More Subjects
Internet Privacy
Name
[Institutional Affiliation(s)]
Author Note
Internet Privacy
Internet privacy consists of subset of a larger set of data privacy that includes the use, collection and storage of confidential information. In the United States, privacy right of individual has always been cherished. This is due to the reason that the consequences of privacy intrusions for individuals can be disastrous. Cyber threats can come from many different sources that are related to the use of personal information for exploitation and benefits. There is a need for more regulatory safeguard measures regarding internet privacy. The internet privacy policy is mostly concern with how internet privacy is exposed over the web through data collection, tracking, cybersecurity and data sharing threat.
According to one research study, it is found that internet privacy is very important for almost 74% of the Americans and more than 86% of the Americans have taken different actions to maintain their internet privacy by adopting different procedures such as encrypting email, deleting cookies and IP address protection ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"4YR7aV3J","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). The invent of tracking technologies known as cookies brought a myriad of resources and helpful tools. Although the internet has achieved great popularity among the general public, most of the people are not familiar with the level of privacy and security on the internet.
According to a survey, 82% of the people showed dissatisfaction with "user profile". This paper will analyze certain policies related to internet privacy and ethical concerns for implementing these policies. A practice which different companies use to track and record data. Whenever a person visits website, enter his debit or credit card number, fill out online forms, sign up for new accounts, post on some social media site, store document or image in cloud storage release personal information and data into cyberspace ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"SH8AnShT","properties":{"formattedCitation":"(Tesfay et al., 2018)","plainCitation":"(Tesfay et al., 2018)","noteIndex":0},"citationItems":[{"id":431,"uris":["http://zotero.org/users/local/qnvKw9vm/items/FPGY9PW2"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/FPGY9PW2"],"itemData":{"id":431,"type":"paper-conference","container-title":"Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics","ISBN":"1-4503-5634-6","page":"15-21","publisher":"ACM","title":"PrivacyGuide: towards an implementation of the EU GDPR on internet privacy policy evaluation","author":[{"family":"Tesfay","given":"Welderufael B."},{"family":"Hofmann","given":"Peter"},{"family":"Nakamura","given":"Toru"},{"family":"Kiyomoto","given":"Shinsaku"},{"family":"Serna","given":"Jetzabel"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Tesfay et al., 2018). The definition of internet privacy differs across different cultures and individuals ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"AKcHYuqz","properties":{"formattedCitation":"({\\i{}The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon}, n.d.)","plainCitation":"(The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon, n.d.)","noteIndex":0},"citationItems":[{"id":434,"uris":["http://zotero.org/users/local/qnvKw9vm/items/H8WL7ZAZ"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/H8WL7ZAZ"],"itemData":{"id":434,"type":"motion_picture","abstract":"Mark Zuckerberg may have declared that privacy is no longer a social norm, but Alasdair Allan believes a backlash is coming. In this talk, he explores how the internet has changed the concept of ownership and explains why the Internet of Things – combined with the EU’s General Data Protection Regulation – could soon determine whether we have any privacy at all. \n\nAlasdair is a scientist, author, hacker and journalist.\n\n---\nTEDxExeterSalon: From driverless cars to diagnosis of medical imaging, artificial intelligence is being heralded as the next industrial revolution. But how does AI relate to us in all our glorious complex humanity? Our first TEDxExeterSalon explored the ways in which we’ll interact with algorithmic intelligence in the near future.\n\nTEDxExeter: Now in our 7th year, TEDxExeter is Exeter’s Ideas Festival with global reach, licensed by TED and organised by volunteers who are passionate about spreading great ideas in our community. \n\nMore information: http://www.tedxexeter.com\nProduction: http://www.youtube.com/familygamertv\nFilming: http://firstsightmedia.co.uk/ In the past he has mesh networked the Moscone Center, caused a U.S. Senate hearing, and contributed to the detection of what was — at the time —the most distant object yet discovered. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at https://www.ted.com/tedx","dimensions":"4:34","source":"YouTube","title":"The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon","URL":"https://www.youtube.com/watch?v=yG4JL0ZRmi4","accessed":{"date-parts":[["2020",1,5]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon, n.d.).
The internet serves as the main means of communication and it is a platform of financial transaction and exchange of critical data. With the increasing use of the internet for different purposes, a new concept of internet privacy has evolved. It deals with addressing the user information security need and also the prevention of disclosure of web user personal information without their consent. In recent years' technology made it possible to view user information that is shared on the web ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"GyuDAlEy","properties":{"formattedCitation":"(Gul et al., 2017)","plainCitation":"(Gul et al., 2017)","noteIndex":0},"citationItems":[{"id":373,"uris":["http://zotero.org/users/local/qnvKw9vm/items/CFPASKCT"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/CFPASKCT"],"itemData":{"id":373,"type":"article-journal","container-title":"IJCSNS","issue":"5","page":"159","title":"A survey on role of internet of things in education","volume":"17","author":[{"family":"Gul","given":"Shahla"},{"family":"Asif","given":"Muhammad"},{"family":"Ahmad","given":"Shahbaz"},{"family":"Yasir","given":"Muhammad"},{"family":"Majid","given":"Muhammad"},{"family":"Malik","given":"M. Sheraz Arshad"}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Gul et al., 2017).
The information can be leaked for the wrong reason by invading the internet privacy ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"qGs5Ahr8","properties":{"formattedCitation":"(Heimes, 2017)","plainCitation":"(Heimes, 2017)","noteIndex":0},"citationItems":[{"id":433,"uris":["http://zotero.org/users/local/qnvKw9vm/items/DK954VGJ"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/DK954VGJ"],"itemData":{"id":433,"type":"article-journal","container-title":"Maine Law Review","issue":"1","page":"95","title":"Internet privacy law, policy, and practice: state, federal, and international perspectives","volume":"54","author":[{"family":"Heimes","given":"Rita S."}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Heimes, 2017). This gives rise to the concern of ethical issue regarding the protection of confidential information from unauthorized access. Internet privacy invasion can be avoided with the implementation of strict privacy laws; every act cannot be classified as illegal or legal, for example, monitoring of web user online habit to target potential customers by an advertiser is not illegal. It is ethics which draw the line between breaching user privacy and ensuring network security. In the United States, many laws cover data privacy and internet security. The internet privacy act was passed to create control over the maintenance, collection, dissemination and use of personal information by different agencies in the main branch of the United State government. The internet invention changed the privacy definition and made it important to legislate new laws concerning electronic security and communication. Sharing confidential and personal information through email and transaction means that information or data is no longer remain confidential. However, for ethical and technical reasons, providers of email service do not use information in the wrong manner.
Ethical Guidelines
There are ethical issues regarding reading and storing of emails without the consent of users. With the help of an automated system, emails are scanned by Google. They use this to detect malware and spam and also to tailored advertising ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"M7s1hitD","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). The content of the email, YouTube views, Google profile and map requests are all analyzed and information is further used to create the advertisement. The indexing and scanning cannot be turned off fully thus making it a serious ethical issue in information and data privacy ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"UDLcqyyR","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). During online shopping, people share their bank account details and credit card number on the shopping portal which increase the risk of these details being used for the fraudulent and unethical purpose ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"AKcHYuqz","properties":{"formattedCitation":"({\\i{}The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon}, n.d.)","plainCitation":"(The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon, n.d.)","noteIndex":0},"citationItems":[{"id":434,"uris":["http://zotero.org/users/local/qnvKw9vm/items/H8WL7ZAZ"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/H8WL7ZAZ"],"itemData":{"id":434,"type":"motion_picture","abstract":"Mark Zuckerberg may have declared that privacy is no longer a social norm, but Alasdair Allan believes a backlash is coming. In this talk, he explores how the internet has changed the concept of ownership and explains why the Internet of Things – combined with the EU’s General Data Protection Regulation – could soon determine whether we have any privacy at all. \n\nAlasdair is a scientist, author, hacker and journalist.\n\n---\nTEDxExeterSalon: From driverless cars to diagnosis of medical imaging, artificial intelligence is being heralded as the next industrial revolution. But how does AI relate to us in all our glorious complex humanity? Our first TEDxExeterSalon explored the ways in which we’ll interact with algorithmic intelligence in the near future.\n\nTEDxExeter: Now in our 7th year, TEDxExeter is Exeter’s Ideas Festival with global reach, licensed by TED and organised by volunteers who are passionate about spreading great ideas in our community. \n\nMore information: http://www.tedxexeter.com\nProduction: http://www.youtube.com/familygamertv\nFilming: http://firstsightmedia.co.uk/ In the past he has mesh networked the Moscone Center, caused a U.S. Senate hearing, and contributed to the detection of what was — at the time —the most distant object yet discovered. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at https://www.ted.com/tedx","dimensions":"4:34","source":"YouTube","title":"The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon","URL":"https://www.youtube.com/watch?v=yG4JL0ZRmi4","accessed":{"date-parts":[["2020",1,5]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon, n.d.). On social networking sites, people through status update let everyone know about their location and personal life details. One of the main ethical concern is whether third parties are allowed to read or store emails without the consent of the person or track visitors on their website or not ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"H9MZFYuo","properties":{"formattedCitation":"(Kernighan, 2017)","plainCitation":"(Kernighan, 2017)","noteIndex":0},"citationItems":[{"id":430,"uris":["http://zotero.org/users/local/qnvKw9vm/items/7PH5BRJB"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/7PH5BRJB"],"itemData":{"id":430,"type":"book","ISBN":"0-691-17654-X","publisher":"Princeton University Press","title":"Understanding the digital world: What you need to know about computers, the internet, privacy, and security","author":[{"family":"Kernighan","given":"Brian W."}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Kernighan, 2017). Facebook has very little ways to restrict or protect others from accessing the profile information of a user.
The government holds very important information about people. National security can be threatened if the security of this information is compromised. Therefore, there is a great need that Federal websites maintain a high level of privacy standards to protect a large amount of critical information. The degree of government access to citizen personal information raises the ethical concern in data privacy. There are many organizations which store critical information and personal details of their users ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"rGCTIJvA","properties":{"formattedCitation":"(Kernighan, 2017)","plainCitation":"(Kernighan, 2017)","noteIndex":0},"citationItems":[{"id":430,"uris":["http://zotero.org/users/local/qnvKw9vm/items/7PH5BRJB"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/7PH5BRJB"],"itemData":{"id":430,"type":"book","ISBN":"0-691-17654-X","publisher":"Princeton University Press","title":"Understanding the digital world: What you need to know about computers, the internet, privacy, and security","author":[{"family":"Kernighan","given":"Brian W."}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Kernighan, 2017). These include medical facilities that contain medical record, banks that contain account holder's financial records, educational institutes that have the education and personal details of students and companies that contain a record of the employee.
In the United States, most of the people are employed in handling, collection, distribution and use of information. Mason stated four ethical issues that are related to the information age: accuracy, privacy, access and property. Privacy is a main part of ethics and data accuracy. The internet privacy protection is the main principle of this current age of technology. More than half of the Americans think that their personal information is not secure than it was 5 years ago. In 2017, there was a disastrous breach at Yahoo admission that result in billions of compromised email account.
Over the years the potential for breach of internet privacy has significantly increased. There is no single law that regulates online privacy. In the United States, many laws regarding internet data security and privacy are available with the privacy act 1974 being the base for all. A patchwork of state and federal law regarding internet privacy include different laws related to internet privacy. The new technologies and internet continually raise new privacy and policy questions. There is a need to address these privacy issues on a priority basis ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"P0SLizvo","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). The lawmaker’s documents state laws regarding the personal information held by providers of internet service, website privacy policies, email monitoring, online marketing and reader browsing information.
Current Laws and Policies
The California Consumer Privacy Act (2018) allows the consumers to request the disclosure of specific personal information that is collected. According to this act, the consumer can request business to delete the personal information ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"lQULFWb6","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). This law puts greater restriction on collecting and using information and data by companies. The Federal Trade Commission Act (1914) regulates deceptive and unfair commercial practices. This act is a primary federal regulator in the area of privacy and brings actions and enforcement against companies. This usually includes failing to comply with protection of personal information and privacy policies. The Electronic Communication Privacy Act (1986) protects electronic, wire and oral communications from unauthorized access disclosure and interception ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"2CPi18ep","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). The Computer Fraud and Abuse Act makes some computer-related activities unlawful. This includes the involvement of unauthorized and illegal access of a computer to get access to certain information, transmit harmful items and obtain data or passwords by wrong ways ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"AKcHYuqz","properties":{"formattedCitation":"({\\i{}The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon}, n.d.)","plainCitation":"(The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon, n.d.)","noteIndex":0},"citationItems":[{"id":434,"uris":["http://zotero.org/users/local/qnvKw9vm/items/H8WL7ZAZ"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/H8WL7ZAZ"],"itemData":{"id":434,"type":"motion_picture","abstract":"Mark Zuckerberg may have declared that privacy is no longer a social norm, but Alasdair Allan believes a backlash is coming. In this talk, he explores how the internet has changed the concept of ownership and explains why the Internet of Things – combined with the EU’s General Data Protection Regulation – could soon determine whether we have any privacy at all. \n\nAlasdair is a scientist, author, hacker and journalist.\n\n---\nTEDxExeterSalon: From driverless cars to diagnosis of medical imaging, artificial intelligence is being heralded as the next industrial revolution. But how does AI relate to us in all our glorious complex humanity? Our first TEDxExeterSalon explored the ways in which we’ll interact with algorithmic intelligence in the near future.\n\nTEDxExeter: Now in our 7th year, TEDxExeter is Exeter’s Ideas Festival with global reach, licensed by TED and organised by volunteers who are passionate about spreading great ideas in our community. \n\nMore information: http://www.tedxexeter.com\nProduction: http://www.youtube.com/familygamertv\nFilming: http://firstsightmedia.co.uk/ In the past he has mesh networked the Moscone Center, caused a U.S. Senate hearing, and contributed to the detection of what was — at the time —the most distant object yet discovered. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at https://www.ted.com/tedx","dimensions":"4:34","source":"YouTube","title":"The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon","URL":"https://www.youtube.com/watch?v=yG4JL0ZRmi4","accessed":{"date-parts":[["2020",1,5]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon, n.d.). The Children Online Privacy Protection Act requires that online service providers and some websites obtain consent before using, collecting and disclosing any data from minors under 13 years of age ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"2CPi18ep","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). Under this act, websites are required to collect only the necessary information, post online privacy policy and maintain and create security measures.
Two types of privacy issues raised with the use of internet. First, the aggregation and posting of personal information on the websites violate privacy sometimes. Websites contain all kind of personal information that is made available publicly often without the consent of the person such as a personal address, phone numbers, pictures and video clips. The second ethical issue includes internet user online monitoring ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"2CPi18ep","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). The ethical issue related to internet privacy is the use of malicious software and spyware to commit cybercrime and to steal private information. In the US, most of the cybercrime has been outlawed which reflects a consensus that information stealing is wrong.
In the US, Federal laws against the internet privacy covers credit card fraud, deceptive and unfair law against cybercrimes, fraud in relation with computers, access devices and identification of information and documents. According to these laws, it is illegal to invade the person privacy to steal their information ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"94qKSg4K","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). In 2014, according to the Guardian, some of the best security investigators were under the indictment threat to expose the internet infrastructure. The United States, Computer and Abuse Act makes illegal the breaking and hacking of private system and networks ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"aJXzdThk","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). Threats to internet privacy do not only come from criminals and information can be leaked from Google and Facebook. In the last few years, it is reported that user's private information on Facebook has been shared on different websites and applications that are further use for data mining.
Challenges in Implementing Ethical Guidelines
It is very easy for hackers to hack into any system or computer as long it is connected to the internet. They can use an IP address to access the computer of the user and collect information for the wrong purpose ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"VqB8jE1k","properties":{"formattedCitation":"(Kernighan, 2017)","plainCitation":"(Kernighan, 2017)","noteIndex":0},"citationItems":[{"id":430,"uris":["http://zotero.org/users/local/qnvKw9vm/items/7PH5BRJB"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/7PH5BRJB"],"itemData":{"id":430,"type":"book","ISBN":"0-691-17654-X","publisher":"Princeton University Press","title":"Understanding the digital world: What you need to know about computers, the internet, privacy, and security","author":[{"family":"Kernighan","given":"Brian W."}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Kernighan, 2017). The widespread use of internet cookies also makes it easy to collect any information and exposed internet users to high risk of conflicting and fraud interest. Most of the companies and organizations use these cookies to found which service or product they can advertise to us ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"KrCoyMkj","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). In online banking, hackers can transfer money into their account which affects both customer and bank who is using online technology of banking. Although the internet has enabled people to share and find relevant information, it also exploited the freedom of privacy ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"AKcHYuqz","properties":{"formattedCitation":"({\\i{}The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon}, n.d.)","plainCitation":"(The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon, n.d.)","noteIndex":0},"citationItems":[{"id":434,"uris":["http://zotero.org/users/local/qnvKw9vm/items/H8WL7ZAZ"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/H8WL7ZAZ"],"itemData":{"id":434,"type":"motion_picture","abstract":"Mark Zuckerberg may have declared that privacy is no longer a social norm, but Alasdair Allan believes a backlash is coming. In this talk, he explores how the internet has changed the concept of ownership and explains why the Internet of Things – combined with the EU’s General Data Protection Regulation – could soon determine whether we have any privacy at all. \n\nAlasdair is a scientist, author, hacker and journalist.\n\n---\nTEDxExeterSalon: From driverless cars to diagnosis of medical imaging, artificial intelligence is being heralded as the next industrial revolution. But how does AI relate to us in all our glorious complex humanity? Our first TEDxExeterSalon explored the ways in which we’ll interact with algorithmic intelligence in the near future.\n\nTEDxExeter: Now in our 7th year, TEDxExeter is Exeter’s Ideas Festival with global reach, licensed by TED and organised by volunteers who are passionate about spreading great ideas in our community. \n\nMore information: http://www.tedxexeter.com\nProduction: http://www.youtube.com/familygamertv\nFilming: http://firstsightmedia.co.uk/ In the past he has mesh networked the Moscone Center, caused a U.S. Senate hearing, and contributed to the detection of what was — at the time —the most distant object yet discovered. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at https://www.ted.com/tedx","dimensions":"4:34","source":"YouTube","title":"The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon","URL":"https://www.youtube.com/watch?v=yG4JL0ZRmi4","accessed":{"date-parts":[["2020",1,5]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon, n.d.). There are different ways in which privacy is exploited such as the use of webcams.
In the last few years, many people have become a victim of an online stalker. The ethical guidelines regarding internet privacy should recognize the personal freedom and autonomy. The ethical guidelines also provide a framework of actions regarding the handling of private information. In the view of the law, once the private information of a person has made public, it's no longer consider as private. The freedom and autonomy of a person should be regarded as confidential therefore person information must be handled with confidentiality ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"0jR2qe7Y","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). This implies control and security of the information access and the right to use it. Privacy policy regarding the internet privacy should be formulated consisting of elements such as confidentiality level, use and purpose of information, and the procedures to ensure the information accuracy based on the norms of truth, freedom and human rights ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"Zp9HuaWx","properties":{"formattedCitation":"(Kernighan, 2017)","plainCitation":"(Kernighan, 2017)","noteIndex":0},"citationItems":[{"id":430,"uris":["http://zotero.org/users/local/qnvKw9vm/items/7PH5BRJB"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/7PH5BRJB"],"itemData":{"id":430,"type":"book","ISBN":"0-691-17654-X","publisher":"Princeton University Press","title":"Understanding the digital world: What you need to know about computers, the internet, privacy, and security","author":[{"family":"Kernighan","given":"Brian W."}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Kernighan, 2017). Private and personal information or data that is no longer necessary must be collected and destroyed. No unnecessary personal and private information must be collected. This should not only for the logistics aims but also to prevent the unnecessary exposure and violation of person privacy. The companies must notify the user about the use of their private information.
The privacy policy should be posted on all websites. Websites that specifically directed at children under 13 years of age must post a notice that includes type of information collected from children, information dissemination plan, the intended use of data and information and involvement of third parties ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"2CPi18ep","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). Different companies are hired specifically to watch which websites are mostly visited by people and then use the information available on these websites for different purposes ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"X7HioGYU","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). The directly observed behaviour such as the content of the profile on Facebook, search queries and browsing logs can be processed automatically to infer details of an individual's such as religious and political views, sexual orientation, personality, intelligence, substance use and race.
The concerns associated with internet privacy usually cite different privacy risks and events that can compromise privacy that can be encountered through use of the internet ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"AKcHYuqz","properties":{"formattedCitation":"({\\i{}The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon}, n.d.)","plainCitation":"(The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon, n.d.)","noteIndex":0},"citationItems":[{"id":434,"uris":["http://zotero.org/users/local/qnvKw9vm/items/H8WL7ZAZ"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/H8WL7ZAZ"],"itemData":{"id":434,"type":"motion_picture","abstract":"Mark Zuckerberg may have declared that privacy is no longer a social norm, but Alasdair Allan believes a backlash is coming. In this talk, he explores how the internet has changed the concept of ownership and explains why the Internet of Things – combined with the EU’s General Data Protection Regulation – could soon determine whether we have any privacy at all. \n\nAlasdair is a scientist, author, hacker and journalist.\n\n---\nTEDxExeterSalon: From driverless cars to diagnosis of medical imaging, artificial intelligence is being heralded as the next industrial revolution. But how does AI relate to us in all our glorious complex humanity? Our first TEDxExeterSalon explored the ways in which we’ll interact with algorithmic intelligence in the near future.\n\nTEDxExeter: Now in our 7th year, TEDxExeter is Exeter’s Ideas Festival with global reach, licensed by TED and organised by volunteers who are passionate about spreading great ideas in our community. \n\nMore information: http://www.tedxexeter.com\nProduction: http://www.youtube.com/familygamertv\nFilming: http://firstsightmedia.co.uk/ In the past he has mesh networked the Moscone Center, caused a U.S. Senate hearing, and contributed to the detection of what was — at the time —the most distant object yet discovered. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at https://www.ted.com/tedx","dimensions":"4:34","source":"YouTube","title":"The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon","URL":"https://www.youtube.com/watch?v=yG4JL0ZRmi4","accessed":{"date-parts":[["2020",1,5]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon, n.d.). These range from collection of user statistics to the spread of spyware and exploitation of different kinds of bugs. Different websites protect the personal information of their users. For example, on Facebook, the privacy setting is present to all registered users. People can block some individuals from viewing their profile and limit access to their pictures and videos ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"2CPi18ep","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). The privacy setting is also available on some other social networking sites such as Twitter and Google Plus. The Electronic Frontier Foundation has formulated different guidelines for users regarding the use of these privacy setting
Various ethical concerns need to be considered during application of these laws for the use of these websites or applications. The laws should be more complex and strict for such applications that store private information data. The Abuse Act make some computer-related activities unlawful counting the unauthorized and illegal access of a computer to get access to certain information, transmit destructive items and obtain data or passwords by wrong ways ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"2CPi18ep","properties":{"formattedCitation":"(Carlson et al., 2018)","plainCitation":"(Carlson et al., 2018)","noteIndex":0},"citationItems":[{"id":429,"uris":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"uri":["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],"itemData":{"id":429,"type":"article-journal","container-title":"Available at SSRN 3142220","title":"Trends in Internet Privacy and Security Perceptions and Online Activity","author":[{"family":"Carlson","given":"Edward"},{"family":"Goldberg","given":"Rafi M."},{"family":"McHenry","given":"Giulia"},{"family":"Lewis","given":"Maureen"},{"family":"Romzek","given":"Wallis"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Carlson et al., 2018). Most of the websites take consent before using, accumulating and revealing any data from minors under 13 years of age. Under different acts, websites and applications are required to assemble only the essential information, post online privacy policy and preserve and generate security measures. Certain applications and websites require all of the essential details and it remains to save on clouds. The paper has significantly identified certain policies and ethical guidelines to establish privacy laws. These laws need specific privacy concerns to be maintained to protect data and information of communities.
References
ADDIN ZOTERO_BIBL {"uncited":[["http://zotero.org/users/local/qnvKw9vm/items/EUFBDNYZ"],["http://zotero.org/users/local/qnvKw9vm/items/DK954VGJ"],["http://zotero.org/users/local/qnvKw9vm/items/KINWX4HL"],["http://zotero.org/users/local/qnvKw9vm/items/7PH5BRJB"],["http://zotero.org/users/local/qnvKw9vm/items/FPGY9PW2"]],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Carlson, E., Goldberg, R. M., McHenry, G., Lewis, M., & Romzek, W. (2018). Trends in Internet Privacy and Security Perceptions and Online Activity. Available at SSRN 3142220.
Gul, S., Asif, M., Ahmad, S., Yasir, M., Majid, M., & Malik, M. S. A. (2017). A survey on the role of internet of things in education. IJCSNS, 17(5), 159.
Heimes, R. S. (2017). Internet privacy law, policy, and practice: State, federal, and international perspectives. Maine Law Review, 54(1), 95.
Kernighan, B. W. (2017). Understanding the digital world: What you need to know about computers, the internet, privacy, and security. Princeton University Press.
Tesfay, W. B., Hofmann, P., Nakamura, T., Kiyomoto, S., & Serna, J. (2018). PrivacyGuide: Towards an implementation of the EU GDPR on internet privacy policy evaluation. Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, 15–21.
The coming privacy crisis on the Internet of Things | Alasdair Allan | TEDxExeterSalon. (n.d.). Retrieved January 5, 2020, from https://www.youtube.com/watch?v=yG4JL0ZRmi4
Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250–1258.
More Subjects
Join our mailing list
© All Rights Reserved 2024