call to its Internet servers.
(The process is even easier if both endpoints use VoIP.)
Merit and Privacy
• cost
• the phone call will be somewhat exposed through packet headers.
Thank You

More Related Content

What's hot

K-Nearest Neighbor Classifier
K-Nearest Neighbor ClassifierK-Nearest Neighbor Classifier
K-Nearest Neighbor ClassifierNeha Kulkarni
 
Classification techniques in data mining
Classification techniques in data miningClassification techniques in data mining
Classification techniques in data miningKamal Acharya
 
Artificial Intelligence Notes Unit 1
Artificial Intelligence Notes Unit 1 Artificial Intelligence Notes Unit 1
Artificial Intelligence Notes Unit 1 DigiGurukul
 
Classification
ClassificationClassification
ClassificationCloudxLab
 
Creation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerCreation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerPalash Mehar
 
Neural Networks in Data Mining - “An Overview”
Neural Networks  in Data Mining -   “An Overview”Neural Networks  in Data Mining -   “An Overview”
Neural Networks in Data Mining - “An Overview”Dr.(Mrs).Gethsiyal Augasta
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication CodesDarshanPatil82
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key CryptosystemDevakumar Kp
 
Boolean,vector space retrieval Models
Boolean,vector space retrieval Models Boolean,vector space retrieval Models
Boolean,vector space retrieval Models Primya Tamil
 
Random Forest Algorithm - Random Forest Explained | Random Forest In Machine ...
Random Forest Algorithm - Random Forest Explained | Random Forest In Machine ...Random Forest Algorithm - Random Forest Explained | Random Forest In Machine ...
Random Forest Algorithm - Random Forest Explained | Random Forest In Machine ...Simplilearn
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash functionomarShiekh1
 
Birthday Paradox explained
Birthday Paradox explainedBirthday Paradox explained
Birthday Paradox explainedSajith Ekanayaka
 
Data Reduction
Data ReductionData Reduction
Data ReductionRajan Shah
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningRahul Jain
 
Machine learning and types
Machine learning and typesMachine learning and types
Machine learning and typesPadma Metta
 

What's hot (20)

K-Nearest Neighbor Classifier
K-Nearest Neighbor ClassifierK-Nearest Neighbor Classifier
K-Nearest Neighbor Classifier
 
Knn
KnnKnn
Knn
 
Classification techniques in data mining
Classification techniques in data miningClassification techniques in data mining
Classification techniques in data mining
 
Artificial Intelligence Notes Unit 1
Artificial Intelligence Notes Unit 1 Artificial Intelligence Notes Unit 1
Artificial Intelligence Notes Unit 1
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Classification
ClassificationClassification
Classification
 
Creation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using DigisignerCreation & Verification of Digital Signature using Digisigner
Creation & Verification of Digital Signature using Digisigner
 
Neural Networks in Data Mining - “An Overview”
Neural Networks  in Data Mining -   “An Overview”Neural Networks  in Data Mining -   “An Overview”
Neural Networks in Data Mining - “An Overview”
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Inverted index
Inverted indexInverted index
Inverted index
 
Boolean,vector space retrieval Models
Boolean,vector space retrieval Models Boolean,vector space retrieval Models
Boolean,vector space retrieval Models
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Random Forest Algorithm - Random Forest Explained | Random Forest In Machine ...
Random Forest Algorithm - Random Forest Explained | Random Forest In Machine ...Random Forest Algorithm - Random Forest Explained | Random Forest In Machine ...
Random Forest Algorithm - Random Forest Explained | Random Forest In Machine ...
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash function
 
Birthday Paradox explained
Birthday Paradox explainedBirthday Paradox explained
Birthday Paradox explained
 
Data Reduction
Data ReductionData Reduction
Data Reduction
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
Machine learning and types
Machine learning and typesMachine learning and types
Machine learning and types
 
Symbol Table
Symbol TableSymbol Table
Symbol Table
 

Viewers also liked

StuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuart Millar
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKTrilateral Research
 
Impact of CCTV on 'Right to Privacy'
Impact of CCTV on 'Right to Privacy'Impact of CCTV on 'Right to Privacy'
Impact of CCTV on 'Right to Privacy'SSoujanya
 
Impact of ict on privacy and personal data
Impact of ict on privacy and personal dataImpact of ict on privacy and personal data
Impact of ict on privacy and personal datamohd kamal
 
Robert beggs incident response teams - atlseccon2011
Robert beggs   incident response teams - atlseccon2011Robert beggs   incident response teams - atlseccon2011
Robert beggs incident response teams - atlseccon2011Atlantic Security Conference
 
Integrated Privacy Impact Assessment
Integrated Privacy Impact AssessmentIntegrated Privacy Impact Assessment
Integrated Privacy Impact AssessmentJeremy Hilton
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...Lilian Edwards
 
Trackment
TrackmentTrackment
Trackmentmeaannn
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyCharles Mok
 
Privacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataPrivacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataH. T. Besik
 
Privacy Impact Assessment Management System (PIAMS)
Privacy Impact Assessment Management System (PIAMS) Privacy Impact Assessment Management System (PIAMS)
Privacy Impact Assessment Management System (PIAMS) The Canton Group
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoTLAURA VIVET
 
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014Institut Lean France
 
Discover The Top 10 Types Of Colleagues Around You
Discover The Top 10 Types Of Colleagues Around YouDiscover The Top 10 Types Of Colleagues Around You
Discover The Top 10 Types Of Colleagues Around YouAnkur Tandon
 
31+ Startup Tools, Both Online & Offline
31+ Startup Tools, Both Online & Offline31+ Startup Tools, Both Online & Offline
31+ Startup Tools, Both Online & OfflinePixc
 

Viewers also liked (20)

Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011
 
StuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuartMillar_13616005_PIA
StuartMillar_13616005_PIA
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACK
 
Impact of CCTV on 'Right to Privacy'
Impact of CCTV on 'Right to Privacy'Impact of CCTV on 'Right to Privacy'
Impact of CCTV on 'Right to Privacy'
 
Impact of ict on privacy and personal data
Impact of ict on privacy and personal dataImpact of ict on privacy and personal data
Impact of ict on privacy and personal data
 
Robert beggs incident response teams - atlseccon2011
Robert beggs   incident response teams - atlseccon2011Robert beggs   incident response teams - atlseccon2011
Robert beggs incident response teams - atlseccon2011
 
Integrated Privacy Impact Assessment
Integrated Privacy Impact AssessmentIntegrated Privacy Impact Assessment
Integrated Privacy Impact Assessment
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
 
WRC Newsletter Feb 2013
WRC Newsletter Feb 2013WRC Newsletter Feb 2013
WRC Newsletter Feb 2013
 
Trackment
TrackmentTrackment
Trackment
 
opncc_certificate
opncc_certificateopncc_certificate
opncc_certificate
 
iTrack WP3 workshop
iTrack WP3 workshopiTrack WP3 workshop
iTrack WP3 workshop
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and Privacy
 
Privacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataPrivacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal Data
 
Privacy Impact Assessment Management System (PIAMS)
Privacy Impact Assessment Management System (PIAMS) Privacy Impact Assessment Management System (PIAMS)
Privacy Impact Assessment Management System (PIAMS)
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
 
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014
Lean Thinking in IT by Marie-Pia Ignace, Lean IT Summit 2014
 
Discover The Top 10 Types Of Colleagues Around You
Discover The Top 10 Types Of Colleagues Around YouDiscover The Top 10 Types Of Colleagues Around You
Discover The Top 10 Types Of Colleagues Around You
 
31+ Startup Tools, Both Online & Offline
31+ Startup Tools, Both Online & Offline31+ Startup Tools, Both Online & Offline
31+ Startup Tools, Both Online & Offline
 

Similar to Privacy in Computing - Impact on emerging technologies

Using RFID to Improve the Customer Experience and Generate Revenue
Using RFID to Improve the Customer Experience and Generate Revenue Using RFID to Improve the Customer Experience and Generate Revenue
Using RFID to Improve the Customer Experience and Generate Revenue Samuel Streicher
 
E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting TechnologyGautam Kumar
 
14224119 pss7
14224119 pss714224119 pss7
14224119 pss7Ng Fai
 
12201375 PSS7
12201375 PSS712201375 PSS7
12201375 PSS712201375
 
15220680 pss7-ans
15220680 pss7-ans15220680 pss7-ans
15220680 pss7-anscandyk35
 
Computerised voting system
Computerised voting systemComputerised voting system
Computerised voting systemSushrut Bhosale
 
15224198 pps7-ans
15224198 pps7-ans15224198 pps7-ans
15224198 pps7-ansTung Ko
 
IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415Shubham Jadhav
 
presentation internet of things iot.pptx
presentation internet of things iot.pptxpresentation internet of things iot.pptx
presentation internet of things iot.pptxankityaduvanshi18
 
Town of Collingwood Election Voting Method Slideshow
Town of Collingwood Election Voting Method SlideshowTown of Collingwood Election Voting Method Slideshow
Town of Collingwood Election Voting Method SlideshowChristopherSargent8
 
Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...iosrjce
 

Similar to Privacy in Computing - Impact on emerging technologies (20)

Using RFID to Improve the Customer Experience and Generate Revenue
Using RFID to Improve the Customer Experience and Generate Revenue Using RFID to Improve the Customer Experience and Generate Revenue
Using RFID to Improve the Customer Experience and Generate Revenue
 
E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting Technology
 
14224119 pss7
14224119 pss714224119 pss7
14224119 pss7
 
12201375 PSS7
12201375 PSS712201375 PSS7
12201375 PSS7
 
RFID Applications
RFID Applications RFID Applications
RFID Applications
 
THE RIDDLERS
THE RIDDLERSTHE RIDDLERS
THE RIDDLERS
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15220680 pss7-ans
15220680 pss7-ans15220680 pss7-ans
15220680 pss7-ans
 
15226948 pss7
15226948 pss715226948 pss7
15226948 pss7
 
Computerised voting system
Computerised voting systemComputerised voting system
Computerised voting system
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
Firewalls
FirewallsFirewalls
Firewalls
 
15224198 pps7-ans
15224198 pps7-ans15224198 pps7-ans
15224198 pps7-ans
 
15200787 pss7-ans
15200787 pss7-ans15200787 pss7-ans
15200787 pss7-ans
 
IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415
 
presentation internet of things iot.pptx
presentation internet of things iot.pptxpresentation internet of things iot.pptx
presentation internet of things iot.pptx
 
Town of Collingwood Election Voting Method Slideshow
Town of Collingwood Election Voting Method SlideshowTown of Collingwood Election Voting Method Slideshow
Town of Collingwood Election Voting Method Slideshow
 
Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...Design and Development of Secure Electronic Voting System Using Radio Frequen...
Design and Development of Secure Electronic Voting System Using Radio Frequen...
 

Recently uploaded

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 

Recently uploaded (20)

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 

Privacy in Computing - Impact on emerging technologies

  • 2. Contents • Radio Frequency Identification (RFID) – Object for tracking people • Electronic Voting – Technologies to facilitate elections • Voice over Internet Protocols – Voice Grade telephone calls Our main concern with the privacy in computing, has affect the emerging technologies will consider 3 technologies. These are:
  • 4. What it is and what it does • Radio frequency identification or RFID is a technology that uses small, low-power wireless radio transmitters called RFID tags. • Tags are tuned to a particular frequency and each has a unique ID number. • When a tag receives its signal, it sends its ID number signal in response. • Most of these devices are passive until they receive a signal from an interrogating reader. • The distance at which they can receive and broadcast a receivable signal varies from roughly five centimeters at the least powerful end to several meters at the most powerful end.
  • 5. Uses • toll plaza payments • transit system fare cards • stock or inventory labels • passports and identity cards Current uses of RFID tags include
  • 6. Applications of RFID • Consumer products • shirt, shoes, pen, wallet, credit card, mobile phone, media player, and candy bar wrapper • RFID Tags for Individuals
  • 7. Security and Privacy • the ability to track individuals wherever they go • the ability to discern sensitive data about people. • The correctness of the data obtained. • The reading sensor may malfunction or the software processing IDs may fail. • Forgery of an RFID tag.
  • 9. Computer Voting • Each voter's choices must be kept secret. • Each voter may vote only once and only for allowed offices. • The voting system must be tamperproof, and the election officials must be prevented from allowing it to be tampered with. • All votes must be reported accurately. • The voting system must be available for use throughout the election period. • An audit trail must be kept to detect irregularities in voting, but without disclosing how any individual voted. Properties essential to a fair election were enumerated as:
  • 10. Privacy and the Process • Counting ballots, • building and maintaining the list of eligible voters, • recording who has voted, • supporting absentee ballots, • assisting voters at the wrong polling place, and • transmitting election results to election headquarters. The Computer Science and Telecommunications Board of the National Academy of Science: • individual privacy in voter registration, the privacy of individual voters, and public confidence in the process.
  • 11. VoIP and Skype Privacy in Computing
  • 12. What it is and how it works • Voice over IP (VoIP) is a protocol for transmission of voice-grade telephone traffic over the Internet. • The major VoIP carrier is Skype. • To call from Chennai to Accra, for example, you would invoke the VoIP application, giving it the telephone number in Accra. A local office in Accra would call the number in Accra and patch that call to its Internet servers. (The process is even easier if both endpoints use VoIP.)
  • 13. Merit and Privacy • cost • the phone call will be somewhat exposed through packet headers.