scholarly journals Dark Clouds and Silver Linings: Impact of COVID-19 on Internet Users’ Privacy

JAMIA Open ◽  
2021 ◽  
Author(s):  
Ram D Gopal ◽  
Hooman Hidaji ◽  
Raymond A Patterson ◽  
Niam Yaraghi

Abstract Objectives To examine the impact of COVID-19 pandemic on the extent of potential violations of Internet users’ privacy. Materials and Methods We conducted a longitudinal study of the data sharing practices of the top 1,000 websites in the US between April 9th and August 27th, 2020. We fitted a conditional latent growth curve model on the data to examine the longitudinal trajectory of the third-party data sharing over the 21 weeks period of the study and examine how website characteristics affect this trajectory. We denote websites that asked for permission before placing cookies on users’ browsers as "privacy-respecting". Results As the weekly number of COVID-19 deaths increased by 1,000, the average number of third parties increased by 0.26 [95%CI, 0.15 to 0.37] P<.001 units in the next week. This effect was more pronounced for websites with higher traffic as they increased their third parties by an additional 0.41 [95% CI, 0.18 to 0.64]; P<.001 units per week. However, privacy respecting websites that experienced a surge in traffic reduced their third parties by 1.01 [95% CI, -2.01 to 0]; P = 0.05 units per week in response to every 1,000 COVID-19 deaths in the preceding week. Discussion While in general websites shared their users’ data with more third parties as COVID-19 progressed in the US, websites’ expected traffic and respect for users’ privacy significantly affect such trajectory. Conclusions Attention should also be paid to the impact of the pandemic on elevating online privacy threats, and the variation in third-party tracking among different types of websites. Lay Summary As the COVID-19 pandemic progressed in the country, the demand for online services surged. As the level of Internet use increased, websites’ opportunity to track and monetize users’ data increased with it. In this research, we examine the extent to which websites increased the number of third-parties with which they share their user’ data and how such practices were moderated by a website’s level of respect for users’ privacy and traffic surge. We find that while the number of third parties increased over time, the websites with higher respect for privacy tend to decrease the number of their parties only if they also experience a significant increase in their traffic.

2019 ◽  
Vol 13 (4) ◽  
pp. 356-363
Author(s):  
Yuezhong Wu ◽  
Wei Chen ◽  
Shuhong Chen ◽  
Guojun Wang ◽  
Changyun Li

Background: Cloud storage is generally used to provide on-demand services with sufficient scalability in an efficient network environment, and various encryption algorithms are typically applied to protect the data in the cloud. However, it is non-trivial to obtain the original data after encryption and efficient methods are needed to access the original data. Methods: In this paper, we propose a new user-controlled and efficient encrypted data sharing model in cloud storage. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Moreover, it adopts secondary screening program to achieve efficient ciphertext retrieval by using distributed Lucene technology and fine-grained decision tree. In this way, when a trustworthy third party is introduced, the security and reliability of data sharing can be guaranteed. To provide data security and efficient retrieval, we also combine active user with active system. Results: Experimental results show that the proposed model can ensure data security in cloud storage services platform as well as enhance the operational performance of data sharing. Conclusion: The proposed security sharing mechanism works well in an actual cloud storage environment.


2018 ◽  
Vol 10 (1) ◽  
Author(s):  
Dwi Rianawati ◽  
Nur Imam Taufik

Bank as a financial institution is a business-oriented entity that is aiming to make profit/earnings through ethical ways including through fulfillment of customer needs and satisfaction. As commodities are processed and sold by the bank is fund that will also be the object of its business. Bank is a business entity which functions to collect funds from the public in the form of deposits, and also serves to distribute in the form of credit and other forms to the public or the debtor. The distribution is likely to impact the risk be less smooth return of the loan amount or also known as Non-Performing Loans (NPL), which will affect the company's financial banking. Non-performing loans are credit distributed loans, but the loans are substandard, doubtful and loss. The amount of data that is used as much as 42 months, they are the data of Third Party Fund, Distributed Loans and  Non Performing Loans  of Bank Nusantara Parahyangan, and also its profit from the period of January 2013- June 2016. The data were analyzed in this study using a linear regression model, and the results are Third Party Fund has significant effect on profit growth level at the Bank Nusantara Parahyangan Sudirman branch; The amount of Distributed Loans does not have significant effect on profit growth level at Bank Nusantara Parahyangan Sudirman branch; The amount of Non Performing Loans does not have significant effect on profit growth level at Bank Nusantara Parahyangan Sudirman branch; Research shows the variable of the Amount of Third Party Funds, Distributed Loans, and Non Performing Loans simultaneously have a significant effect on profit grow level at Bank Nusantara Parahyangan Sudirman branch. Keywords: Impact of TPF, DL, NPL, Profit


Author(s):  
Ewan McKendrick

This chapter examines the impact of a contract on third parties. It addresses two main questions: whether or not a third party can acquire any rights under the contract, and whether or not the contract can impose upon him obligations or liabilities. The general rule adopted by English law is that the contract creates rights and imposes obligations only between the parties to the contract: the third party thus neither acquires rights under the contract nor is he subject to liabilities. This general rule is known as the doctrine of privity of contract. The Contracts (Rights of Third Parties) Act 1999, however, provides a relatively simple mechanism by which contracting parties can confer upon a third party a right to enforce a term of their contract. The dominant philosophy that underpins the 1999 Act is one of freedom of contract and, this being the case, the success of the Act in practice will depend upon contracting parties themselves. The chapter examines the individual sections of the 1999 Act, the exceptions to the doctrine of privity that existed at common law and under various statutes prior to the enactment of the 1999 Act. The chapter concludes by considering the extent to which a third party can be subject to an obligation by a contract to which he is not a party.


Hypertension ◽  
2020 ◽  
Vol 76 (Suppl_1) ◽  
Author(s):  
Khaled Abdelrahman ◽  
Josh Bilello ◽  
Megna Panchbhavi ◽  
Mohammed S Abdullah

Introduction: Diabetes mobile applications (apps) that help patients monitor disease have led to privacy concerns. We aimed to assess privacy policies for diabetes mobile applications with a focus on data transmission to outside parties. Methods: The App Store was used to gather apps pertaining to diabetes by searching “diabetes” and “blood sugar”. Two readers evaluated privacy policies (PP) including data sharing and storing techniques for mention of 27 predetermined criteria. All network traffic generated while loading and using the app was intercepted by a man-in-the-middle attack to listen to data delivered between the sender and receiver of data transmissions. A packet analyzer determined contents of transmission, where data was sent, and if transmission contained user data. Results: Of 35 apps evaluated, 29 (83%) had PP. The most frequent transmission destinations were Google (n=130 transmissions), Kamai Technologies (n=53), Facebook (n=38) and Amazon (n=33). 35 of 35 apps (100%) were transmitting data to a third party. 2 of 2 (100%) of those who had a privacy policy without mention of a third party transmitted data to a third party. 8 of 8 (100%) apps who mentioned they would not transmit to a third party were found to do so. 19 of 19 (100%) apps who mentioned they would transmit data to a third party were found to do so. All apps (n=6) without a privacy policy were found to be transmitting data to a third party. Conclusion: Most diabetes apps on the App store have accessible PP. All apps evaluated transmitted data to a third party, even when the policy stated this would not occur. As mobile applications are increasingly utilized by patients, it is important to warn of privacy implications.


2016 ◽  
Vol 35 (5) ◽  
pp. 474-502 ◽  
Author(s):  
Baran Han

This paper investigates the role and the welfare rationale of secondary sanctions using a game theoretic framework and a case study of the US sanctions targeting Iran. Existing literature on secondary sanctions focuses either on the sender–third party or the sender–target relations, and fails to address the interdependency of the three players’ strategies. An integrated approach allows us to examine the conditions under which the secondary sanction succeeds in coercing the third party to participate in a sanction campaign against a target. I argue that it acts as a commitment device for the third parties that value target compliance but find it too costly to voluntarily participate in the sanctions when the target complies at a suboptimal level. Despite the coercive nature, secondary sanction can be welfare improving for them. The framework provides an explanation of the successful outcome of the recent US secondary sanctions targeting Iran.


Electronics ◽  
2020 ◽  
Vol 9 (8) ◽  
pp. 1332
Author(s):  
Aritz Arrate ◽  
José González-Cabañas ◽  
Ángel Cuevas ◽  
Rubén Cuevas

Online advertising is a wealthy industry that generated more than $100B in 2018 only in the US and delivers billions of ads to Internet users every day with. These impressive numbers have also attracted the attention of malicious players that try to exploit the online advertising ecosystem for their own benefit. In particular, one of the most harmful practices refers to malicious users that act as advertisers to deliver unsafe ads. The goal of these ads is to compromise the security of the users that receive those ads. This practice is referred to as Malvertising. Some reports have estimated the economic loss caused by malvertising to the online advertising sector to $1.1B in 2017. This paper is the first work that analyses and quantifies the impact of malvertising in Facebook. To accomplish this study, we rely on a dataset that includes more than 5 M ads delivered to 3 K Facebook users from 126 K advertisers between October 2016 and May 2018. Our results reveal that although the portion of advertisers (0.68%) and ads (0.17%) associated to malvertising is very low, 1/3 of the users in our study were exposed to malvertising. Finally, we also propose a novel solution to block malvertising ads in real-time in Facebook.


2016 ◽  
Vol 21 (1) ◽  
pp. 43-74 ◽  
Author(s):  
Prakash Bhattarai

A growing field within mediation research explores issues of third-party coordination. The existing literature highlights third-party coordination as a problematic but extremely important conflict intervention strategy, but lacks an in-depth explanation of fundamental aspects of third-party coordination. Considering this research gap, this study explores a fundamental theme related to third-party coordination: the influence of third-party relationship dynamics. This theme is elaborated by means of an analysis of two case studies: the Maoist armed conflict of Nepal and the Moro conflict of the Philippines. My research finds that power differences among third parties, their attitudes towards each other, differences in intervention strategies and priorities, the nature of conflicts, and the actions taken by the conflicting parties are key contextual factors that influence the dynamics of third-party relationships. Successful coordination is more likely when there is interdependence and a sense of respect between third parties.


Author(s):  
Mindy Chen-Wishart

A contract alters the rights and liabilities of the contract parties: they are said to be privy to the contract. But what about someone who is not a contract party (a ‘third party’)? This chapter addresses the following questions: (1) What are the justifications for the general rule that only contract parties can sue on a contract? (2) What rights of enforcement does the Contract (Rights of Third Parties) Act 1999 confer on a third party? (3) What is the impact of the 1999 Act on the requirement that a contract claimant must have given consideration? (4) To what extent can a promisee enforce a contract for the benefit of a third party? (5) Aside from the Contract (Rights of Third Parties) Act 1999, what legal avenues exist for third parties to enforce promises made for their benefit? (6) When and how does a contract bind third parties?


Contract Law ◽  
2020 ◽  
pp. 929-1012
Author(s):  
Ewan McKendrick

This chapter examines the impact of a contract on third parties. It addresses two main questions: whether or not a third party can acquire any rights under the contract, and whether or not the contract can impose upon him obligations or liabilities. The general rule adopted by English law is that the contract creates rights and imposes obligations only between the parties to the contract: the third party thus neither acquires rights under the contract nor is he subject to liabilities. This general rule is known as the doctrine of privity of contract. The Contracts (Rights of Third Parties) Act 1999, however, provides a relatively simple mechanism by which contracting parties can confer upon a third party a right to enforce a term of their contract. The dominant philosophy that underpins the 1999 Act is one of freedom of contract and, this being the case, the success of the Act in practice will depend upon contracting parties themselves. The chapter examines the individual sections of the 1999 Act, the exceptions to the doctrine of privity that existed at common law and under various statutes prior to the enactment of the 1999 Act. The chapter concludes by considering the extent to which a third party can be subject to an obligation by a contract to which he is not a party.


BMJ ◽  
2019 ◽  
pp. l920 ◽  
Author(s):  
Quinn Grundy ◽  
Kellia Chiu ◽  
Fabian Held ◽  
Andrea Continella ◽  
Lisa Bero ◽  
...  

AbstractObjectivesTo investigate whether and how user data are shared by top rated medicines related mobile applications (apps) and to characterise privacy risks to app users, both clinicians and consumers.DesignTraffic, content, and network analysis.SettingTop rated medicines related apps for the Android mobile platform available in the Medical store category of Google Play in the United Kingdom, United States, Canada, and Australia.Participants24 of 821 apps identified by an app store crawling program. Included apps pertained to medicines information, dispensing, administration, prescribing, or use, and were interactive.InterventionsLaboratory based traffic analysis of each app downloaded onto a smartphone, simulating real world use with four dummy scripts. The app’s baseline traffic related to 28 different types of user data was observed. To identify privacy leaks, one source of user data was modified and deviations in the resulting traffic observed.Main outcome measuresIdentities and characterisation of entities directly receiving user data from sampled apps. Secondary content analysis of company websites and privacy policies identified data recipients’ main activities; network analysis characterised their data sharing relations.Results19/24 (79%) of sampled apps shared user data. 55 unique entities, owned by 46 parent companies, received or processed app user data, including developers and parent companies (first parties) and service providers (third parties). 18 (33%) provided infrastructure related services such as cloud services. 37 (67%) provided services related to the collection and analysis of user data, including analytics or advertising, suggesting heightened privacy risks. Network analysis revealed that first and third parties received a median of 3 (interquartile range 1-6, range 1-24) unique transmissions of user data. Third parties advertised the ability to share user data with 216 “fourth parties”; within this network (n=237), entities had access to a median of 3 (interquartile range 1-11, range 1-140) unique transmissions of user data. Several companies occupied central positions within the network with the ability to aggregate and re-identify user data.ConclusionsSharing of user data is routine, yet far from transparent. Clinicians should be conscious of privacy risks in their own use of apps and, when recommending apps, explain the potential for loss of privacy as part of informed consent. Privacy regulation should emphasise the accountabilities of those who control and process user data. Developers should disclose all data sharing practices and allow users to choose precisely what data are shared and with whom.


Sign in / Sign up

Export Citation Format

Share Document