CSC 379:Week 4, Group 3: Difference between revisions
Line 1: | Line 1: | ||
=Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet= | =Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet= | ||
A recent proof-of-concept [http://www.hacker.co.il/security/ie/css_import.html exploit] of Internet Explorer allowed for the running of a search through Google Desktop for passwords on a user’s computer upon visiting a website containing the exploit script. Operating systems, browsers, and other software like desktop searches keep a written history of user activities, of which many users are unaware of. This poses a privacy threat to users as computers with content collected through the use of a variety of programs remains recoverable, even when thought to be deleted. Many business and government agencies implement technologies designed to obscure information on hard drives prior to allowing old computers out of their inventory. However for many non-tech-savvy consumers, such technologies are not implemented, or are impractical (as the case when a computer is disabled and needs repaired | A recent proof-of-concept [http://www.hacker.co.il/security/ie/css_import.html exploit] of Internet Explorer allowed for the running of a search through Google Desktop for passwords on a user’s computer upon visiting a website containing the exploit script. Operating systems, browsers, and other software like desktop searches keep a written history of user activities, of which many users are unaware of. This poses a privacy threat to users as computers with content collected through the use of a variety of programs remains recoverable, even when thought to be deleted. Many business and government agencies implement technologies designed to obscure information on hard drives prior to allowing old computers out of their inventory. However for many non-tech-savvy consumers, such technologies are not implemented, or are impractical (as the case when a computer is disabled and needs repaired). In such cases, private information can be exposed, now ever more easily and thoroughly through the use of desktop search technologies. | ||
Internet search engines also pose a threat to privacy through maintenance of search logs as it may be possible for the government to use subpoenas to acquire normally private user search logs. Google has responded by shortening the length of time it maintains search data, and other search engines have precautions in place as well to protect user privacy. | |||
'''Examine the ethical issues regarding the privacy of searchable content and the impact of search engines both locally and internet based.''' | |||
==Resources== | ==Resources== | ||
===Relevant External Links:=== | |||
* [http://en.wikipedia.org/wiki/AOL_search_data_scandal Wikipedia - AOL Search Data Scandal] | |||
* [http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000en=f6f61949c6da4d38ei=5090 New York Times - "A Face Is Exposed for AOL Searcher No. 4417749"] | |||
===Relevant Class Website Links:=== | ===Relevant Class Website Links:=== | ||
* [http://ethics.csc.ncsu.edu/abuse/wvt/ http://ethics.csc.ncsu.edu/abuse/wvt/] | * [http://ethics.csc.ncsu.edu/abuse/wvt/ http://ethics.csc.ncsu.edu/abuse/wvt/] |
Revision as of 20:30, 26 July 2007
Privacy of Search Content / Search Engines both Local (Desktop Search) and Internet
A recent proof-of-concept exploit of Internet Explorer allowed for the running of a search through Google Desktop for passwords on a user’s computer upon visiting a website containing the exploit script. Operating systems, browsers, and other software like desktop searches keep a written history of user activities, of which many users are unaware of. This poses a privacy threat to users as computers with content collected through the use of a variety of programs remains recoverable, even when thought to be deleted. Many business and government agencies implement technologies designed to obscure information on hard drives prior to allowing old computers out of their inventory. However for many non-tech-savvy consumers, such technologies are not implemented, or are impractical (as the case when a computer is disabled and needs repaired). In such cases, private information can be exposed, now ever more easily and thoroughly through the use of desktop search technologies.
Internet search engines also pose a threat to privacy through maintenance of search logs as it may be possible for the government to use subpoenas to acquire normally private user search logs. Google has responded by shortening the length of time it maintains search data, and other search engines have precautions in place as well to protect user privacy.
Examine the ethical issues regarding the privacy of searchable content and the impact of search engines both locally and internet based.
Resources
Relevant External Links:
- Wikipedia - AOL Search Data Scandal
- New York Times - "A Face Is Exposed for AOL Searcher No. 4417749"