Mosaic: Quantifying Privacy Leakage in Mobile
... such as smart phones or tablets, as well as the emergence of various mobile applications and services, information access is nearly
ubiquitous and literally at our fingertips.
With all the value and convenience it brings to our personal, social, and professional lives, this new era of mobile devices ...
pdf-fulltext - International Review of Information Ethics
... An interactional approach to privacy, based on Simmel’s theory of secrecy, enables us to understand paradoxical situations. On the one hand, measures meant to protect an individual’s privacy are the very mechanisms which produce a feeling of invasion. On the other hand, such reactions do not occur i ...
Full Text
... and ease of use, there are only relatively few people
that seems to use them. A reason for this is that
people are lazy in taking preventive measures of
their health. They see healthcare as “having someone
else to make it better, and not about personal
responsibility” (Cerrato, P. (2012, January 12) ...
Privacy
... order to counteract this, the government
forces everybody to go essentially naked.
This seems silly until you look at the
controversy over new "lower-powered"
airport x-ray machines that have just
enough juice to see through clothing to
look for weapons. Apparently the
government, both in this boo ...
Top-Ranked Applications Transmit Personal IDs, a Journal
... The privacy issue follows Facebook's effort just this month to give its users more control over its apps,
which privacy activists had cited as a potential hole in users' ability to control who sees their
information. On Oct. 6, Facebook created a control panel that lets users see which apps are acc ...
Project In Computer Science Computer Networks
... • How many peers are online and for how much time?
• How can we maintain replicas, how those replicas available to
other peers.
• How many replicas are selected to store a single profile.
• What are the criteria to select replicas.
...
Intelligent Documents
... they have seen personal photos, emails or blog
postings posted where others could see them without
their permission.
Social networking sites make it a lot easier for web
users to get hold of personal information and photos
of people. They can also get hold of someone else’s
messaging accounts and ch ...
Privacy concerns with social networking services
Social networking sites vary in the levels of privacy offered. For some social networking sites like Facebook, providing real names and other personal information is encouraged by the site(onto a page known as a ‘Profile‘). These information usually consist of birth date, current address, and telephone number(s). Some sites also allow users to provide more information about themselves such as interests, hobbies, favorite books or films, and even relationship status. However, there are other social network sites, such as Match.com, where most people prefer to be anonymous. Thus, linking users to their real identity can sometimes be rather difficult. Nevertheless, individuals can sometimes be identified with face re-identification. Studies have been done on two major social networking sites, and it is found that by overlapping 15% of the similar photographs, profile pictures with similar pictures over multiple sites can be matched to identify the users.For sites that do encourage information disclosure, it has been noted that majority of the users have no trouble disclosing their personal information to a large group of people. In 2005, a study was performed to analyze data of 540 Facebook profiles of students enrolled at Carnegie Mellon University. It was revealed that 89% of the users gave genuine names, and 61% gave a photograph of themselves for easier identification. Majority of users also had not altered their privacy setting, allowed a large number of unknown users to have access to their personal information (the default setting originally allowed friends, friends of friends, and non friends of the same network to have full view of a user‘s profile). It is possible for users to block other users from locating them on Facebook, but this must be done by individual basis, and would therefore appear not to be commonly used for a wide number of people. Most users do not realize that while they make use of the security features on Facebook the default setting is restored after each update. All of this has led to many concerns that users are displaying far too much information on social networking sites which may have serious implications on their privacy. Facebook was criticized due to the perceived laxity regarding privacy in the default setting for users.Social network security and privacy issues result from the astronomical amounts of information these sites process each day. Features that invite users to participation—messages, invitations, photos, open platform applications and other applications are often the avenues for others to gain access to a user's private information. In the case of Facebook. Adrienne Felt, a Ph.D. candidate at Berkeley, made small headlines last year when she exposed a potentially devastating hole in the framework of Facebook's third-party application programming interface (API). It made it easier for people to lose their privacy. Felt and her co-researchers found that third-party platform applications on Facebook are provided with far more user information than it is needed. This potential privacy breach is actually built into the systematic framework of Facebook. Unfortunately, the flaws render the system to almost indefensible. ""The question for social networks is resolving the difference between mistakes in implementation and what the design of the application platform is intended to allow,"" said David Evans, Assistant Professor of Computer Science at the University of Virginia. Moreover, there is also the question of who should be hold responsible for the lack of user privacy? According Evan, the answer to the question is not likely to be found, because a better regulated API would be required for Facebook ""to break a lot of applications, [especially when] a lot of companies are trying to make money off [these] applications."" Felt agrees with her conclusion, because ""there are marketing businesses built on top of the idea that third parties can get access to data and user information on Facebook.""