Академический Документы
Профессиональный Документы
Культура Документы
The internet is a global network overflowing with information and innovation; however the personal information of the average user is routinely targeted by information harvesting companies and organisations. This paper discusses the methods and risks of this practice and concludes by judging whether the lack of privacy is a fair price to pay for the services offered in return.
Introduction
In recent years, the internet has moved from a tool reserved for business and enthusiasts to a commodity found in most homes, and available almost everywhere. This has enabled people to communicate with each other easier than ever before and to obtain information quickly and simply. However with this increase in information availability comes the risk of decreased privacy and discretion, and recently companies have been exploiting this for financial gain and marketing, through various methods. The continuous flow of information that users place in control of the service providers allows them to analyse the data as they see fit. An advantage for these companies is that they can do almost anything they want, as their users must accept their privacy policy on registering with the service, and most people dont read them (Masnick, M. 2009). In this paper, the methods companies use to obtain personal information, the data they store and what can be done with it will be discussed, as well as the consequences of allowing this data to be acquired and how you can avoid giving it away. This report will pay particular focus to the actions of the current leaders in the personal information industry.
used many times to describe the business models of Facebook and Google, because the service they appear to offer is merely a front end to the information vacuum cleaner that is paid for by large companies. Even if you were to not use these services or you felt you didnt put any information into their systems, you are not free from them. Whenever you send an email to a Gmail address, your email will be analysed by Google and your information may be stored in their servers. If a friend uploads a photo of you or mentions you in a post on Facebook, they have the ability to pick out your name and begin creating a profile of you even if you were never to use the website. These methods are somewhat obvious, and as you are inputting information into their services, make it easy for them to obtain your information. However, other methods are employed which may seem more intrusive and are so seamless, you may not know you are being watched. Whenever you search with Google, your search is logged. When you click a link, your IP address is logged and a timestamp taken, and all input to web forms is logged in the same manner. Google leaves cookies on the computers of its users, which track the movement of the user around the web, and all of its server logs are kept, which hold information such as IP address, browser type, operating system and location. This small amount of information allows you to be identified and a profile of you built as you use their services more and more (Dover, D. 2008). Google also offers Google Chrome, a browser that offers many benefits over its competitors, with the price being that it is even easier for Google to see what websites youve visited. Server requests are also used to implement a technique called web bugs (Smith, M. 1999). This is where an almost invisible object is embedded into a web page or email (usually a 1x1 pixel GIF image), which causes the client to make an HTTP request to a server which will then capture the information sent with the request; the same information that is sent with a regular server request.
sufficient, and if information harvesting companies are to exist on the internet, there needs to be a form of regulation to ensure the user is not exploited and their privacy remains intact. On the other hand, regulation may kill these services. Whilst some may insist that they invade privacy, they do also offer high quality, free services and tools and by increasing the effectiveness of advertising can also contribute to the stimulation of economies.
Conclusion
This report has discussed the amount of information that is stored about internet users, focussing on the practices of Facebook and Google. These services target adverts to the user whilst masquerading as a free service provider, offering a tantalising array of social media and productivity applications that entice the user to feed the companies personal information without thinking about where it is going. Even so, is this invasion of privacy a price worth paying for the vast collection of seemingly free tools and features? This is not a question with a definitive answer; however it has been discussed that there are methods of mitigating the risks and reducing the amount of information these services can harvest from their users. If a user is willing to have their personal information analysed and stored to target advertising to their interests, this business model offers many benefits to the user whilst being mutually beneficial to the advertisers and the information providers alike. To a user that is very conscious of their online footprint, the benefits may not outweigh the apparent invasion of privacy, and as such the services may be considered as more of a breach of trust than a free tool. However, it has been shown that these services can also track internet users who are not members or users of the particular services or websites. On a personal level, I feel that the risk is acceptable when steps are taken to reduce the amount of information available to the service providers. I use services which are funded by advertising revenue whilst using the disconnect.me plugin. I pay particular attention to the information I share with the services. I believe that my personal information, when intelligently managed, is a fair price to pay for the standard of the services that are provided.
References
Masnick, M, (2009). People Don't Read Privacy Policies... But Want Them To Be Clearer. Available: http://www.techdirt.com/articles/20090216/1803373786.shtml. Last accessed 1 st March 2012. NYTimes. (2012). Facebook Business Profile. Available: http://topics.nytimes.com/top/news/business/companies/facebook_inc/index.html. Last accessed 1 st March 2012. Securities and Exchange Commission, (2012). Facebook Registration Statement. Available: http://www.sec.gov/Archives/edgar/data/1326801/000119312512034517/d287954ds1.htm Fitzpatrick, J, (2010). If Youre Not Paying for It; Youre the Product. Available: http://lifehacker.com/5697167/if-yourenot-paying-for-it-youre-the-product. Last accessed 2nd March 2012. Dover, D, (2008). The Evil Side of Google? Exploring Google's User Data Collection. Available: http://www.seomoz.org/blog/the-evil-side-of-google-exploring-googles-user-data-collection#list. Last accessed 2nd March 2012. Smith, M. (1999). The Web Bug FAQ. Available: http://w2.eff.org/Privacy/Marketing/web_bug.html. Last accessed 2nd March 2012. Williams, C, (2011). Facebook criticised for 'tracking' logged-out users. Available: http://www.telegraph.co.uk/technology/facebook/8789942/Facebook-criticised-for-tracking-logged-out-users.html. Last accessed 2nd March 2012. Protalinski, E. (2011). Facebook denies cookie tracking allegations. Available: http://www.zdnet.com/blog/facebook/facebook-denies-cookie-tracking-allegations/4044. Last accessed 2nd March 2012. The First Post, (2012). Should we fear Google's privacy policy changes? Available: http://www.theweek.co.uk/technology/google/45673/should-we-fear-googles-privacy-policy-changes. Last accessed 2nd March 2012. Purdy, K. (2010). Disconnect for Chrome Disables Third-Party Tracking While Keeping Webapps Operational. Available: http://lifehacker.com/5713277/disconnect-for-chrome-disables-third+party-tracking-while-keeping-webappsoperational. Last accessed 2nd March 2012. Google Chrome Help. Incognito mode (browse in private). Available: http://support.google.com/chrome/bin/answer.py?hl=en&answer=95464. Last accessed 2nd March 2012. Darlington, R. (2009). How the internet could be regulated. Available: http://www.rogerdarlington.me.uk/Internetregulation.html#IR2. Last accessed 2nd March 2012. Wee, S and Oreskovic, A. (2011). Google reveals Gmail hacking, says likely from China. Available: http://www.reuters.com/article/2011/06/02/us-google-hacking-idUSTRE7506U320110602. Last accessed 2nd March 2012. Waugh, R. (2012). Watch your wall: New Facebook attack has stolen passwords from 45,000 users - and could be spreading through infected links. http://www.dailymail.co.uk/sciencetech/article-2083118/Facebook-hacked-Ramnit-worm-stolenpasswords-45-000-users.html. Last accessed 2nd March 2012.