privacy

Topics: Identity theft, Personally identifiable information / Pages: 2 (290 words) / Published: Sep 28th, 2014
PRIVACY
Yet people often dole out all kinds of personal information on the Internet that allows such identifying data to be deduced. Services like Facebook,Twitter and Flickr are oceans of personal minutiae — birthday greetings sent and received, school and work gossip, photos of family vacations, and movies watched.
Computer scientists and policy experts say that such seemingly innocuous bits of self-revelation can increasingly be collected and reassembled by computers to help create a picture of a person’s identity, sometimes down to the Social Security number.
“Technology has rendered the conventional definition of personally identifiable information obsolete,” said Maneesha Mithal, associate director of the Federal Trade Commission’s privacy division. “You can find out who an individual is without it.”
In social networks, people can increase their defenses against identification by adopting tight privacy controls on information in personal profiles. Yet an individual’s actions, researchers say, are rarely enough to protect privacy in the interconnected world of the Internet.
By examining correlations between various online accounts, the scientists showed that they could identify more than 30 percent of the users of both Twitter, the microblogging service, and Flickr, an online photo-sharing service, even though the accounts had been stripped of identifying information like account names and e-mail addresses.
“When you link these large data sets together, a small slice of our behavior and the structure of our social networks can be identifying
More generally, privacy advocates worry that the new frontiers of data collection, brokering and mining, are largely unregulated. They fear “online redlining,” where products and services are offered to some consumers and not others based on statistical inferences and predictions about individuals and their behavior.
http://www.nytimes.com/2010/03/17/technology/17privacy.html?ref=privacy&_r=0

You May Also Find These Documents Helpful

  • Privacy
  • Privacy
  • Privacy
  • Privacy
  • The Right to Privacy
  • right to privacy
  • Invasion of Privacy
  • Right of Privacy
  • Internet and Privacy
  • Invasion of Privacy