User:Xxldana/Digital privacy

From Wikipedia, the free encyclopedia

Types of privacy[edit][edit]

Information privacy[edit][edit]

Main article: Information privacy

In the context of digital privacy, information privacy is the idea that individuals should have the freedom to determine how their digital information is collected and used. This is particularly relevant for personally identifiable information.

The concept of information privacy has evolved in parallel to the evolution of the field of Information Technology (IT). The rise of networking and computing led to the dramatic change in the ways of information exchange. The baseline for this concept was put forward in the late 1940s, and the third era of privacy development began in the 1990s.

The European Union has various privacy laws that dictate how information may be collected and used by companies. Some of those laws are written to give agency to the preferences of individuals/consumers in how their data is used. The General Data Protection Regulation (GDPR) is an example of this. In other places, like in the United States, privacy law is argued by some to be less developed in this regard. By example, some legislation, or lack thereof, allow companies to self-regulate their collection and dissemination practices of consumer information.

AI and machine learning are pioneering internet privacy rules. Even while these technologies may improve security (by using powerful anomaly detection systems to detect these threats), many worry about their privacy. Even if humans do not know or agree, machine learning systems can identify personal data in massive amounts of data. Artificial intelligence and digital privacy are intimately related, so finding the correct balance between using technology to keep people safe and stopping rights violations is crucial.Fainmesser, I. P., Galeotti, A., & Momot, R. (2023). Digital privacy. Management Science, 69(6), 3157-3173.

Information anonymity[edit][edit]

For a user to keep their information anonymous when accessing the web, onion routing can be used to ensure the protection of their personally identifiable information.

Onion routing was originally developed by the U.S. Naval Research Lab and was intended to anonymize web traffic. The system created a path to any TCP/IP server by creating a pathway of onion routers. Once a pathway has been established, all information that is sent through it is anonymously delivered. When the user has finished utilizing the pathway it was essentially deleted which freed the resources to be used for a new pathway within onion routing. The Onion Routing Project developed into what is today known as Tor, a completely open-sourced and free software. Unlike its predecessor, Tor is able to protect both the anonymity of individuals as well as web providers. This allows people to set up anonymous web servers that in effect provide a censorship-resistant publishing service.

Because digital privacy rules vary by country, foreign enterprises and ISPs find it difficult to operate globally. Even though the EU's General Data Protection Regulation (GDPR) protects data and privacy, certain states have approved weaker laws. Because of this heterogeneity, organizations face extensive compliance duties. Global growth and service provision are affected. Global privacy standards may help make laws more consistent, but they must take into account the varied cultural and legal contexts in which digital privacy is utilized and dealt with.[1]Baruh, L., Secinti, E., & Cemalcilar, Z. (2017). Online privacy concerns and privacy management: A meta-analytical review. Journal of Communication, 67(1), 26-53.

The (no) harm principle[edit][edit]

Following the (no) harm principle of John Stuart Mill, private references must be respected: one can do whatever they want as long as others do not suffer from the consequences of it. In one's private space, alone, a person is free to do whatever they desire.

With the advent of photojournalism, the invasion of celebrities' private lives arose along with the notion of right-to-privacy—or what Samuel D. Warren II and Louis Brandeis branded in 1890 as "the right to be left alone." Today's "privacy incidents" do not exclusively concern celebrities and politicians, as most people are connected and share data: people are not online to be left alone.

As digital information and communication technologies increase exponentially, people need to learn how to utilize them responsibly and protect their personal data more than before. People must know how online data is collected, utilized, and shared to safeguard their privacy. When provided regular digital skill-building opportunities, people may make informed online decisions. People must know their legal privacy rights, how to recognize phishing, and how to navigate social media's confusing privacy settings.[2]Cruz, B. S., & Dias, M. (2020). Does Digital Privacy Really Exist? When the Consumer Is the Product. Saudi Journal of Engineering and Technology, 5(2), 0-4.

Privacy and information breaches[edit][edit]

Methods can be purposely crafted to obtain one's personal information illegally. These directed attacks are commonly referred to as hacking, though that term refers to the general practice and does not address specific hacking methods and implementation. Various hacking methods as it pertains to the invasion of one's digital privacy are outlined below. As it pertains to intent, within hacking, there are two categories of invasion:

1.     Directed attacks against someone individually, and

2.     Directed attacks against groups.

With the latter category, however, a hacker could effectively obtain a specified/particular individual's information through first targeting a larger group. An example of this possibility could be as follows: if a hacker, named individual-A, wishes to obtain a particular person's information, individual-B, they could first target a platform or group that has individual-B's information already, such as a credit agency, or they could likewise target a group that individual-B has previously relinquished/provided their data to, like a social media network or a cloud based data service. Through targeting one of those groups, individual-A could effectively obtain individual-B's information by first hacking all data the group has, including the data of other individuals. Once obtained, the hacker could simply identify individual-B's information within the data and disregard the rest. Digital tools are available online to help thwart personal data theft.

Biometric data is increasingly used to identify and authenticate people. Biometric data covers simple methods like face and fingerprint recognition and more complicated methods like movement and heart rate analysis. Biometric systems protect people well, but they make privacy difficult. Because genetic data is unchangeable, any leak could harm privacy rights. Biometric data collection and storage need ethical considerations in addition to security measures.Fuller, C. S. (2019). Is the market for digital privacy a failure?. Public Choice, 180(3), 353-381.

They unite when social justice and digital privacy concerns lead to overmonitoring vulnerable and disadvantaged people and privacy breaches. Digital tracking and monitoring may suppress activists, journalists, and minorities. When protecting digital privacy, we must consider how privacy breaches affect society. Better social fairness and individual rights are at stake.Athey, S., Catalini, C., & Tucker, C. (2017). The digital privacy paradox: Small money, small costs, small talk (No. w23488). National Bureau of Economic Research.

Development and controversy[edit][edit]

Digital privacy is a trending social concern. For example, over the past decade, the usage of the phrase digital privacy has increased by more than fivefold in published books. A TED talk by Eric Berlow and Sean Gourley following the 2013 mass surveillance disclosures cast a shadow over the privacy of cloud storage and social media. While digital privacy is concerned with the privacy of digital information in general, in many contexts it specifically refers to information concerning personal identity shared over public networks.

As the secrecy of the American Foreign Intelligence Surveillance Act becomes widely disclosed, digital privacy is increasingly recognized as an issue in the context of mass surveillance. Prior to the Edward Snowden disclosures concerning the extent of the NSA PRISM program were revealed in 2013, the public debate on digital privacy mainly centered on privacy concerns with social-networking services, as viewed from within these services. Even after 2013, scandals related to social-media privacy issues have continued to attract public attention. The most notable of these is the coverage of the Facebook–Cambridge Analytica data scandal in 2018, which led to a 66% decrease in public trust of Facebook.

The use of cryptographic software to evade prosecution and harassment while sending and receiving information over computer networks is associated with crypto-anarchism, a movement intending to protect individuals from mass surveillance by the government.

Many people now realize that "Privacy by Design and Default" is essential when creating digital products and services. Privacy concerns are considered throughout product creation. This method uses the strongest privacy settings by default. This approach and privacy safeguards can help businesses gain customer trust and meet regulatory requirements.

Quantum computing threatens internet users' security and privacy. Quantum computers could defeat encryption, which protects internet data. After quantum computing, we will require quantum-proof encryption to protect digital data and interactions. Given the approaching peril, this is crucial.Quach, S., Thaichon, P., Martin, K. D., Weaven, S., & Palmatier, R. W. (2022). Digital technologies: Tensions in privacy and data. Journal of the Academy of Marketing Science, 50(6), 1299-1323.

Article Draft[edit]

Lead[edit]

Article body[edit]

References[edit]

Fahey, R. A., & Hino, A. (2020). COVID-19, digital privacy, and the social limits on data-focused public health responses. International Journal of Information Management, 55, 102181.

Lustgarten, S. D., Garrison, Y. L., Sinnard, M. T., & Flynn, A. W. (2020). Digital privacy in mental healthcare: current issues and recommendations for technology use. Current opinion in psychology, 36, 25-31.

Mwesiumo, D., Halpern, N., Budd, T., Suau-Sanchez, P., & Bråthen, S. (2021). An exploratory and confirmatory composite analysis of a scale for measuring privacy concerns. Journal of Business Research, 136, 63-75.

Okazaki, S., Eisend, M., Plangger, K., de Ruyter, K., & Grewal, D. (2020). Understanding the strategic consequences of customer privacy concerns: A meta-analytic review. Journal of Retailing, 96(4), 458-473.

Quach, S., Thaichon, P., Martin, K. D., Weaven, S., & Palmatier, R. W. (2022). Digital technologies: Tensions in privacy and data. Journal of the Academy of Marketing Science, 50(6), 1299-1323.

Saura, J. R., Ribeiro-Soriano, D., & Palacios-Marqués, D. (2021). From user-generated data to data-driven innovation: A research agenda to understand user privacy in digital markets. International Journal of Information Management, 60, 102331.

Tronnier, F., & Biker, P. (2022). A framework and qualitative evaluation of privacy concerns in the digital euro.

Vimalkumar, M., Sharma, S. K., Singh, J. B., & Dwivedi, Y. K. (2021). ‘Okay google, what about my privacy?’: User's privacy perceptions and acceptance of voice based digital assistants. Computers in Human Behavior, 120, 106763.

  1. ^ Baruh, Lemi; Secinti, Ekin; Cemalcilar, Zeynep (2017-01-17). "Online Privacy Concerns and Privacy Management: A Meta-Analytical Review". Journal of Communication. 67 (1): 26–53. doi:10.1111/jcom.12276. ISSN 0021-9916.
  2. ^ Cruz, Bruno Silveira; Oliveira Dias, Dr. Murillo de (2020-02-29). "Does Digital Privacy Really Exist? When the Consumer Is the Product". Saudi Journal of Engineering and Technology. 05 (02): 68–72. doi:10.36348/sjet.2020.v05i02.005. ISSN 2415-6272.