CSC 379:Week 4, Group 6

From Expertiza_Wiki
Revision as of 20:30, 26 July 2007 by Jmsevits (talk | contribs) (update to sync with other prompt)
Jump to navigation Jump to search

Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet

A recent proof-of-concept exploit of Internet Explorer allowed for the running of a search through Google Desktop for passwords on a user’s computer upon visiting a website containing the exploit script. Operating systems, browsers, and other software like desktop searches keep a written history of user activities, of which many users are unaware of. This poses a privacy threat to users as computers with content collected through the use of a variety of programs remains recoverable, even when thought to be deleted. Many business and government agencies implement technologies designed to obscure information on hard drives prior to allowing old computers out of their inventory. However for many non-tech-savvy consumers, such technologies are not implemented, or are impractical (as the case when a computer is disabled and needs repaired). In such cases, private information can be exposed, now ever more easily and thoroughly through the use of desktop search technologies.

Internet search engines also pose a threat to privacy through maintenance of search logs as it may be possible for the government to use subpoenas to acquire normally private user search logs. Google has responded by shortening the length of time it maintains search data, and other search engines have precautions in place as well to protect user privacy.

Examine the ethical issues regarding the privacy of searchable content and the impact of search engines both locally and internet based.

Resources

Relevant External Links:

Relevant Class Website Links: