Personal Information Privacy and Internet Technology

Author(s):  
Edward J. Szewczak

Personal information privacy is arguably the most important issue facing the growth and prosperity of the Internet, especially of e-commerce. Protecting personal information privacy has ignited a debate that pits privacy advocates against technology growth enthusiasts. This paper explores personal information privacy on the Internet in terms of the technological challenges to personal information privacy facing individuals, businesses, and government regulators.

Author(s):  
Edward J. Szewczak

Concerns about the collection of personal information by Internet technology and the possibility of misuse of that information are a primary reason why people limit their use of the Internet and are even limiting the success of e-commerce (Szewczak, 2004). Various uses of technology that collect and/or disseminate personal information include corporate and government databases, e-mail, wireless communications, clickstream tracking, hardware and software watermarks, and biometric devices. The main challenge to personal information privacy is the surreptitious monitoring of user behavior on the Internet without the user’s consent and the possible misuse of the collected information resulting in financial and personal harm to the user. Our focus is primarily on Internet use in the United States of America, though clearly the technology is global in nature and poses challenges and issues for societies around the world.


Author(s):  
Edward J. Szewczak

Personal information privacy is arguably the most important issue facing the growth and prosperity of the Internet, especially of e-commerce. Protecting personal information privacy has ignited a debate that pits privacy advocates against technology growth enthusiasts. This chapter explores personal information privacy on the Internet in terms of the social and legal issues surrounding it, and the technological challenges to personal information privacy facing individuals, businesses, and government regulators. Representative solutions to resolving the debate are presented, though at present the debate over personal information privacy continues and may have to be resolved by governments and the courts.


Author(s):  
Eleutherios A. Papathanassiou ◽  
Xenia J. Mamakou

The advent of the Internet has altered the way that individuals find information and has changed how they engage with many organizations, like government, health care, and commercial enterprises. The emergence of the World Wide Web has also resulted in a significant increase in the collection and process of individuals’ information electronically, which has lead to consumers concerns about privacy issues. Many researches have reported the customers’ worries for the possible misuse of their personal data during their transactions on the Internet (Earp & Baumer, 2003; Furnell & Karweni, 1999), while investigation has been made in measuring individuals’ concerns about organizational information privacy practices (Smith, Milberg & Burke, 1996). Information privacy, which “concerns an individual’s control over the processing, that is the acquisition, disclosure, and use, of personal information” (Kang, 1998) has been reported as one of the most important “ethical issues of the information age” (Mason, 1986).


Author(s):  
Edward J. Szewczak

The collection of personal information by electronic technology (e-technology) and the possibility of misuse of that information are primary reasons why people limit their use of the Internet and are even limiting the success of e-commerce (Szewczak, 2004). Various uses of e-technology that collect and/or disseminate personal information include corporate and government databases, e-mail, wireless communications, clickstream tracking, and PC software. The main challenge to personal information privacy is the surreptitious monitoring of user behavior on the Internet without the user’s consent and the possible misuse of the collected information resulting in financial and personal harm to the user. Our focus is primarily on Internet use in the United States of America, though clearly e-technology is global in nature and poses challenges and issues for societies around the world.


Symmetry ◽  
2019 ◽  
Vol 11 (3) ◽  
pp. 361
Author(s):  
Jaeseung Lee ◽  
Jungho Kang ◽  
Moon-seog Jun ◽  
Jaekyung Han

The rapid development of Internet technology and the spread of various smart devices have enabled the creation of a convenient environment used by people all around the world. It has become increasingly popular, with the technology known as the Internet of Things (IoT). However, both the development and proliferation of IoT technology have caused various problems such as personal information leakage and privacy violations due to attacks by hackers. Furthermore, countless devices are connected to the network in the sense that all things are connected to the Internet, and network attacks that have thus far been exploited in the existing PC environment are now also occurring frequently in the IoT environment. In fact, there have been many security incidents such as DDoS attacks involving the hacking of IP cameras, which are typical IoT devices, leakages of personal information and the monitoring of numerous persons without their consent. While attacks in the existing Internet environment were PC-based, we have confirmed that various smart devices used in the IoT environment—such as IP cameras and tablets—can be utilized and exploited for attacks on the network. Even though it is necessary to apply security solutions to IoT devices in order to prevent potential problems in the IoT environment, it is difficult to install and execute security solutions due to the inherent features of small devices with limited memory space and computational power in this aforementioned IoT environment, and it is also difficult to protect certificates and encryption keys due to easy physical access. Accordingly, this paper examines potential security threats in the IoT environment and proposes a security design and the development of an intelligent security framework designed to prevent them. The results of the performance evaluation of this study confirm that the proposed protocol is able to cope with various security threats in the network. Furthermore, from the perspective of energy efficiency, it was also possible to confirm that the proposed protocol is superior to other cryptographic protocols. Thus, it is expected to be effective if applied to the IoT environment.


Author(s):  
E. Vance Wilson ◽  
David D. Dobrzykowski ◽  
Joseph A. Cazier

People claim to be concerned about information privacy on the Internet, yet they frequently give out personal information to online vendors and correspondents with whom they have little, if any, prior experience. This behavior is known as the privacy paradox and is particularly relevant to the context of e-health, due to the special risks of health information exposure. Using data from the 2005 Health Information National Trends Survey (HINTS), this study addresses a key question regarding online health information privacy: Do individuals self-police risky e-health activities (i.e., uses where personal information is given out) or are they indifferent to risk based upon generalized trust in broadcast media and the Internet as sources for health information? In exploring this question, our study contrasts several alternative models of health trust, and recommends a new partial-mediation model for future studies. The results show that Internet trust mediates most effects of broadcast media trust on Internet use and that Internet trust plays a much smaller role in motivating Internet uses that are risky than is the case for low-risk uses. These results have important implications for researchers, policymakers, and healthcare administrators in determining the level of privacy protection individuals need in their use of e-health applications.


Cyber Crime ◽  
2013 ◽  
pp. 1177-1192
Author(s):  
E. Vance Wilson ◽  
David D. Dobrzykowski ◽  
Joseph A. Cazier

People claim to be concerned about information privacy on the Internet, yet they frequently give out personal information to online vendors and correspondents with whom they have little, if any, prior experience. This behavior is known as the privacy paradox and is particularly relevant to the context of e-health, due to the special risks of health information exposure. Using data from the 2005 Health Information National Trends Survey (HINTS), this study addresses a key question regarding online health information privacy: Do individuals self-police risky e-health activities (i.e., uses where personal information is given out) or are they indifferent to risk based upon generalized trust in broadcast media and the Internet as sources for health information? In exploring this question, our study contrasts several alternative models of health trust, and recommends a new partial-mediation model for future studies. The results show that Internet trust mediates most effects of broadcast media trust on Internet use and that Internet trust plays a much smaller role in motivating Internet uses that are risky than is the case for low-risk uses. These results have important implications for researchers, policymakers, and healthcare administrators in determining the level of privacy protection individuals need in their use of e-health applications.


Author(s):  
Edward J. Szewczak

The issue of personal information privacy (PIP) and e-commerce (EC) continues to be debated within the community of Internet users. The concerns of privacy advocates conflict with the concerns of technology growth advocates. The challenges to PIP posed by various forms of EC technology are not the result of the technology itself. Rather it is the uses of the technology that pose the threat to the integrity of PIP. In particular, the surreptitious monitoring of user behavior without the user’s consent and the possible misuse of the collected information are the biggest threats to the growth of EC.


2014 ◽  
Vol 2 (2) ◽  
pp. 115 ◽  
Author(s):  
McKay Cunningham

The disparities inherent in various national privacy laws have come into sharper contrast as access to information grows and formerly domestic markets become international. Information flow does not adhere to national boundary lines. Increasingly, laws that seek to protect informational privacy do not either. The European Union took a bold approach by limiting access to its markets for those who failed to observe its strict law designed to protect personal information. The 1995 Directive (and 2014 Regulatory Amendment) embody this approach as they: (1) broadly define personal information; (2) broadly define those who process and control personal information; (3) restrict transfer of personal information to those who cannot demonstrate compliance. Tellingly, the Directive does not limit its scope to certain industries or practices, but requires privacy controls across the board, regardless of whether the processor is a healthcare provider, pastry chef or girl scout. To many, the Directive has failed. While the global trend toward adopting laws similar to the Directive suggests that many States value privacy rights, commentators and empirical studies reveal significant shortcomings. The Directive outlaws harmless activities while allowing exceptions that threaten to swallow the rule. It is simultaneously over-inclusive and under-inclusive. National governments enjoy wide latitude to collect and use personal information under the guise of national security. Perhaps more concerning, technology continues to leapfrog. Information privacy is made continually more difficult with each new “app” and innovation. The Internet of Things is more probable than speculative. Radio-frequency identification is a predicate to computer identification and assimilation of everyday physical objects, enabling the use of these objects to be monitored and inventoried by computers. Tagging and monitoring objects could similarly be accomplished by other technologies like near field communication, barcodes, QR codes and digital watermarking, raising the legitimate argument that informational privacy—at least as envisioned in the 1995 Directive’s absolute terms—is impossible. Informational privacy cannot be accomplished by declaring it a fundamental right and outlawing all processing of personal information. To legally realise and enforce a privacy right in personal information, incremental, graduated, and practical legislation better achieve the goal than sweeping proclamations that have applications to actions unrelated to the harms associated with the absence of the right. With information privacy in particular, a capacious claim of right to all personal information undermines legal enforcement because the harms attending lack of privacy are too often ill-defined and misunderstood. As a result, legal realization of a claimed privacy right in the Age of Information should proceed incrementally and begin with the industries, practices, and processes that cause the most harm by flouting informational privacy. Data mining and data aggregation industries, for example, collect, aggregate and resell personal information without express consent. A targeted prohibition of this industry would reduce financial incentives of the most conspicuous violators and alleviate some of the most egregious privacy infractions. A graduated legal scheme also reduces undue and overbroad Internet regulation. While the right to privacy has been recognised and legally supported in one way or another for centuries, it has not faced the emerging and countervailing Age of Information until now. Current omnibus international legislation reflects the impossibility of legally protecting all privacy in the Age of Information; it also illustrates the need for a refined and practical legal scheme that gradually and directly targets the harms associated with privacy violations.


Sign in / Sign up

Export Citation Format

Share Document