Privacy: Difference between revisions

The educational technology and digital learning wiki
Jump to navigation Jump to search
Line 3: Line 3:
== Introduction ==
== Introduction ==


Massive use of ICT in business and private life has led to [http://en.wikipedia.org/wiki/Personally_identifiable_information personally identifiable information] ('''PII'''), i.e. information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual (Wikipedia). In addition, the use of [[social software]] and in particular [[social networking]] applications like Facebook allows to draw quite extensive digital profiles of many people. This situation requires - at least in principle - that person adopt some kind of ''Personal Information Management'' (PIM; Jones, 2008) strategy.
Massive use of ICT in business and private life has led to [http://en.wikipedia.org/wiki/Personally_identifiable_information personally identifiable information] ('''PII'''), i.e. information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual (Wikipedia). In addition, the use of [[social software]] and in particular [[social networking]] applications like Facebook allows to draw quite extensive digital profiles of many people. This situation requires - at least in principle - that persons adopt some kind of strategy to manage this information (Jones, 2008).
 
Some [http://en.wikipedia.org/wiki/Personal_information_management Personal Information Management] tools also may touch privacy issues. Wikipedia's [http://en.wikipedia.org/wiki/Internet_privacy Internet privacy] article lists several types of risks to privacy, i.e. HTTP cookies, Flash cookies, Evercookies, Photographs, ernet, Search engines, Data logging, Privacy within social networking sites, and Internet service providers.


See also: [[ICT in society]] and [[online identity]]
See also: [[ICT in society]] and [[online identity]]
Line 11: Line 13:
* [http://www.ghostery.com/ Ghostery] is a browser plugin that {{quotation|sees the invisible web - tags, web bugs, pixels and beacons. Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity.}}
* [http://www.ghostery.com/ Ghostery] is a browser plugin that {{quotation|sees the invisible web - tags, web bugs, pixels and beacons. Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity.}}


* [http://duckduckgo.com/ DuckDuckGo] is a search engine that provides privacy, i.e. you will not be tracked. Most modern navigators also offer a "navigate in private" option.
* [http://duckduckgo.com/ DuckDuckGo] is a search engine that provides privacy, i.e. you will not be tracked.


== Links ==
== Links ==
Line 28: Line 30:
* Ahmed M, Hoang HH, Karim MS, Khusro S, Lanzenberger M, Latif K, Michlmayr E, Mustofa K, Nguyen HT, Rauber A, Schatten A, Tho MN, Tjoa AM (2004).SemanticLIFE: a framework for managing information of a human lifetime, 6th International Conference on Information Integration and Web-Based Applications and Services (IIWAS), Jakarta, Indonesia. http://storm.ifs.tuwien.ac.at/publications/iiwas2004.pdf.
* Ahmed M, Hoang HH, Karim MS, Khusro S, Lanzenberger M, Latif K, Michlmayr E, Mustofa K, Nguyen HT, Rauber A, Schatten A, Tho MN, Tjoa AM (2004).SemanticLIFE: a framework for managing information of a human lifetime, 6th International Conference on Information Integration and Web-Based Applications and Services (IIWAS), Jakarta, Indonesia. http://storm.ifs.tuwien.ac.at/publications/iiwas2004.pdf.


* Cheng WC, Golubchik L, Kay DG (2004). âTotal Recall: are privacy changes inevitable?â In Proceedings of the Capture, Archive and Retrieval of Personal Experiences Workshop (CARPE) at ACM Multimedia 2004, New York. http://bourbon.usc.edu/iml/recall/papers/carpe2k4-pub.pdf.
* Cheng WC, Golubchik L, Kay DG (2004). Total Recall: are privacy changes inevitable? In Proceedings of the Capture, Archive and Retrieval of Personal Experiences Workshop (CARPE) at ACM Multimedia 2004, New York. http://bourbon.usc.edu/iml/recall/papers/carpe2k4-pub.pdf.


* Coughlin K (2007). Tracking himself, so the FBI won't have to, ''Digital Life with the Star Ledger'', 28th October 2007. http://blog.nj.com/digitallife/2007/10/tracking_himself_so_the_fbi_wo.html.
* Coughlin K (2007). Tracking himself, so the FBI won't have to, ''Digital Life with the Star Ledger'', 28th October 2007. http://blog.nj.com/digitallife/2007/10/tracking_himself_so_the_fbi_wo.html.
Line 34: Line 36:
* Taylor, John A. (2008), "Zero Privacy", IEEE Spectrum 45 (7): 20-20, [http://dx.doi.org/doi:10.1109/MSPEC.2008.4547499 doi:10.1109/MSPEC.2008.4547499]
* Taylor, John A. (2008), "Zero Privacy", IEEE Spectrum 45 (7): 20-20, [http://dx.doi.org/doi:10.1109/MSPEC.2008.4547499 doi:10.1109/MSPEC.2008.4547499]


* Jones D. How to protect your good name against cyberspiteâ, New Scientist. May, 2008a; 24-25.
* Jones D. How to protect your good name against cyberspite, New Scientist. May, 2008a; 24-25.


* O'Hara, Kieron; Tuffield, Mischa M.; Shadbolt, Nigel (2009), "Lifelogging: Privacy and empowerment with memories for life", Identity in the Information Society (Springer), [http://dx.doi.org/doi:10.1007/s12394-009-0008-4 doi:10.1007/s12394-009-0008-4]  
* O'Hara, Kieron; Tuffield, Mischa M.; Shadbolt, Nigel (2009), "Lifelogging: Privacy and empowerment with memories for life", Identity in the Information Society (Springer), [http://dx.doi.org/doi:10.1007/s12394-009-0008-4 doi:10.1007/s12394-009-0008-4]  

Revision as of 18:26, 6 July 2011

Draft

Introduction

Massive use of ICT in business and private life has led to personally identifiable information (PII), i.e. information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual (Wikipedia). In addition, the use of social software and in particular social networking applications like Facebook allows to draw quite extensive digital profiles of many people. This situation requires - at least in principle - that persons adopt some kind of strategy to manage this information (Jones, 2008).

Some Personal Information Management tools also may touch privacy issues. Wikipedia's Internet privacy article lists several types of risks to privacy, i.e. HTTP cookies, Flash cookies, Evercookies, Photographs, ernet, Search engines, Data logging, Privacy within social networking sites, and Internet service providers.

See also: ICT in society and online identity

Software

  • Ghostery is a browser plugin that “sees the invisible web - tags, web bugs, pixels and beacons. Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity.”
  • DuckDuckGo is a search engine that provides privacy, i.e. you will not be tracked.

Links

Bibliography

  • Ahmed M, Hoang HH, Karim MS, Khusro S, Lanzenberger M, Latif K, Michlmayr E, Mustofa K, Nguyen HT, Rauber A, Schatten A, Tho MN, Tjoa AM (2004).SemanticLIFE: a framework for managing information of a human lifetime, 6th International Conference on Information Integration and Web-Based Applications and Services (IIWAS), Jakarta, Indonesia. http://storm.ifs.tuwien.ac.at/publications/iiwas2004.pdf.
  • Jones D. How to protect your good name against cyberspite, New Scientist. May, 2008a; 24-25.
  • O'Hara, Kieron; Tuffield, Mischa M.; Shadbolt, Nigel (2009), "Lifelogging: Privacy and empowerment with memories for life", Identity in the Information Society (Springer), doi:10.1007/s12394-009-0008-4
  • Pounder, C. N. M. (2009), "Nine principles for assessing whether privacy is protected in a surveillance society", Identity in the Information Society (Springer), doi:10.1007/s12394-008-0002-2