Privacy – Plug the Internet Peep Hole

The Internet is a relatively new technology that has developed explosively during the last 10 years. The Internet-technology has been accepted rapidly by users, but the legal and ethical aspects have not been updated at the same rapid rate. Trust in electronic services or products is founded on knowledge and an understanding of what happens during a session and of the effects that might occur. Within electronically based services there are obvious risks for invisible and undesired results such as intrusions on privacy. In the traditional relationship of a service provider and a user, the question of privacy is clear, whereas in the new, Internet-related relationship between a service provider and a user, it is not. We have performed an informed survey concerning privacy, carried out through interviews. From the answers in the interviews it is clear that the threat against privacy is perceived as a problem, but that it is overshadowed by other issues such as safe conducts of payment, functioning distribution systems and reclamation etc. This could be due to the difficulty of addressing an intangible problem such as privacy when there are other issues that are as important and easier to address since they concern an actual purchase….

Contents

1. INTRODUCTION
1.1. BACKGROUND
1.2. PURPOSE
1.3. TARGET GROUP
1.4. LIMITATIONS AND ASSUMPTIONS
1.5. PROBLEM DESCRIPTION
1.6. STATEMENT
1.7. HYPOTHESIS
1.8. METHOD
2. WHAT IS ELECTRONIC SECURITY?
2.1. SECURITY IN DISTRIBUTED SYSTEMS AND NETWORKS
2.1.2. DEFENSIVE AND OFFENSIVE SECURITY
2.1.3. PUBLIC KEY INFRASTRUCTURE
2.1.4. SECURITY IN COMMUNICATION
2.1.5. SECURITY POLICY
2.1.6. EXPANDED MODEL FOR ELECTRONIC SECURITY
2.2. E-COMMERCE
2.3. EUROPEAN IT-POLICY
2.4. SWEDISH IT-POLICY
2.4.1. THE PERSONAL DATA ACT
2.5. PRIVACY
3. ASSESSMENT OF SURVEY
3.1. THE INTERVIEWS
3.2. LABELS
3.2.1. LABELLING OF PRIVACY ON WEB-SITES
3.2.2. SAFE HARBOR
4. DISCUSSION
4.1. TRENDS AND RISKS
4.2. POSSIBLE ADVANTAGES AND DISADVANTAGES WITH LABELLING
4.3. RAISING THE AWARENESS OF THE INTERNET USER
4.4. OUR WORK
4.5. WHERE DO WE GO FROM HERE?
5. CONCLUSION
6. REFERENCES
6.1. WEBSITES ETC.APPENDICES
APPENDIX A: GLOSSARY
APPENDIX B: LIST OF INQUIRED INTERVIEW SUBJECTS
APPENDIX C: SECURITY MODELS
APPENDIX D: LABELLING OF WEB-SITES

Author: Petra Denebo, Anna-Katrine Linder

Source: Blekinge Institute of Technology

Reference URL 1: Visit Now

Leave a Comment