; Future Issues
Learning Center
Plans & pricing Sign in
Sign Out
Your Federal Quarterly Tax Payments are due April 15th Get Help Now >>

Future Issues


  • pg 1
									Future Issues

Chapter 8

Theory and Policy in Online Privacy

Sameer Hinduja

   General Statistics
        o Privacy on the internet is an important issue
        o 71.5% of 1482 respondents believe internet privacy laws should be developed and
        o 77.5% of 1482 respondents would chose privacy over convenience
                 When visiting a website people believed the following was recorded
                         Email address (54.5%)
                         Location (47.1%)
   Cookies
        o Developed to allow businesses to know the basics of the people visiting their site.
                 May Contain:
                         Times visited site
                         Past behavior or activity at site
                         Where person was referred from
                         Personal information voluntarily given at registration
   Case Studies
        o DoubleClick, Inc.
        o Lexis Nexis
        o P-Trak
        o Yahoo
        o AOL
        o Image Data, LLC
   Legislation
        o “privacy” never mentioned in the Constitution
                 Implicit presence in the First, Third, Fourth, Fifth, Ninth and Fourteenth
                         Upheld by Supreme Court: “penumbral right”
        o Privacy Act of 1974
        o Electronic Communications Privacy Act of 1986
        o Digital Telephony Act, 1994
        o Computer Matching and Privacy Protection Act of 1988
   Social Control
        o Formal and informal mechanisms that promote obedience within society.
                 Family, school, government, religion, culture
                         Anonymity on the internet is sometimes used to escape these controls
        o   Been conditioned to expect only information we choose to be available to be available.
                  We believe our own home to be private, when we are making online purchases
                     or “surfing the net”
                  Individuals must recognize they are committing a business transaction
   Defense against Intrusion
       o Electronic Frontier Foundation
       o Electronic Privacy Information Center
       o Center for Democracy and Technology
       o Most believe government legislation is the only solution to personal privacy
   Routine Activities
       o Following normative behavior dictates in the course of their routine life activities, they
            give no reason for additional attention.
       o By straying from orthodox definitions of acceptable activity, one brings himself
            additional notice and consideration by others. Labeling them as a deviant.
                  Those who engage in questionable activity are considered deviants whose
                     behavior should be corrected in the interests of the community.
   Suggestions for Theory Testing
       o Social Control
                  Qualitative survey
                  Why businesses and organizations online feel less compelled to honor privacy
                     concerns of the consumer based than in real space.
       o Routine Activities
                  Determine what makes some individuals more apt to employ technological
                     methods to prevent breaches of their privacy online.
   Conclusion
       o Introduce a 27th Amendment for privacy in cyberspace.
       o Privacy is a fundamental human right.

To top