CSC 379:Week 4, Group 3: Difference between revisions
No edit summary |
|||
Line 3: | Line 3: | ||
Internet search engines also pose a threat to privacy through maintenance of search logs as it may be possible for the government to use subpoenas to acquire normally private user search logs. Google has responded by shortening the length of time it maintains search data, and other search engines have precautions in place as well to protect user privacy. | Internet search engines also pose a threat to privacy through maintenance of search logs as it may be possible for the government to use subpoenas to acquire normally private user search logs. Google has responded by shortening the length of time it maintains search data, and other search engines have precautions in place as well to protect user privacy. | ||
==Privacy Concerns== | |||
Most internet users are not aware that what they type into seemingly benign search engines is being stored in a database. Though the the tracking methodologies differ across search engines the data is associated by your ip address or name or both, depending on how much information you've shared with the search engine. | |||
'''Examine the ethical issues regarding the privacy of searchable content and the impact of search engines both locally and internet based.''' | '''Examine the ethical issues regarding the privacy of searchable content and the impact of search engines both locally and internet based.''' |
Revision as of 23:07, 26 July 2007
Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet
A recent proof-of-concept exploit of Internet Explorer allowed for the running of a search through Google Desktop for passwords on a user’s computer upon visiting a website containing the exploit script. Operating systems, browsers, and other software like desktop searches keep a written history of user activities, of which many users are unaware of. This poses a privacy threat to users as computers with content collected through the use of a variety of programs remains recoverable, even when thought to be deleted. Many business and government agencies implement technologies designed to obscure information on hard drives prior to allowing old computers out of their inventory. However for many non-tech-savvy consumers, such technologies are not implemented, or are impractical (as the case when a computer is disabled and needs repaired). In such cases, private information can be exposed, now ever more easily and thoroughly through the use of desktop search technologies.
Internet search engines also pose a threat to privacy through maintenance of search logs as it may be possible for the government to use subpoenas to acquire normally private user search logs. Google has responded by shortening the length of time it maintains search data, and other search engines have precautions in place as well to protect user privacy.
Privacy Concerns
Most internet users are not aware that what they type into seemingly benign search engines is being stored in a database. Though the the tracking methodologies differ across search engines the data is associated by your ip address or name or both, depending on how much information you've shared with the search engine.
Examine the ethical issues regarding the privacy of searchable content and the impact of search engines both locally and internet based.
Resources
Relevant External Links:
- Wikipedia - AOL Search Data Scandal
- New York Times - "A Face Is Exposed for AOL Searcher No. 4417749"