CSC 379:Week 4, Group 3: Difference between revisions

From Expertiza_Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 6: Line 6:
==Privacy Concerns==
==Privacy Concerns==
===Introduction===
===Introduction===
Most internet users are not aware that what they type into seemingly benign search engines is being stored in a database. Though the the tracking methodologies differ across search engines the data is often associated by an ip address or name or both, depending on how much information you've shared with the search engine. This information is very valuable to online advertisers and marketers who can use it to focus and target their campaigns and leverage what people search for in order to reveal their curiosities, anxieties, fears, and personal dillemas in order to increase their profits.
Most internet users are not aware that what they type into seemingly benign search engines is being stored in a database. Though the the tracking methodologies differ across search engines the data is often associated by an ip address or name or both, depending on how much information you've shared with the search engine. This information is very valuable to online advertisers and marketers who can use it to focus and target their campaigns and leverage what people search for, revealing their curiosities, anxieties, fears, and personal dillemas in order to increase their profits.


'''Examine the ethical issues regarding the privacy of searchable content and the impact of search engines both locally and internet based.'''
'''Examine the ethical issues regarding the privacy of searchable content and the impact of search engines both locally and internet based.'''

Revision as of 23:18, 26 July 2007

Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet

A recent proof-of-concept exploit of Internet Explorer allowed for the running of a search through Google Desktop for passwords on a user’s computer upon visiting a website containing the exploit script. Operating systems, browsers, and other software like desktop searches keep a written history of user activities, of which many users are unaware of. This poses a privacy threat to users as computers with content collected through the use of a variety of programs remains recoverable, even when thought to be deleted. Many business and government agencies implement technologies designed to obscure information on hard drives prior to allowing old computers out of their inventory. However for many non-tech-savvy consumers, such technologies are not implemented, or are impractical (as the case when a computer is disabled and needs repaired). In such cases, private information can be exposed, now ever more easily and thoroughly through the use of desktop search technologies.

Internet search engines also pose a threat to privacy through maintenance of search logs as it may be possible for the government to use subpoenas to acquire normally private user search logs. Google has responded by shortening the length of time it maintains search data, and other search engines have precautions in place as well to protect user privacy.

Privacy Concerns

Introduction

Most internet users are not aware that what they type into seemingly benign search engines is being stored in a database. Though the the tracking methodologies differ across search engines the data is often associated by an ip address or name or both, depending on how much information you've shared with the search engine. This information is very valuable to online advertisers and marketers who can use it to focus and target their campaigns and leverage what people search for, revealing their curiosities, anxieties, fears, and personal dillemas in order to increase their profits.

Examine the ethical issues regarding the privacy of searchable content and the impact of search engines both locally and internet based.

Resources

Relevant External Links:

Relevant Class Website Links: