1.3+++Privacy+and+anonymity


 * 1.3 Privacy and anonymity **

** Privacy ** is the ability of individuals and groups to determine for themselves when, how and to what extent information about themselves is shared with others. At its extreme, privacy becomes **anonymity** when, for instance, a person uses it to conceal his or her true identity in order to cyber-bully someone else. Conversely, excessive privacy could also conceal the perpetrators of criminal, terrorist or computer hacking acts from law enforcement agencies.   Business
 * Strand 1.3 Privacy and anonymity ||
 * Date || Article || Comments || Tags ||
 * March 2011 || Judge Hands Over IP Logs of Several Geohot Sites to Sony || 1. Identify the area of impact the scenario relates to.

2. Identify the main stakeholders to the IT system. Sony, Geohot, users of PS3, users of Geohot, twitter, youtube, Google

3. Identify one ITGS social/ethical concern in the article. Privacy and anonymity

4. Describe ITGS terminology and systems. IP address : An Internet Protocol address (IP address) is usually a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. Sources : http://en.wikipedia.org/wiki/IP_address iOS : iOS is Apple's mobile operating system. It was originally developed for the iPhone, and it has extended to support other Apple devices such as the iPod touch, iPad and Apple TV. Geohot : George Hotz, known for working with other people to unlock the iPhone, allowing the phone to be used with other wireless carriers.

5. If possible, describe a solution to the concern (issue). There is no possible solution because even if Sony gets hold of all IP addresses, there will be alternate ways for users to still access GeoHot’s websites and videos. Moreover, the US justice system shouldn’t give rights to companies to access personal information, because it is basically invading peoples’ privacy. ||  || Business and Employment
 * Nov. 2010 || FoxNews.com - Uncovered: Images From Full-Body Scanners Hit the Web || 1. Identify the area of impact the scenario relates to.

2. Identify the main stakeholders to the IT system. People who go through full-body scans Operators controlling the scan machines

3. Identify one ITGS social/ethical concern in the article Privacy

4. Describe ITGS terminology and systems. The systems in this situation include both hardware and software. The hardware is the actual scanning machine while the software is the scanning machine's system that controls whether or not the scanned files of the people passing through are saved into the system or discarded or not.

5. If possible, describe a solution to the concern (issue). Modifying the system to remove the option of saving files could be useful because if the option to save was not present, then it can be assured that the operators do not have the ability to go against the policy. If it is a requirement for the system to need to save files, then the system should be modified to only save files that detect an abnormality that goes against the policy of the scanning. (For example if the scan shows that the person is carrying weapons etc.) Only having the authorized people to view it when it is need with stricter rules. ||  || A VPN means virtual private network and what it does is that it send you data over the Internet in a secure connection. It travels packet over unprotected network in a secured manner. It provides you tunnel which secures your data and send it encrypted form over the Internet.
 * 3월.11 || China Tightens Electronic Censorship - NYTimes.com || 1) Describe VPN.

2) How does a proxy work? By using a proxy the web browser window is then coded as part of the proxy site address and not the real website the surfer is visiting. Any information cached in the temporary folder is that of the proxy, not the users. This means the user is not traced at all and the information is kept hidden. Article Source: http://EzineArticles.com/3786946

3) List a proxy you find useful. Tor Trycatchme anonsafe

4) When would you use a proxy? When you want to hide your IP from anyone. It is a good idea to use it while online shopping, accessing bank websites, and putting personal information.

5) Explain: Google has "played a role in manufacturing social disorder". This means that Google has been the source of creating all the social disorder in the real world. Examples of these social disorders include the Libyan Protests as well as the Egypt Protests. These are named as social disorders. And Google, who feeds information to the various organizations and governments as well as provide social networking interfaces play a role in the community to communicate with each other in order to plan these social disorder events, such as the protests to overthrow the government. || 1.3_privacy_anonymity 2.6_gov_control 3.4_internet || Business and Employment- Online business
 * (article out of date) || Facebook tightens grip on user ID data - Yahoo! News || 1) Identify the area of impact the scenario relates to.

2) Identify all ITGS terminology and phrases (IT and social/ethical). Applications, Internet, UID, network, web, software developers, policy, analytics services, 3rd parties' applications.

3) Describe one ITGS social/ethical concern in the article. Privacy is the concern in this article because some software developers behind outside applications popular in the online community were "inadvertently" sharing user identification numbers.

4) Describe the relationship of the main stakeholders to the IT system. The main stakeholder which is the Ad networks is sharing identifying information about users with advertising and Internet tracking companies.

5) Explain the relationship between the IT system and the social/ethical issue identified in question 3. Facebook (IT system) modified its policy to forbid user identification data from leaving third-party applications and for such information to remain confidential if used by analytics services connected to programs (privacy).

6) Discuss at least one problem that relates to the impacts of the social/ethical issue. The problem here is that all of the 10 most popular applications on Facebook were transmitting unique user ID numbers to outside companies which violates Facebook's policy: data received from Facebook, including UIDs, cannot be shared with data brokers and ad networks.

7) Evaluate one solution that addresses the problem identified. Facebook user should have a choice on whether or not to allow applications to get their UID. Facebook should also tighten their policy and make it harder for Ad networks to share UID with third party applications. || 2.1_bus_emp 1.3_privacy_anonymity || Users will have to connect with encryption, and then they can choose between different mix cascades. || 1.3_privacy_anonymity ||
 * || JAP -- ANONYMITY & PRIVACYs || Anoymisation can be defined as the act of making anonymous onto a person who accesses to the Internet. According JAP as it describes in the article, JAP makes it possible the Internet anonymously. The system is like how you wont get tracked by hackers. It simply means that you cannot be tracked, and therefore nobody will know who prefers what website, and also there will less eavesdropping on the Internet connection, because they can’t see who you are.