Privacy: Difference between revisions

The educational technology and digital learning wiki
Jump to navigation Jump to search
Line 1: Line 1:
{{stub}}
{{stub}}


== Introduction ==
Massive use of ICT in business and private life has led to [http://en.wikipedia.org/wiki/Personally_identifiable_information personally identifiable information] ('''PII'''), i.e. information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual (Wikipedia). In addition, the use of [[social software]] and in particular [[social networking]] applications like Facebook allows to draw quite extensive digital profiles of many people. This situation requires - at least in principle - that person adopt some kind of ''Personal Information Management'' (PIM; Jones, 2008) strategy.


See also: [[ICT in society]] and [[online identity]]
See also: [[ICT in society]] and [[online identity]]
Line 6: Line 9:
== Software ==
== Software ==


* [http://www.ghostery.com/ Ghostery]
* [http://www.ghostery.com/ Ghostery] is a browser plugin that {{quotation|sees the invisible web - tags, web bugs, pixels and beacons. Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity.}}
 
* [http://duckduckgo.com/ DuckDuckGo] is a search engine that provides privacy, i.e. you will not be tracked.
 
== Links ==
 
* [http://en.wikipedia.org/wiki/Identity_in_the_Information_Society Identity_in_the_Information_Society]
* [http://en.wikipedia.org/wiki/Privacy Privacy] (Wikipedia)
* [http://en.wikipedia.org/wiki/Internet Privacy Internet Privacy] (Wikipedia).
* [http://en.wikipedia.org/wiki/Personally_identifiable_information Personally identifiable information]
* [http://en.wikipedia.org/wiki/Personal_identity_(philosophy) Personal identity (philosophy)]
* [http://en.wikipedia.org/wiki/Identity_(social_science) Identity (social science)]
 
* Dürhager, Robert und Timo Heuer (2009) [http://www.dnadigital.de/networks/wiki/index.manifesto DNAdigital Manifest der Digital Natives], version 1.06, téléchargé le 20 Avril 2009.
 
== Bibliography ==
 
* Ahmed M, Hoang HH, Karim MS, Khusro S, Lanzenberger M, Latif K, Michlmayr E, Mustofa K, Nguyen HT, Rauber A, Schatten A, Tho MN, Tjoa AM (2004).SemanticLIFE: a framework for managing information of a human lifetime, 6th International Conference on Information Integration and Web-Based Applications and Services (IIWAS), Jakarta, Indonesia. http://storm.ifs.tuwien.ac.at/publications/iiwas2004.pdf.
 
* Cheng WC, Golubchik L, Kay DG (2004). âTotal Recall: are privacy changes inevitable?â In Proceedings of the Capture, Archive and Retrieval of Personal Experiences Workshop (CARPE) at ACM Multimedia 2004, New York. http://bourbon.usc.edu/iml/recall/papers/carpe2k4-pub.pdf.
 
* Coughlin K (2007). Tracking himself, so the FBI won't have to, ''Digital Life with the Star Ledger'', 28th October 2007. http://blog.nj.com/digitallife/2007/10/tracking_himself_so_the_fbi_wo.html.
 
* Taylor, John A. (2008), "Zero Privacy", IEEE Spectrum 45 (7): 20-20, [http://dx.doi.org/doi:10.1109/MSPEC.2008.4547499 doi:10.1109/MSPEC.2008.4547499]
 
* Jones D. How to protect your good name against cyberspiteâ, New Scientist. May, 2008a; 24-25.
 
* O'Hara, Kieron; Tuffield, Mischa M.; Shadbolt, Nigel (2009), "Lifelogging: Privacy and empowerment with memories for life", Identity in the Information Society (Springer), [http://dx.doi.org/doi:10.1007/s12394-009-0008-4 doi:10.1007/s12394-009-0008-4]
 
* Pounder, C. N. M. (2009), "Nine principles for assessing whether privacy is protected in a surveillance society", Identity in the Information Society (Springer), [http://dx.doi.org/doi:10.1007/s12394-008-0002-2 doi:10.1007/s12394-008-0002-2]


[[fr:Vie privée et informatique]]  
[[fr:Vie privée et informatique]]  

Revision as of 18:17, 6 July 2011

Draft

Introduction

Massive use of ICT in business and private life has led to personally identifiable information (PII), i.e. information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual (Wikipedia). In addition, the use of social software and in particular social networking applications like Facebook allows to draw quite extensive digital profiles of many people. This situation requires - at least in principle - that person adopt some kind of Personal Information Management (PIM; Jones, 2008) strategy.

See also: ICT in society and online identity

Software

  • Ghostery is a browser plugin that “sees the invisible web - tags, web bugs, pixels and beacons. Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity.”
  • DuckDuckGo is a search engine that provides privacy, i.e. you will not be tracked.

Links

Bibliography

  • Ahmed M, Hoang HH, Karim MS, Khusro S, Lanzenberger M, Latif K, Michlmayr E, Mustofa K, Nguyen HT, Rauber A, Schatten A, Tho MN, Tjoa AM (2004).SemanticLIFE: a framework for managing information of a human lifetime, 6th International Conference on Information Integration and Web-Based Applications and Services (IIWAS), Jakarta, Indonesia. http://storm.ifs.tuwien.ac.at/publications/iiwas2004.pdf.
  • Jones D. How to protect your good name against cyberspiteâ, New Scientist. May, 2008a; 24-25.
  • O'Hara, Kieron; Tuffield, Mischa M.; Shadbolt, Nigel (2009), "Lifelogging: Privacy and empowerment with memories for life", Identity in the Information Society (Springer), doi:10.1007/s12394-009-0008-4
  • Pounder, C. N. M. (2009), "Nine principles for assessing whether privacy is protected in a surveillance society", Identity in the Information Society (Springer), doi:10.1007/s12394-008-0002-2