book

Privacy and Software Engineering

21 Pages 699 Words 1557 Views

You may think your online life is not important, but to ad marketers, data brokers, and hackers it is a treasure trove of valuable information. The data generated as you browse online, update your Tweet, and order that cool new gadget on Ebay creates a digital footprint larger than the illusive Sasquatch. The fallacy with online privacy is the significant difference between what users think his or her online privacy rights are and what they actually are; some of the websites you know and trust on a daily basis are the most notorious for collecting, using and selling your information. In a recent poll conducted by TRUSTe, 92% of the United States’ citizens stated that they are concerned about their online privacy. Google and Facebook, the two largest Web and mobile data-mining superpowers, are trusted by millions of users every day with sensitive information, such as: street addresses, phone numbers, emails, passwords and search history. Every time a person uses a service provided by one of these sites, they inadvertently agree to the sites’ terms and conditions. Isn’t it ironic, when individuals were asked about what they agreed to in the privacy statements, most people confessed that they did not read them; and yet their lives are being held hostage to the very thing they assumed protected them. What most people do not know is that, hidden within the fine print of most websites and mobile phone applications, lies the power to track and monitor every detail of a user’s actions at any given time. Just how far can websites go when accessing your data, credentials, and location? Websites and internet services use a myriad of information-grabbing tools: cookies, web-browser history, keywords, Global Positioning System (GPS) triangulation of frequently visited locations, and even facial recognition. Most sites today use cookies and keywords to track our interests, which in turn, is useful and valuable to ad marketers. Searc

Read Full Essay