Sunday, November 16, 2008

Privacy




Privacy relates to personal information that a person would not wish others to know without authorization, and to a person's right to be free from the attention of others.

Consumer privacy, also known as customer privacy, involves the handling and protection of sensitive personal information that individuals provide in the course of everyday transactions. This involves the exchange or use of data electronically or by any other means, including telephone, fax, written correspondence, and even direct word of mouth.
With the advent and evolution of the World Wide Web and other electronic methods of mass communications, consumer privacy has become a major issue. Personal information, when misused or inadequately protected, can result in identify theft, financial fraud, and other problems that collectively cost people, businesses, and governments millions of U.S. dollars per year. In addition, Internet crimes and civil disputes consume court resources, confound legislators and police departments, and produce untold personal aggravation.

Most Web users want to understand that personal information they share will not be shared with anyone else without their permission. An annual survey conducted by the Graphics, Visualization and Usability Center of the Georgia Institute of Technology showed that 70% of the Web users surveyed cited concerns about privacy as the main reason for not registering information with Web sites. 86% indicated that they wanted to be able to control their personal information. A study by TRUSTe revealed that 78% of users surveyed would be more likely to provide information to sites that offered privacy assurance.

Having Privacy in our world today is very hard. Technology now can find out where you are, what your doing, your email address, different accounts, passwords, personal information etc. It is really hard to escape it now and also having freedom. So i think technology on the privacy side for me is negative because we have no freedom and privacy which is our right to have it, what do you think?




REFERENCE:

http://searchdatamanagement.techtarget.com

http://www.youtube.com

http:..search.live.com/images/results.aspx?q=privacy&form=QBIR






16 comments:

nella said...

That is one of disadvantages of advance technology this day. Privacy becomes something that hard to find for us.

anuar said...

Privacy is really a big issue nowadays in this time where you can practically find anybody or wherever they live by searching on the internet unless you are living in a remote island some where , but i doubt it ! its hard to get privacy even in our personal space at home !

eason said...

Yes, i totally agree with Anuar. In this open environment, we cant hide anything from others. We hardly get our privacy even when we are in our home. Furthermore, by using internet, people can share and distribute a file or a photo everywhere and anytime by just clicking it. Imagine, your private photo being taken and put in website by someone else that you do not know. What remains private today?

cuialbert said...

There are no Privacy in the technology century,becasue most people use computer evey day and the letter was substitute E-mail,it's easy and faster than the letter services.but as we know the computer not 100%safe,example hacking. so there are no privacy in the technology century.

Brad said...

Hey man, you have reminded me my student life back to Iran. When I was doing my thesis I had to work in the chromatography laboratory and I had to link a kit on my over coat which indicates where I am and what I am doing in which lab. I really had a tough time because in the lab next to the place I was doing research, there was a girl that I really wanted to talk to her and I couldn’t because once I wanted to go to her lab the supervisor of the lab could easily trace me and I could get easily put my self in to trouble!!! I remember how much I cursed the inventor of these kits at that time, and now your article about the privacy exactly pushed my mind in to those days!!!

Anonymous said...

Privacy is one of the ills of technology, short and simple.Technology has a focus on information,and the more you use it, the more information about you is readily available to anyone who wants it, therefore you have no informational privacy. We just need to be carefull how, where and what circumstances do we pass out our information

Ee Lynn said...

Privacy violation is a crime, but how many people actually inviolate them? Sometimes people do violate others privacy without realising. For a simple example, giving friend A, friend B’s cell phone number without asking friend B. Isn’t that violating others privacy? I would say until what extend is the privacy violated is the question. Nobody likes his or her privacy being violated. As long as technology is growing, there will always be hackers trying to violate people’s personal information. We just have to be extra careful in handing over out personal information to sites.

Srikanth said...

This Privacy Policy describes World of Good’s use of Personal Information and Anonymous Information that we collect when you use our Services. This Privacy Policy does not apply to the use of your Personal Information by third parties that World of Good does not own or control, or to individuals that we do not control or manage.

cuialbert said...

Yes, that is right, privacy problem is a big issue that cause from technology. this is a IT epoch,hence hacker is a killer of the privacy.they can steal and destory people's privacy though the network. As we know,privacy is very important for personal as well as business.especially for business, lossing of bisiness secret can cause lose of million dollars, this is a crime of stealing the business secret. But to keep the privacy safe, we also can use the technology

Anonymous said...

The industrial age was dependent on technologies that extracted value from the earth, trees, and water. Our age too relies on extractive technologies. However the technologies neither are not pumps or drills, nor is the substance extracted valued because of its physical properties. The technologies are computers, transmitters, spectrographs and video lens. A major substance extracted is personal information. New technologies for collecting personal information which transcend the physical, liberty enhancing limitations of the old means are constantly appearing. They probe more deeply, widely and softly than traditional methods, transcending barriers (whether walls, distance, darkness, skin or time) that historically protected personal information. The boundaries which have defined and given integrity to social systems, groups and the self are increasingly permeable absent special precautions. The power of governmental and private organizations to compel disclosure (whether based on technology, law or circumstance) and to aggregate, analyze and distribute personal information is growing rapidly. We are becoming a transparent society of record such that documentation of our past history, current identity, location, communication and physiological and psychological states and behavior is increasingly possible. With predictive profiles and DNA there are even claims to be able to know individual futures. Information collection often occurs invisibly, automatically and remote --being built into routine activities. Awareness and genuine consent on the part of the subject may be lacking.
The amount of personal information collected is increasing. New technologies have the potential to reveal the unseen, unknown, forgotten or withheld. Like the discovery of the atom or the unconscious, they surface bits of reality that were previously hidden, or didn't contain informational clues. People are in a sense turned inside out.
To be alive and a social being is to automatically give off signals of constant information--whether in the form of heat, pressure, motion, brain waves, perspiration, cells, sound, olifacteurs, waste matter, or garbage, as well as more familiar forms such as communication and visible behavior. These remnants are given new meaning by contemporary surveillance technologies. Through a value-added, mosaic process, machines (often with only a little help from their friends) may find significance in surfacing and combining heretofore meaningless data.
Following to the above mentioned ideas it can be said that with the inventions of new technology there no remain of privacy but the fact it does it really matters let see below:-
The new technologies may raise a variety of troubling issues including injustice, intrusion, denial of due process, absence of informed consent, deception, manipulation, errors, harassment, misuse of property and lessened autonomy. Privacy as it involves the control of personal information is central to many of the social concerns raised by new information technologies.
The United States Supreme Court has said in its famous Katz decision that privacy was only protected when it could be reasonably expected. Technology changes and social expectations can't remain static. With more powerful technologies we can reasonably expect less and less and hence privacy must become more restricted. Most so-called "privacy invasions" are not illegal in the United States.
Given the free market, you can also buy technologies to protect yourself from privacy invasion. Personal information is often viewed as just another commodity to be sold like any other. Companies have an obligation to stockholders to make money. Government must find the guilty and protect the innocent.
In addition we are an open society that believes that visibility in government brings accountability. With respect to individuals a valued legacy of the 1960s is personal openness and honesty. The only people who worry about privacy are those who have something to hide. Right? Wrong!!
There are at least 10 reasons why privacy and anonymity are important:
The ability to control information about the self is linked to the dignity of the individual, self-respect and the sense of personhood. Self-presentations and back-stage behavior are dependent on such control.
Anonymity can be socially useful in encouraging honesty, risk-taking, experimentation and creativity.
Confidentiality (via dissemination protections) improves communication flows and is vital to trust in professional (doctors, lawyers, psychologists) and corporate settings.
Privacy is a resource in inter-personal relations, doled out and exchanged as relationships progress. Intimacy is based partly on the voluntary sharing of personal information with others. Individuals feel free to be "themselves" as they get to know others better, and reciprocal exchanges take place.
The control of information is a strategic resource in impersonal relations. Trade secrets and copyrights are a formal expression of this.
Group boundaries are maintained partly by control over information. Individuals are in or out, and occupy organizational positions based partly on what they are entitled to know and have access to.
Privacy makes possible the American ideal of starting over and the fresh start.
Fairness can be protected by denying access to information which could be put to unfair use. For example while religious discrimination is illegal, if employers, schools, and landlords could ask it (as in most cases they now can not) such protections would be weakened.
Privacy can help provide the solitude and peace necessary to mental health and creativity in a dynamic society. Here it is a question of control over what is taken in, rather than what is given out.

Aritcle source:-http://web.mit.edu/gtmarx/www/privantt.html

Ma'ruf a.k.a Murphy said...

Bro, the real dangers that can violate our privacy are COOKIES, ISPs (internet service providers), Data Loggings...Let me briefly explain you, how these above mentioned aspects can create serious issues....
• Cookies
Cookies are tools which are sometimes used for user-tracking, a common concern in the field of privacy. As a result, some types of cookies are classified as a tracking cookie. Although HTML-writers most commonly use cookies for legitimate purposes, cases of abuse can and do occur.
An HTTP cookie consists of a piece of information stored on a user's computer to add statefulness to web-browsing. Systems do not generally make the user explicitly aware of the storing of a cookie. (Although some users object to that, it does not properly relate to Internet privacy. It does however have implications for computer privacy, and specifically for computer forensics).
The original developers of cookies intended that only the website that originally distributed cookies to users could retrieve them, therefore returning only data already possessed by the website. However, in practice programmers can circumvent this restriction. Possible consequences include:
 the placing of a personally-identifiable tag in a browser to facilitate web profiling (see below), or,
 use of cross-site scripting or other techniques to steal information from a user's cookies.
Some users choose to disable cookies in their web browsers - as of 2000 a Pew survey estimated the proportion of users at 4%. Such an action eliminates the potential privacy risks, but may severely limit or prevent the functionality of many websites. All significant web browsers have this disabling ability built-in, with no external program required. As an alternative, users may frequently delete any stored cookies. Some browsers (such as Mozilla Firefox and Opera) offer the option to clear cookies automatically whenever the user closes the browser. A third option involves allowing cookies in general, but preventing their abuse. There are also a host of wrapper applications that will redirect cookies and cache data to some other location.
The process of profiling (also known as "tracking") assembles and analyzes several events, each attributable to a single originating entity, in order to gain information (especially patterns of activity) relating to the originating entity. Some organizations engage in the profiling of people's web browsing, collecting the URLs of sites visited. The resulting profiles can potentially link with information that personally identifies the individual who did the browsing.
Some web-oriented marketing-research organizations may use this practice legitimately, for example: in order to construct profiles of 'typical Internet users'. Such profiles, which describe average trends of large groups of Internet users rather than of actual individuals, can then prove useful for market analysis. Although the aggregate data does not constitute a privacy violation, some people believe that the initial profiling does.
Profiling becomes a more contentious privacy issue when data-matching associates the profile of an individual with personally-identifiable information of the individual.
Governments and organizations may set up “honeypot” websites - featuring controversial topics - with the purpose of attracting and tracking unwary people. This constitutes a potential danger for individuals.
• ISPs
Consumers obtain Internet access through an Internet Service Provider (ISP). All Internet data to and from the consumer must pass through the consumer's ISP. Given this, any ISP has the capability to observe everything about the consumer's (unencrypted) Internet activities; however, ISPs are usually prevented from participating in such activities due to legal, ethical, business, or technical issues.
Despite these legal and ethical issues, some ISPs, such as British Telecom (BT), are planning to use deep packet inspection technology provided by companies such as Phorm in order to examine the contents of the pages which people visit. By doing so, they can build up a profile of a person's web surfing habits, which can then be sold on to advertisers in order to provide targeted advertising. BT's attempt at doing this will be marketed under the name 'Webwise'.
Normally ISPs do collect at least some information about the consumers using their services. From a privacy standpoint, ISPs would ideally collect only as much information as they require in order to provide Internet connectivity (IP address, billing information if applicable, etc).
What information an ISP collects, what it does with that information, and whether it informs its consumers, pose significant privacy issues. Beyond the usage of collected information typical of third parties, ISPs sometimes state that they will make their information available to government authorities upon request. In the US and other countries, such a request does not necessarily require a warrant.
An ISP cannot know the contents of properly-encrypted data passing between its consumers and the Internet. For encrypting web traffic, https has become the most popular and best-supported standard. Note however, that even if users encrypt the data, the ISP still knows the IP addresses of the sender and of the recipient. (However, see the IP addresses section for workarounds.)
General concerns regarding internet user privacy have become enough of a concern for a UN agency to issue a report on the dangers of identity fraud.
• Data logging
Many programs and operating systems are set up to perform data logging of usage. This may include recording times when the computer is in use, or which web sites are visited. If a third party has sufficient access to the computer, legitimately or not, the user's privacy may be compromised. This could be avoided by disabling logging, or by clearing logs regularly.

Ma'ruf a.k.a Murphy said...

dude...forgot to state the references:
• http://en.wikipedia.org/wiki/Internet_service_provider
• http://en.wikipedia.org/wiki/Internet_privacy
• http://en.wikipedia.org/wiki/HTTP_cookie

Ayesha said...

Yes man!!I need Privacy especially when I'm at home.Nowadays,people would do anything including inventing all the techology to trace people, trace the organization's important records and also to trace where would your children be just for money. To a certain extend, it is GOOD but it would be practicable only in organizations and schools to protect the company's important records and finance record. Everyone of us have the right to have our privacy time and space.As Ee Lynn's said that Privacy violation is a Crime,therefore anyone can be sued if you were caught violating people's privacy.

Moreover,people misused the technologies to violate people's privacy for money,therefore the government should control the use of these technology that related to people's privacy by providing a license in order to use the technologies.

Ceasar said...

Privacy is the capacity to negotiate social relationships by controlling access to personal information. As laws, policies, and technological design increasingly structure people's relationships with social institutions, individual privacy faces new threats and new opportunities. Over the last several years, the realm of technology and privacy has been transformed, creating a landscape that is both dangerous and encouraging. Significant changes include large increases in communications bandwidths; the widespread adoption of computer networking and public-key cryptography; mathematical innovations that promise a vast family of protocols for protecting identity in complex transactions; new digital media that support a wide range of social relationships; a new generation of technologically sophisticated privacy activists; a massive body of practical experience in the development and application of data-protection laws; and the rapid globalization of manufacturing, culture, and policy making.

Privacy advocates – really, anyone who uses a phone or the Internet in the United States – won an important victory before Thanksgiving when the Senate Judiciary Committee approved national intelligence legislation that did not provide retroactive immunity for the telephone companies that aided the Bush administration's illegal spying efforts. But the debate in the committee represented only one skirmish in the ongoing war over privacy in the digital age.

There is growing public awareness of the amount of data private corporations collect using tools like interactive Web sites, mobile wireless connections and global positioning systems, as well as remote computing through services like Google Docs and .Mac. Everywhere you look, the privacy issue rears its head: Some object to Mayor Michael Bloomberg's congestion pricing plan because it would allow the government to track who drives where and when.

At the heart of the issue is the question of whether our constitutional right to privacy will persist in an age of email and voicemail, or if it will fade along with personal letters and answering machines. Along with Congress, the courts are grappling with this question, deciding what standards the government must meet to gather information through different technologies.

http://www.gothamgazette.com/article/tech/20071129/19/2360
http://polaris.gseis.ucla.edu/pagre/landscape.html

Ameet said...

Privacy means something which anyone can’t share it with everyone. Every people have something which they don’t want to share the information without those people whom are close. Privacy is now become a big issues because of loosing of privacy. Technology brings this disadvantages in human life with some advantages of it.

Power Point Presentations said...

What nice and professional article you have held, really you have impressed me. I respect your comment from my bottom of heart.
Biotechnology