CSC 379:Week 4, Group 3: Difference between revisions
Line 1: | Line 1: | ||
=Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet= | =Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet= | ||
A recent proof-of-concept [http://www.hacker.co.il/security/ie/css_import.html exploit] of Internet Explorer allowed for the running of a search through Google Desktop for passwords on a user’s computer upon visiting a website containing the exploit script. Operating systems, browsers, and other software like desktop searches keep a written history of user activities, of which many users are unaware of | A recent proof-of-concept [http://www.hacker.co.il/security/ie/css_import.html exploit] of Internet Explorer allowed for the running of a search through Google Desktop for passwords on a user’s computer upon visiting a website containing the exploit script. Operating systems, browsers, and other software like desktop searches keep a written history of user activities, of which many users are unaware of. This poses a privacy threat to users as computers with content collected through the use of a variety of programs remains recoverable, even when thought to be deleted. Many business and government agencies implement technologies designed to obscure information on hard drives prior to allowing old computers out of their inventory. However for many non-tech-savvy consumers, such technologies are not implemented, or are impractical (as the case when a computer is disabled and needs repaired, or is confiscated as part of an investigation). In such cases, private information can be exposed, now ever more easily and thoroughly through the use of desktop search technologies. With the Geek Squad allegedly stealing private information from computers serviced, and the government through use of the Patriot Act able to use information collected from a computer normally kept private and inadmissible in court, a number of ethical concerns have become more prevalent as it becomes easier to locate private information. -- Internet search engines also pose a threat to privacy through maintenance of search logs as it may be possible for the government to use subpoenas to acquire normally private user search logs. Google has responded by shortening the length of time it maintains search data, and other search engines have precautions in place as well to protect user privacy. Examine the ethical issues regarding the privacy of searchable content and the impact of search engines both locally and internet based. | ||
==Resources== | ==Resources== | ||
===Relevant Class Website Links:=== | ===Relevant Class Website Links:=== | ||
* [http://ethics.csc.ncsu.edu/abuse/wvt/ http://ethics.csc.ncsu.edu/abuse/wvt/] | * [http://ethics.csc.ncsu.edu/abuse/wvt/ http://ethics.csc.ncsu.edu/abuse/wvt/] |
Revision as of 02:20, 22 July 2007
Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet
A recent proof-of-concept exploit of Internet Explorer allowed for the running of a search through Google Desktop for passwords on a user’s computer upon visiting a website containing the exploit script. Operating systems, browsers, and other software like desktop searches keep a written history of user activities, of which many users are unaware of. This poses a privacy threat to users as computers with content collected through the use of a variety of programs remains recoverable, even when thought to be deleted. Many business and government agencies implement technologies designed to obscure information on hard drives prior to allowing old computers out of their inventory. However for many non-tech-savvy consumers, such technologies are not implemented, or are impractical (as the case when a computer is disabled and needs repaired, or is confiscated as part of an investigation). In such cases, private information can be exposed, now ever more easily and thoroughly through the use of desktop search technologies. With the Geek Squad allegedly stealing private information from computers serviced, and the government through use of the Patriot Act able to use information collected from a computer normally kept private and inadmissible in court, a number of ethical concerns have become more prevalent as it becomes easier to locate private information. -- Internet search engines also pose a threat to privacy through maintenance of search logs as it may be possible for the government to use subpoenas to acquire normally private user search logs. Google has responded by shortening the length of time it maintains search data, and other search engines have precautions in place as well to protect user privacy. Examine the ethical issues regarding the privacy of searchable content and the impact of search engines both locally and internet based.