E-Technology Challenges to Information Privacy

Author(s):  
Edward J. Szewczak

The collection of personal information by electronic technology (e-technology) and the possibility of misuse of that information are primary reasons why people limit their use of the Internet and are even limiting the success of e-commerce (Szewczak, 2004). Various uses of e-technology that collect and/or disseminate personal information include corporate and government databases, e-mail, wireless communications, clickstream tracking, and PC software. The main challenge to personal information privacy is the surreptitious monitoring of user behavior on the Internet without the user’s consent and the possible misuse of the collected information resulting in financial and personal harm to the user. Our focus is primarily on Internet use in the United States of America, though clearly e-technology is global in nature and poses challenges and issues for societies around the world.

Author(s):  
Edward J. Szewczak

Concerns about the collection of personal information by Internet technology and the possibility of misuse of that information are a primary reason why people limit their use of the Internet and are even limiting the success of e-commerce (Szewczak, 2004). Various uses of technology that collect and/or disseminate personal information include corporate and government databases, e-mail, wireless communications, clickstream tracking, hardware and software watermarks, and biometric devices. The main challenge to personal information privacy is the surreptitious monitoring of user behavior on the Internet without the user’s consent and the possible misuse of the collected information resulting in financial and personal harm to the user. Our focus is primarily on Internet use in the United States of America, though clearly the technology is global in nature and poses challenges and issues for societies around the world.


Author(s):  
Edward J. Szewczak

The use of various e-technologies for e-commerce, e-government, and mobile commerce is characterized by the collection of personal information—both routinely as well as surreptitiously—and the possibility of misuse of that information. Various uses of e-technologies that collect or disseminate personal information include corporate and government databases, e-mail, and wireless communications. (For a discussion of clickstream tracking and spyware, hardware and software watermarks, and biometric devices, see Szewczak, 2005) The main challenge to personal information privacy is the surreptitious monitoring of user behavior without the user’s consent and the possible misuse of the collected information resulting in financial and personal harm to the user. In light of this reality, people limit their use of e-technologies, even to the point of limiting the success of e-commerce (Szewczak, 2004). Our focus is primarily on e-technology use in the United States of America, though clearly e-technology is global in nature and poses challenges and issues for societies around the world. Also, in light of the 9/11 terrorist attacks on the World Trade Center and the Pentagon and the U.S. government’s response to them, the issue of information privacy takes on a new urgency (for more information, see www.privacyinternational.org).


Stalking ◽  
2007 ◽  
Author(s):  
Graham D. Glancy ◽  
Alan W. Newman

Cyberstalking involves the use of the Internet or other electronic communication to stalk another person. Already common, it is likely to become more common as the use of the Internet continues to grow. The characteristics of online stalkers and their victims have some differences from those of the offline stalker. Mullen, Pathé, Purcell, and Stuart’s (1999) classification may apply to cyberstalkers except for the apparently common phenomenon of child luring that may be a new category. The methods of cyberstalking, as described in this chapter, are particularly ingenious. We know little about the effect on victims, but postulate that it is similar to offline stalking. We make some suggestions that may prevent cyberstalking, as well as offer some steps to bear in mind once cyberstalking occurs. The proliferation of personal computers with Internet access in the last decade has raised concerns about a new phenomenon known as cyberstalking. The Internet can be used to annoy and harass large numbers of victims in a generic manner by disseminating computer viruses, Internet scams, and “spamming” people with unsolicited e-mail. In 1999 Janet Reno, the attorney general of the United States, defined cyberstalking as the use of the Internet, e-mail, or other electronic communications devices to stalk another person (Reno, 1999). Barak (2005) looked at the issue of sexual harassment on the Internet. He characterizes cyberstalking as one type of sexual coercion. He notes that online behavior is characterized by disinhibition, openness, venture, and bravado—an atmosphere characterized by typical masculine attitudes. He argues that the lack of legal boundaries or enforcement vehicles encourage people to do what they would not have done in offline situations. He notes the near impossibility of implementation of legal procedures on a large scale. In this chapter we will discuss what is known about the prevalence of this phenomenon, the types of cyberstalking, and what is known about the perpetrators. In addition, we will generate some hypotheses about the comparison between online and offline stalkers. We will also discuss the effects on victims and current thoughts and resources for dealing with cyberstalking.


Author(s):  
Eleutherios A. Papathanassiou ◽  
Xenia J. Mamakou

The advent of the Internet has altered the way that individuals find information and has changed how they engage with many organizations, like government, health care, and commercial enterprises. The emergence of the World Wide Web has also resulted in a significant increase in the collection and process of individuals’ information electronically, which has lead to consumers concerns about privacy issues. Many researches have reported the customers’ worries for the possible misuse of their personal data during their transactions on the Internet (Earp & Baumer, 2003; Furnell & Karweni, 1999), while investigation has been made in measuring individuals’ concerns about organizational information privacy practices (Smith, Milberg & Burke, 1996). Information privacy, which “concerns an individual’s control over the processing, that is the acquisition, disclosure, and use, of personal information” (Kang, 1998) has been reported as one of the most important “ethical issues of the information age” (Mason, 1986).


2009 ◽  
Vol 60 (1) ◽  
pp. 30
Author(s):  
Ralph L Scott

We have all become increasingly aware that, for commercial and perhaps other reasons, our use of the Internet can and is being tracked. For most of us this tracking has become a major concern as unwanted e-mail (commonly called SPAM) has begun to clog our incoming mailboxes.  There are a variety of ways to combat both the tracking and the receipt of unwanted e-mail. One of the ways of dealing with this problem is the use of an anonymiser service, many of which are available over the Web.


2021 ◽  
Author(s):  
◽  
Dale Stephens

<p>The Internet has rapidly become the world’s most prevalent form of communication. It can be accessed twenty-four hours a day from virtually any location in the world from a myriad of technologically savvy devices. Internet users can keep up to date with world events, watch movies, listen to music, interact with government agencies, analyse business trends, undertake research and maintain contact with people anywhere. The Internet also provides the ability for users to shop ‘online’ with virtually any product or service supplier anywhere in the world. This has created concerns regarding the use of personal information obtained through the medium of the Internet. An individual’s right to privacy is a right enshrined in legislation and through tort law. With the uptake of technology and the burgeoning use of the Internet the subject of online privacy has become a complex issue for law and policy makers both in New Zealand and internationally. The aim of this paper is to look at the online shopper or consumer and how their information could be protected. This paper looks at the key areas of privacy legislation, the storage of data and the rise of new technologies including ‘cloud’ computing and suggests that the complexity of online privacy is such that a different approach to access and use of personal information of online shoppers may be required. The rate of technology change, the enormity of the data capture situation and the international accessibility of the Internet are all factors that create an almost impossible situation for ensuring consumer privacy so this paper proposes that the onus moves away from the law and policy makers and put into the hands of the users of the Internet.</p>


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


2011 ◽  
Vol 23 (4) ◽  
pp. 186-191 ◽  
Author(s):  
Malini Ratnasingam ◽  
Lee Ellis

Background. Nearly all of the research on sex differences in mass media utilization has been based on samples from the United States and a few other Western countries. Aim. The present study examines sex differences in mass media utilization in four Asian countries (Japan, Malaysia, South Korea, and Singapore). Methods. College students self-reported the frequency with which they accessed the following five mass media outlets: television dramas, televised news and documentaries, music, newspapers and magazines, and the Internet. Results. Two significant sex differences were found when participants from the four countries were considered as a whole: Women watched television dramas more than did men; and in Japan, female students listened to music more than did their male counterparts. Limitations. A wider array of mass media outlets could have been explored. Conclusions. Findings were largely consistent with results from studies conducted elsewhere in the world, particularly regarding sex differences in television drama viewing. A neurohormonal evolutionary explanation is offered for the basic findings.


Author(s):  
Steven L. Taylor

The United States of America has one of the longest, continually functional electoral systems in the world. On one level, the system is seemingly simple, as it is based predominantly on plurality winners in the context of single-seat districts. However, its extensive usage of primary elections adds a nearly unique element to the process of filling elected office. This mechanism is used more extensively in the United States than in any other case. Additionally, the United States has a complex, and unique, system for electing its national executive. All of these factors help create and reinforce one of the most rigid two-party systems in the world.


Author(s):  
Vaishnavi Bhagwat Savant ◽  
Rupali D. Kasar ◽  
Priti B. Savant

The explosive growth of the Internet has brought many good things such as E-commercebanking, E-mail, cloud computing, but there is also a dark side such as Hacking, Backdoors, Trapdoors etc. Hacking is the first big problem faced by Governments, companies, and private citizens around the world. Hacking means reading email’s of someone, stealing passwords, stealing credit card numbers etc. An ethical hacker is one who can help the people who are suffered by this hackings. This paper describes about Ethical hackers, it’s types and phases of hacking


Sign in / Sign up

Export Citation Format

Share Document