It's OUR PREROGATIVE <body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar/1712612074658456354?origin\x3dhttp://prerogative-is-private.blogspot.com', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>
Thursday, October 16, 2008











Welcome to our

VERY OWN

TEAM 1
BLOG! =]


PRIVACY


12:08 PM




Content

1) Problem Analysis



2) What is Privacy?



3) Types of Privacy



4) Why people want to invade other's privacy?




5) Consequences of your privacy being invaded



6) How privacy is linked to communication?



7) High-Tech, how does it affect internet?


8) Case Study


9) Conclusion





3:52 AM


Problem Analysis




In this day and age when anyone who has a camera and a computer can post anything they want on the Internet, what does privacy mean to you?







3:51 AM


So, What is Privacy?

1. seclusion: the state of being apart from other people and not seen, heard, or disturbed by them

2. freedom from attention of others: freedom from the observation, intrusion, or attention of others

3. hidden condition: the state of being kept secret


3:50 AM




Types of Privacy

•Physical - defined as preventing "intrusions into one's physical space or solitude“

Example:
- Bag is searched as I leave a store.
- Former PM Samak being followed by journalists.




•Informational - refers to the evolving relationship between technology and the legal right to, or public expectation of privacy in the collection and sharing of data about ones self

Example:
- Blogging


•Organizational - Governments agencies, corporations, and other organizations may desire to keep their activities or secrets from being revealed to other organizations or individuals
.

Example:

- Companies wanted to protect their Trade's secret.


2:49 AM


Why people want to invade other's privacy?



- Curiosity




- Spread Rumors




- Out of Boredom




- Concern




- For fun




- Interest




2:48 AM




Consequences of your privacy being invaded










- No respect






- Loss of trust






- Disappointed






- Blackmail






2:47 AM





High-Tech, how does it affect internet?








Pros
- Different devices/gadgets able for us to own and use it
- Enable us to pose our information online
- Maintain orders





Cons
- Misuses of the internet and the devices
- Able to invade people’s privacy


2:46 AM


Case Study



In January 2008, Chen was involved in a widely publicized sex scandal when sexually explicit and nude photographs of himself and several high-profile female celebrities from the Hong Kong entertainment industry became widely circulated on the Internet. Celebrities implicated in the scandal included
Gillian Chung, Bobo Chan, Mandy Chen, Candice Chan, Rachel Ngan and Cecilia Cheung. Nude photos of Edison's current girlfriend, Vincy Yeung, were also made public and the future of the relationship is in doubt.
According to the police, Chen's "Cotton-candy Mac" computer was sent in for repairs, and an estimated 1,300 intimate photographs of Chen and numerous female celebrities may have been accessed and secretly copied by one or more of the shop's employees.


2:44 AM


Case Study 2





Stacy Snyder, an aspiring teacher who is now 27 years old, was set to graduate last year from Millersville's School of Education. But just days before commencement, campus officials discovered Ms. Snyder's MySpace page -- which featured a photograph of the student wearing a pirate hat and sipping from a plastic cup. The picture's caption read "Drunken Pirate."


2:40 AM


Case Study 3: ARTHUR ASHE AND INVASION OF PRIVACY


Tennis legend Arthur Ashe was the first black man to win Wimbledon and the U.S. Open.On April 8, 1992, however, Arthur Ashe was faced with one of the most difficult decisions of his life. Unknown to all but a few, Ashe had contracted HIV, probably from a blood transfusion during a heart bypass operation in 1983. Ashe, an intensely private man, had managed to keep his condition a secret from everyone except his family and close friends. However, all that changed when a reporter from USA Today contacted Ashe in early April of 1992.


2:38 AM


Conclusion
- Everyone has a privacy
- Privacy is a privilege
- Privacy should be respected by everyone
- Privacy can invaded through different means


2:36 AM


References


http://en.wikipedia.org/wiki/Edison_Chen_photo_scandal

http://www.ed.uiuc.edu/wp/privacy/persprivacy.html

http://www.oznetlaw.net/FactSheets/Privacy/tabid/945/Default.aspx


2:35 AM