Difference between revisions of "Privacy Online"

From ScenarioThinking
Jump to navigation Jump to search
Line 10: Line 10:
==Enablers:==
==Enablers:==
-Individual rights: it reinforces the protection of private life and personal information;<br>
-Individual rights: it reinforces the protection of private life and personal information;<br>
-Behavioral Advertising: the collection and aggregation of consumers' Web browsing activities for the purpose of serving targeted advertisements .It presents significant privacy risks in large part because consumers are unaware of the practice and thus cannot protect themselves.<br>
-Behavioral Advertising: the collection and aggregation of consumers' Web browsing activities for the purpose of serving targeted advertisements. It presents significant privacy risks in large part because consumers are unaware of the practice and thus cannot protect themselves.<br>
-Identity Theft<br>
-Identity Theft<br>


==Inhibitors:==
==Inhibitors:==

Revision as of 19:34, 16 September 2009

This page is being edited by José Nunes EMBA09. In case of any questions/remarks contact me.

UnderConstruction.jpg

Description:

Online privacy issues concerns with the access and use of personal data over the internet, mainly in the form of information and communication.


Enablers:

-Individual rights: it reinforces the protection of private life and personal information;
-Behavioral Advertising: the collection and aggregation of consumers' Web browsing activities for the purpose of serving targeted advertisements. It presents significant privacy risks in large part because consumers are unaware of the practice and thus cannot protect themselves.
-Identity Theft

Inhibitors:

-Circulation and sharing of valuable information, for instance in education, scientific or medical fields.
-Freedom of expressions, which protect information about those with whom we associate (political groups and social organizations), and offers protections for the materials that we create, access and read in the privacy of our homes;

Paradigms:

New threats such as terrorism or cyber-crime have been added to more traditional threats (such as disease or crime).In order to fight against it, governments (particularly US) have adopted rules to obtain and use, for law enforcement or intelligence purposes, personally-identifiable information held by commercial entities.

Timing:

September 11, 2001 series of coordinated suicide attacks by Al-Qaeda upon the United States on

Web Resources:

http://www.cdt.org/security/guidelines/ http://cdt.org/privacy/guide/debates.php