Preview

Threats posed by the internet to personal privacy

Better Essays
Open Document
Open Document
1023 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Threats posed by the internet to personal privacy
Privacy is a very important issue to Internet users. Fear of disclosure of personal information about an individual has prevented many from using the Internet. According to a 2000 U.S. News & World Report survey, 86% of Internet users fear that continued use of the Web threatens their privacy. Private information, in the wrong hands, can cause a great deal of harm to the individuals concerned. There are several issues related to the Internet and privacy that raise concerns for many users. The users of the Internet should understand the ways that their personal information is obtained and some ways to prevent, at least some of, their information from being divulged when using the Internet

Information is readily available on the Internet and very easily accessible. There is information that users would prefer not be disclosed that are easily obtained. Internet Service Providers (ISPs) can provide a plethora of information about an individual, including name, address, and credit card. They can recapture email that was sent through their services. In addition, ISPs can recapture session information, such as the sites that were visited by a user, through its service. ISPs have divulged personal and private information about individuals, leading to embarrassment and negative employment situations.

Cookies are another way that information is obtained on a user. Cookies are small records placed on a user 's computer while visiting a website. The website can read the cookie later to identify the personal preferences. This information will enable the user to navigate the website more easily on return visits. Websites can recall registration information, so that users do not have to register each visit. Cookies also enable a user to move forward and backward within a site each session. Most cookies last during a user 's session, but some can be programmed to last forever. This can allow the site to keep track of the users movements on the Web. Several privacy groups have



References: Cavoukian, A. (1998). Data Mining: Staking a Claim on Your Privacy, (Information and Privacy Commissioner 's Report, Ontario, Canada). Retrieved from www.ciadvertising.org.student_account/fall.00/adv391k/shmun/privacy.html Eisenberg, A. (1996). "Privacy and Data Collection on the Net," Scientific American, March, 120. Fulda, J. (1998). "Data Mining and the Web," Computers and Society, vol. 28, 1, 42-43. Retrieved August 21, 2005 from www.privavcyandcomputers.com Gavison, R. (1980). "Privacy and the Limits of the Law," Yale Law Journal, Vol. 89. Retreived August 22, 2005 from http://portal.acm.org/citation.cfm?id=1071752.1071763 Media Awareness Network (2005). Cyber Marketing and Personal Privacy on the Internet. Retrieved August 20, 2005 from www.media-awareness.ca/english/special_initiatives/web_awareness/wa_librarians/public/cybermarketing_privacy.cfm News and World Report Survey (2000). Threats to Information. Retrieved August 23, 2005 from www.usnews/article/threatstoinformation.com

You May Also Find These Documents Helpful

  • Better Essays

    Copyright Laws

    • 2082 Words
    • 9 Pages

    A common issue that occurs in the use of cyberspace is the privacy issue. The computer…

    • 2082 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    Websites are routinely collecting information about customers and visitors to understand and serve their customers better. Personal information is collected and administrated with integrity, responsibility, and security.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    my reflection

    • 627 Words
    • 2 Pages

    National childrens advocacy center. (2014). Retrieved July 6, 2014, from Internet Safety Tips for Kids and Teens: http://www.nationalcac.org/prevention/internet-safety-kids.html…

    • 627 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The year is 2010, the era is the 21st century; and we, citizens of the world, are living in the Information Age. Our information is made available on the Internet where it can be viewed by millions. The days where our data was recorded on scraps of paper and left in a box in an office along with thousands of other registers are long gone. Our personal data is permanently recorded in the hard drives of computers where they can be analysed and exploited by anyone with access to that computer; or worse, identity thieves and hackers may get their hands on the data.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Some of this surveillance focuses in credit card fraud and identities theft. Marketing companies main job now days is to create profiles from our own information. Then they develop better sales or pitches.” Consumer profiling” is the method of selling that has generated high levels of revenues for these companies. Facebook partner with Bacon, allowing Facebook to post on the account holder’s wall if any purchase was made; this step will inform friends of the purchase, ending this partnership after a law suit was filed.…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    Privacy is perhaps one of the most personal issues in today’s society. Privacy is an intensely personal issue, and perhaps not only to the right of the individual to dress the way he or she desires, worship in any way he chooses, but also to expect that those rights be protected by the government that upholds them. At one point or another, every individual in our society has asked the question, “Is privacy in the 21st Century possible?” The answer lies in the exploration of what privacy really means, and what privacy issues society faces in today’s modern, informational, and digital age of what we call the 21st Century.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    the law of online privacy in the past twelve months [2002] have involved the government 's response to the reality…

    • 3371 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    This paper will look at the ethical issues and use of Personally Identifiable Information, commonly known as PII, in computer systems, applications, and the internet. We will discuss what PII is and how it is used. There will be information on why Personally Identifiable Information is used and what can happen if it is misused. We will also discuss and look at some sample polices from the government and other large companies that address the use and safeguarding of Personally Identifiable Information. The next section will discuss what you can do to protect your Personally Identifiable Information. Finally we will look at how everything discussed can affect you and who is ultimately responsible for protecting Personally Identifiable Information.…

    • 2169 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    The advancement of technology has numerous benefits to society. Technology is reliable for communication, convenient for performing daily tasks and provides instantaneous access to information. While these statements hold true, there is one major con of technology: lack of privacy. Privacy can be invaded via the internet due to social media accounts, e-mails, browser cookies and caches. Besides the internet, smart cards and security tags are two other ways of collecting information.…

    • 1144 Words
    • 5 Pages
    Better Essays
  • Better Essays

    In today’s electronic age, many employers are faced daunting task of making a legal call when determining if monitoring employee behavior is appropriate at all times. In essence, “Little Brother” is always watching. According to Schulman (2013), Little Brother represents the tremendous capabilities technology as provided for employers to keep track of what their work force is up to. Several programs are available that search e-mails, as well as software to block objectionable websites. The most brazen of manager and supervisors can simply go enter your hard drive and review one’s cookies and history, as well as access any employee’s company e-mail. As much as an employee deletes his/her history, or sends unwanted emails to the recycle bin, much of this information still exists on the company server, and many corporations are willing to pay computer consultants to unearth any desired information.…

    • 1036 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    GBDA 303 Chapter 7

    • 366 Words
    • 4 Pages

    • There are several privacy issues related to the use of online / computer resources.…

    • 366 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    There are many Americans that worry about the invasion of their privacy. An American’s privacy can be lost by- an IP address internet cookies, government surveillance cameras, and social networking sites. There are many ways Americans can control their privacy, but sometimes the invasion of privacy is out of their control. For example, computers save all of the American’s private information without their consent.…

    • 1379 Words
    • 6 Pages
    Better Essays
  • Good Essays

    The article "The Internet: A Clear and Present Danger?" written by Cathleen Cleaver is a clear claim of the necessity of government regulation to control what is being shown on the Internet. To support her claim, Cleaver gives the pornographic web sites as an example. She argues that the regulations used to control the selling of pornography applied to porn stores, magazines, and television should also be applied to the Internet. The reason for such necessity is that it is impossible to control who is actually accessing such web sites. Following this reason, Cleaver's main claim in the article is that children can access pornographic web sites on the Internet. This claim is clearly stated by Cleaver in the fourth paragraph of her essay: "When considering what is in the public interest, we must consider the whole public, including children, as individual participants in this new medium" (460). After that her following paragraphs give examples and explanations that support the necessity of a government regulation on Internet. Such examples and explanations were very effective in order to support her claim. They made a fundamental relationship between the author's claim and the real facts that support it, helping people realize such danger by thinking about their own experience.…

    • 905 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Privacy can be generally broken down into three categories - physical, organizational and informational (Wikipedia, the Free Encyclopedia, 2008). Possessing privacy is not just about preventing "intrusions into one's physical space or solitude” (Smith, 1994). Instead, rapid advances in technology have propelled the safeguarding of privacy to the next level.…

    • 1111 Words
    • 5 Pages
    Good Essays
  • Good Essays

    When people think about privacy and the internet, what do they think? Do they feel secure? Or, do they feel vulnerable when it comes to using the internet at their house or in a public place? The answer to some of these questions may surprise people because some think they are completely safe at home on their home networks. But the truth is, your security/privacy is taken advantage of on the daily basis by companies and third parties.…

    • 756 Words
    • 4 Pages
    Good Essays