Advertisement

Privacy and Trust

  • David Salomon
Chapter
Part of the Undergraduate Topics in Computer Science book series (UTICS)

Abstract

In this age of computers, the Internet, and massive data bases that never lose or forget anything, it is no wonder that we feel we are losing our privacy and we get very concerned about it. The reason for this loss can be found in the phrase “once something is released into the Internet, it can never be completely deleted.” We give away bits and pieces of personal information all the time, but we give them to different entities, at different times, and through different media such as paper or verbally. We therefore expect these pieces of information to disappear or at least to stay separate. The nature of the online world, however, is such that individual pieces of information tend to gravitate toward one another and coalesce into solid objects called personal records.

Keywords

Personal Information Credit Card Privacy Policy Chat Room Chinese Restaurant 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

  1. Akamai (2004) is www.akamai.com.
  2. anonymizer (2005) is www.anonymizer.com.
  3. bbbseal (2005) is www.bbbonline.org.
  4. cyberpatrol (2005) is http://www.cyberpatrol.com/.
  5. CyberSitter (2005) is http://www.cybersitter.com/.
  6. digitalenvoy (2004) is www.digitalenvoy.net/.
  7. FTC-CONT (2005) is ftc.gov/bcp/edu/pubs/consumer/tech/tec04.pdf.Google Scholar
  8. getnetwise (2005) is www.getnetwise.org/.
  9. mutemail (2010) is http://www.mutemail.com/.
  10. missingkids (2005) is http://www.missingkids.com/.
  11. netnanny (2005) is http://www.netnanny.com/.
  12. onion-router (2005) is http://www.onion-router.net/.
  13. privacyalliance (2005) is http://www.privacyalliance.org/.
  14. privacyrights (2005) is privacyrights.org/fs/fs21-children.htm.Google Scholar
  15. protectkids (2005) is http://www.protectkids.com/.
  16. Quova (2004) is www.quova.com/.
  17. Reiter, Michael K. and Aviel D. Rubin (1998) “Crowds: Anonymity for Web Transactions,” ACM Transactions on Information and System Security, 1(1)66–92.CrossRefGoogle Scholar
  18. Rossner, Mike and Kenneth M. Yamada (2004) “What’s in a Picture? The Temptation of Image Manipulation,” The Journal of Cell Biology, 166(1):11– 15.CrossRefGoogle Scholar
  19. safekids (2005) is http://www.safekids.com/.
  20. truste (2005) is http://www.truste.org/.
  21. versiontracker (2005) is http://www.versiontracker.org/.

Copyright information

© Springer London 2010

Authors and Affiliations

  1. 1.Computer Science Dept.California State University, NorthridgeNorthridgeUSA

Personalised recommendations