Despite Issues Such As Privacy and Cyber-Stalking and Grey Areas Such As Implementation of Penal Provisions, Social Networking C

Total Page:16

File Type:pdf, Size:1020Kb

Despite Issues Such As Privacy and Cyber-Stalking and Grey Areas Such As Implementation of Penal Provisions, Social Networking C Despite issues such as privacy Story and cyber-stalking and grey areas such as implementation of penal provisions, social networking continues to straddle the world Cover stage like a colossus. It has brought into its fold new friends, new connections and new networks all of which promise to change social interactions like never before. Every morning, I wake up with a hope; that nature would smile, the birds would sing; ARPIT JAIN SINGHAI that my Facebook account would have comments; and my blackberry would ring!!! friends in touch, allowed closer interactions postman to convey our thoughts to a distant with distant relatives, spawned professional someone. With the speeds of Mbps blazing networks and even given a new dimension the social networking sites, we are on the to marketing and business. Social networking screen of any computer worldwide. AMOUS naturalist and the theorist of sites have today ushered in a totally unique It was Professor J.A. Barnes of Churchill FOrigin of Species, Charles Darwin once kind of social interaction. College, Cambridge who first coined the remarked, “In the long history of humankind But, in doing so, these platforms have term “Social Networking” in the 1950s. He those who learned to collaborate and also bared their sinister side – spreading defined it as “an association of people improvise most effectively have prevailed.” unfounded rumours, helping criminals drawn together by family, work or hobby”. And so it is in recent times that we find snare innocent users and trap gullible This term now largely refers to the Internet- humankind pioneering social networking youngsters. There have also been instances based networking websites that enable its sites that have made their presence felt like concerning wrongful penal censure of users to share their thoughts, pictures, videos never before. users as happened recently in the case of etc. This fast evolving culture of Social They have brought about revolutions, a Mumbai girl. Hopefully, as the technology Networking has permanently altered the overthrowing governments. They have “evolves”, we will find a more mature progression of the Internet in particular and spawned spontaneous protests against audience in the Internet-based social society at large. corruption and crime and other issues that arena. A recent report by Forbes exercise the minds of common citizens. At Today, in the 21st century, we do magazine (http://www.forbes.com/sites/ a personal level, they have brought long-lost not need a pen, paper and a grand old ilyapozin/2012/06/26/the-rise-of-social- SCIENCE REPORTER, FEBRUARY 2013 8 Cover Story The world has now become a global society with social media acting as a bridge for sharing sentiments. Although issues such as privacy and cyber- stalking seem to affect its largely positive reputation, the usefulness of social networking easily dwarfs the fears surrounding its worthiness. enterprise/) claims that newer social screen, while today a webpage loaded influenced in favour of advertisers. According networking websites are posing serious with tons of graphics would take a few to the report, companies are advertising challenges to the older ones. It has ranked milliseconds to mark its presence. on social networking site Facebook for content sharing interest-based site “Pinterest” Keeping aside the competition, the four main reasons: Awareness, Audience above “Facebook” and “Google+”. While user base of every social networking site is Growth, Conversion and Engagement. Facebook happens to be six years old, expanding. The recent $10 Billion public issue Brand awareness has always been “Google+” just celebrated its first birth of ‘Facebook’ tells us how hot and serious a major focus area of advertisers and has anniversary and its parent site “Orkut” is into business social networking has become. been done through public campaigns, TV its eighth year. As fate would have it, these And it has thrown social networking into the ads etc. Audience growth is another part companies are already facing generational hands of social marketers and advertisers. of brand awareness. Companies feel good threat from newbies such as “Yelp” (www. A large part of the content on these sites when more people talk about their product. yelp.com), ”Qzone” and “Pinterest” (www. is now being sponsored by multinational Conversion and Engagement are pinterest.com). companies; “recommendation” instead of smaller pieces of the advertising strategy. Social networking sites have a “advertisement” is being used as a tool to Such engagements through social significant regional influence. “Facebook” affect consumer choice. networking sites have helped companies (www.facebook.com) is popular in USA, Research by a social media education penetrate the mind of net-aware consumers. while “Sina Weibo” (www.weibo.com) company “Socialfresh” (www.socialfresh. Now, advertisements on our computers are and “RenRen” (www.renren.com) are the com) presents interesting insight into the being largely targeted according to our dragon kings of China. “Orkut” (www.orkut. methods that let the minds of users to be wall posts, likes, photographs and videos com) is the favourite of Brazilians while Social posted online. Another mechanism works the Japanese are happy with “Mixi” (www. by targeting ads based on your friend mixi.jp). Indians too prefer “Orkut” while Networking list, location and age. A report (http:// Europeans cling to “Badoo” (www.badoo. is rightfully www.jwtintelligence.com/2011/07/social- com). Video sharing site “Youtube” (www. compelling commerce/) by marketing communications youtube.com) and photo sharing site agency ‘JW Intelligence’ points out “smart “Picassa” (picasaweb.google.com) offer youths marketers are fine-tuning their strategies a content sharing functionality to social to adopt and consumer attitudes and behaviours media. technology are evolving.” If your friend likes something The dynamism of social networking and you quite often comment on his/her is being fuelled mainly by rapid growth in in Internet deficient rural India, page, then there are high chances that the three sectors – first, software programming which, in turn, is propelling the ads seen by him will appear on your page especially “user interface/experience”; nation towards a faster path of too. second, communication networks and Social networking sites have been third, advanced microprocessors. In 2002, industrial growth by induction complimentary revenue sources for online a simple text-based webpage would take of newer insights and fresh shopping websites. The retail brands are almost 1-2 seconds to appear on the user’s methodologies. smartly using social networking for directly 9 SCIENCE REPORTER, FEBRUARY 2013 Cover Story Social networking is also enabling the masses to raise issues that earlier used to be buried due to fear of administrative backlash. reaching out to the customers for socially interactive sales, giving them a foothold in the intensely competitive marketplace (http://www.guardian.co.uk/media-network/ media-network-blog/2012/jul/25/social- retailing). Since the early days of the Internet there were attempts to capitalize on the user data for customization of advertisements, but such attempts were blocked by government regulations. With social networking sites, the job of consumer data hungry advertisers has become easy. According to Wikipedia, “Social media Because, when you open an account with optimization is becoming increasingly a social networking site such as Facebook, you expressly consent to its “data usage important for search engine policy”. For example, the data usage policy optimization. of Facebook clearly says that they collect every grain of data when you visit the site. Cookie data and data like your “search”, “profile visited by you”, “time and date of photographs” etc. is also collected by the company. Other social networking websites work in a similar fashion. And how is this data used? The Facebook data use policy says, “It is used to measure or understand the effectiveness of ads you and others see, including to deliver relevant ads to you” (http://www.facebook.com/policy.php & http://www.facebook.com/help/cookies/). Many social scientists believe that behavioral advertising is “invasion of privacy” and seriously manipulates human brain. It is being said that compared to TV and radio ads which are blindly targeted at consumers, such advertisements are causing behavioral changes in consumers. Instead of going by their own instinct, people are increasingly depending on online campaigns to make their choices. Privacy advocates and organizations such as Privacy International have compared this to eavesdropping on telephonic calls where a third person is listening to your calls and based on what people are talking, she/ he is preparing a list of items that could be sold. In a recent development, US Federal Trade Commission (FTC) has made it a top priority to protect consumer privacy online (http://mikeyounglaw.com/behavioral- targeting-ftc-to-crack-down-on-internet- ads-that-invade-privacy/). SCIENCE REPORTER, FEBRUARY 2013 10 Cover Story The social media landscape today is vast and varied Celebrities, especially from film business, routinely employ Search Engine Optimization (SEO) companies to increase their search ranking. These companies popularize events associated with Courtsy: FredCavazza.net the celebrities. Social networking has opened doors as a “vote” for that webpage’s quality. marketed through SEO engines on these to new forms of businesses and
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Electronic Frontier Foundation November 9, 2018
    Before the Department of Commerce National Telecommunications and Information Administration Developing the Administration’s Approach to Consumer Privacy Docket No. 180821780-8780-01 Comments of Electronic Frontier Foundation November 9, 2018 Submitted by: India McKinney Electronic Frontier Foundation 815 Eddy Street San Francisco, CA 94109 USA Telephone: (415) 436-9333 ext. 175 [email protected] For many years, EFF has urged technology companies and legislators to do a better job of protecting the privacy of technology users and other members of the public. We hoped the companies, who have spent the last decade collecting new and increasingly detailed points of information from their customers, would realize the importance of implementing meaningful privacy protections. But this year’s Cambridge Analytica scandal, following on the heels of many others, was the last straw. Corporations are willfully failing to respect the privacy of technology users, and we need new approaches to give them real incentives to do better—and that includes updating our privacy laws. EFF welcomes the opportunity to work with the Department of Commerce in crafting the federal government’s position on consumer privacy. The Request for Comment published in the Federal Register identifies seven main areas of discussion: Transparency, Control, Reasonable Minimization, Security, Access and Correction, Risk Management, and Accountability. These discussion points have been thoroughly analyzed by academics over the past decades, leading to recommendations like the Fair
    [Show full text]
  • Windows 7 Operating Guide
    Welcome to Windows 7 1 1 You told us what you wanted. We listened. This Windows® 7 Product Guide highlights the new and improved features that will help deliver the one thing you said you wanted the most: Your PC, simplified. 3 3 Contents INTRODUCTION TO WINDOWS 7 6 DESIGNING WINDOWS 7 8 Market Trends that Inspired Windows 7 9 WINDOWS 7 EDITIONS 10 Windows 7 Starter 11 Windows 7 Home Basic 11 Windows 7 Home Premium 12 Windows 7 Professional 12 Windows 7 Enterprise / Windows 7 Ultimate 13 Windows Anytime Upgrade 14 Microsoft Desktop Optimization Pack 14 Windows 7 Editions Comparison 15 GETTING STARTED WITH WINDOWS 7 16 Upgrading a PC to Windows 7 16 WHAT’S NEW IN WINDOWS 7 20 Top Features for You 20 Top Features for IT Professionals 22 Application and Device Compatibility 23 WINDOWS 7 FOR YOU 24 WINDOWS 7 FOR YOU: SIMPLIFIES EVERYDAY TASKS 28 Simple to Navigate 28 Easier to Find Things 35 Easy to Browse the Web 38 Easy to Connect PCs and Manage Devices 41 Easy to Communicate and Share 47 WINDOWS 7 FOR YOU: WORKS THE WAY YOU WANT 50 Speed, Reliability, and Responsiveness 50 More Secure 55 Compatible with You 62 Better Troubleshooting and Problem Solving 66 WINDOWS 7 FOR YOU: MAKES NEW THINGS POSSIBLE 70 Media the Way You Want It 70 Work Anywhere 81 New Ways to Engage 84 INTRODUCTION TO WINDOWS 7 6 WINDOWS 7 FOR IT PROFESSIONALS 88 DESIGNING WINDOWS 7 8 WINDOWS 7 FOR IT PROFESSIONALS: Market Trends that Inspired Windows 7 9 MAKE PEOPLE PRODUCTIVE ANYWHERE 92 WINDOWS 7 EDITIONS 10 Remove Barriers to Information 92 Windows 7 Starter 11 Access
    [Show full text]
  • Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing As an Interactive Practice
    Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice Sameer Patil, Greg Norcie, Apu Kapadia Adam J. Lee School of Informatics and Computing Department of Computer Science Indiana University University of Pittsburgh 901 E 10th St 210 S Bouquet St Bloomington, IN 47408 USA Pittsburgh, PA 15260 USA {patil, gnorcie, kapadia}@indiana.edu [email protected] ABSTRACT systems focused on enabling collaborators to locate each Rapid growth in the usage of location-aware mobile phones other (e.g., [25, 36]). Such systems typically required orga- has enabled mainstream adoption of location-sharing ser- nizations to install their own location-mapping infrastruc- vices (LSS). Integration with social-networking services ture, either developed in-house by the organization or pur- (SNS) has further accelerated this trend. To uncover how chased from companies such as Ubisense, which offers a 3D localization infrastructure. To scale globally without such these developments have shaped the evolution of LSS usage, 1 we conducted an online study (N = 362) aimed at under- custom infrastructure, services such as Dodgeball allowed standing the preferences and practices of LSS users in the users to send their current locations as text messages to US. We found that the main motivations for location sharing the service, which then alerted friends if they opportunis- were to connect and coordinate with one's social and pro- tically happened to be near each other. Eventually WiFi fessional circles, to project an interesting image of oneself, and GPS-based localization built into smartphones led to and to receive rewards offered for `checking in.' Respon- the development of various stand-alone location-sharing ser- dents overwhelmingly preferred sharing location only upon vices (LSS) such as Foursquare (https://www.foursquare.
    [Show full text]
  • Profiles, Identities, Data: Making Abundant and Anchored Selves in a Platform Society
    This is a repository copy of Profiles, identities, data: making abundant and anchored selves in a platform society. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/139678/ Version: Accepted Version Article: Szulc, L. (2019) Profiles, identities, data: making abundant and anchored selves in a platform society. Communication Theory, 29 (3). pp. 257-276. ISSN 1050-3293 https://doi.org/10.1093/ct/qty031 This is a pre-copyedited, author-produced version of an article accepted for publication in Communication Theory following peer review. The version of record, Lukasz Szulc; Profiles, Identities, Data: Making Abundant and Anchored Selves in a Platform Society, Communication Theory is available online at: https://doi.org/10.1093/ct/qty031 Reuse Items deposited in White Rose Research Online are protected by copyright, with all rights reserved unless indicated otherwise. They may be downloaded and/or printed for private study, or other acts as permitted by national copyright laws. The publisher or other rights holders may allow further reproduction and re-use of the full text version. This is indicated by the licence information on the White Rose Research Online record for the item. Takedown If you consider content in White Rose Research Online to be in breach of UK law, please notify us by emailing [email protected] including the URL of the record and the reason for the withdrawal request. [email protected] https://eprints.whiterose.ac.uk/ Szulc - Profiles, Identities, Data 1 Lukasz Szulc Lecturer in Digital Media and Society Department of Sociological Studies University of Sheffield [email protected] Profiles, Identities, Data: Making Abundant and Anchored Selves in a Platform Society Abstract The practice of profile making has become ubiquitous in digital culture.
    [Show full text]
  • Secrets of the Windows Gurus
    1007red_Cover.v5 9/14/07 9:50 AM Page 1 2007 ASBPE Why Redmond’s Bullish on Windows Live 64 Award Winner Best Editorial Best Feature OCTOBER 2007 REDMONDMAG.COM SecretsSecrets ofof thethe WindowsWindows GurusGurus What makes them tick? 24 > Beta Man Shines a Light $5.95 10 • + on Silverlight 12 OCTOBER Readers: Word 2007 Is Not a Must-Have 19 When Will Vista Learn 25274 867 27 to Play Nice? 37 71 Project8 9/4/07 1:58 PM Page 1 Project8 9/4/07 1:58 PM Page 2 1007red_TOC2.v4 9/14/07 10:50 AM Page 2 2007 Winner for Best Single Issue Computers/Software, Training & Program Development/Trade Redmond OCTOBER 2007 The Independent Voice of the Microsoft IT Community Contents COVER STORY REDMOND REPORT 9 Server Manager Responds to Secrets Users’ Needs Technology better consolidates Longhorn’s of the management functions. 10 A Call for Windows More Flexible Desktop Standards Gurus Cavalancia thinks you Technology experts tell Redmond what need to accommodate makes them tick. Web 2.0 and Vista apps. Page 24 FEATURES 37 Windows Vista: Learning 45 Access Anywhere to Play Nice The Client Access Server 11 First Beta for Vista Despite Microsoft’s efforts so far, gives you many remote SP1 Coming Soon incompatibilities still dog the new OS. access options for Microsoft reveals first Exchange 2007. details of upcoming Vista service pack. 12 Beta Man Silverlight Bridges the Gap COLUMNS 6 Barney’s Rubble: Doug Barney Stop Bugging Me! 14 Mr. Roboto: Jeffery Hicks Event by Event 55 Windows Insider: Page 37 Greg Shields First Look: WinRM & WinRS REVIEWS 59 Security Advisor: Product Review Reader Review Joern Wettern Virtual Security 16 Navigate Your Network 19 Word 2007: Not WhatsUp Gold maps your Exactly a Must-Have 64 Foley on Microsoft: Mary Jo Foley network and helps you keep it Some sing its praises, but compatibility Why Is Redmond So running smoothly.
    [Show full text]
  • Location-Based Services: Industrial and Business Analysis Group 6 Table of Contents
    Location-based Services Industrial and Business Analysis Group 6 Huanhuan WANG Bo WANG Xinwei YANG Han LIU Location-based Services: Industrial and Business Analysis Group 6 Table of Contents I. Executive Summary ................................................................................................................................................. 2 II. Introduction ............................................................................................................................................................ 3 III. Analysis ................................................................................................................................................................ 3 IV. Evaluation Model .................................................................................................................................................. 4 V. Model Implementation ........................................................................................................................................... 6 VI. Evaluation & Impact ........................................................................................................................................... 12 VII. Conclusion ........................................................................................................................................................ 16 1 Location-based Services: Industrial and Business Analysis Group 6 I. Executive Summary The objective of the report is to analyze location-based services (LBS) from the industrial
    [Show full text]
  • Is the Market for Digital Privacy a Failure?1
    Is the Market for Digital Privacy a Failure?1 Caleb S. Fuller2 Abstract Why do many digital firms rely on collecting consumer information–a practice that survey evidence shows is widely disliked? Why don’t they, instead, charge a fee that would protect privacy? This paper empirically adjudicates between two competing hypotheses. The first holds that firms pursue this strategy because consumers are ill-informed and thus susceptible to exploitation. The second holds that this strategy reasonably approximates consumer preferences. By means of survey, I test a.) the extent of information asymmetry in digital markets, b.) consumers’ valuation of privacy, and c.) whether government failure contributes to consumer mistrust of information collection. My results indicate that a.) the extent of information asymmetry is minimal, b.) there is significant divergence between “notional” and “real” demand for privacy and c.) that government contributes to consumer distrust of information collection by private firms. Significantly, almost 82% of Google users are unwilling to pay anything for increased digital privacy. JEL-Classification: D23, K29, Z18 Keywords: privacy paradox, digital privacy, survey, market failure 1 I wish to thank Alessandro Acquisti, Peter Leeson, Chris Coyne, Peter Boettke, David Lucas, Noah Gould, and Nicholas Freiling for helpful suggestions. All errors are my own. I am also indebted to the Mercatus Center for providing funding for the survey conducted by Haven Insights LLC. 2 Assistant professor of economics, Grove City College, Email: 1 INTRODUCTION Google’s motto is “Don’t Be Evil.” But the fact that the company surreptitiously collects the information of over one billion individuals annually leads some to question whether the firm’s business model runs afoul of its dictum (Hoofnagle 2009).
    [Show full text]
  • The Constitutionality of Banning Sex Offenders from Social Networking Sites
    WYNTON IN PRINTER PROOF.DOC 4/14/2011 8:08:24 PM Note MYSPACE, YOURSPACE, BUT NOT THEIRSPACE: THE CONSTITUTIONALITY OF BANNING SEX OFFENDERS FROM SOCIAL NETWORKING SITES JASMINE S. WYNTON† ABSTRACT In recent years there has been intense public pressure to enact increasingly restrictive and intrusive sex offender laws. The regulation of sex offenders has now moved online, where a growing amount of protected expression and activity occurs. The latest trend in sex offender policy has been the passage of state laws prohibiting sex offenders from visiting social networking sites, such as Myspace or Facebook. The use of these websites implicates the First Amendment right of expressive association. Broad social-networking-site bans threaten the First Amendment expressive association rights of sex offenders, who do not lose all of their constitutional rights by virtue of their conviction. Although social-networking-site bans are politically attractive on the surface, such prohibitions are fundamentally flawed because they are predicated on a number of widespread misconceptions about sex offenses and sex offender behavior. These misconceptions include the beliefs that all registered sex offenders are violent sexual predators who have extremely high recidivism rates and that Internet predators are increasing the incidence of sex crimes against minors. In fact, there is very little evidence to indicate that this type of legislation will help reduce sexual violence. This Note argues Copyright © 2011 by Jasmine S. Wynton. † Duke University School of Law, J.D. expected 2011; Spelman College, B.A. 2008. First, I would like to thank God for the ability, strength, and perseverance to write this Note, and I would like to thank my family for their constant love, support, and encouragement.
    [Show full text]
  • Pubblicare Su Windows Live Spaces Utilizzare Live Spaces
    Pubblicare su Windows Live Spaces Utilizzare Live Spaces La versione stampata delle guide «Passo a passo» ti aiuta a imparare autonomamente e ti offre una pratica panoramica delle funzioni essenziali del programma. Cos’è Windows Live Spaces? Fase 1 Windows Live Spaces è una piattaforma funzionale che ti consente di presentarti in modo personalizzato e di pubblicare informazioni, documenti, idee o discussioni su uno spazio web. Puoi utilizzare le seguenti possibilità di pubblicazione: blog che possono essere organizzati in categorie o archivi, foto e video oppure pagine HTML standard per presentare le tue attività o, per esempio, il lavoro di gruppi di progetto. Configurare Live Spaces Fase 2 Non appena hai eseguito l’accesso con il tuo Windows Live ID, puoi entrare in Live Spaces. Per configurarlo, seleziona il comando Modifica. Per prima cosa stabilisci un titolo espressivo e, se necessario, uno slogan per il tuo spazio. Verifica inoltre i dati del profilo. Nel comando Personalizza nell’area in alto a destra trovi le opzioni per cambiare il tema e il layout. Sotto Personalizza > Avanzate sono disponibili altre opzioni di personalizzazione. © 2009 Microsoft Corporation. Tutti i diritti riservati Aggiungere un intervento sul blog Fase 3 Per pubblicare un blog, segui questi passaggi: 1. Seleziona il comando Aggiungi intervento nel blog. 2. Inserisci titolo e testo dell’intervento nei campi appositi. 3. Formatta il testo e, se necessario, aggiungi foto o video. 4. Assegna a una categoria e fai clic su Pubblica intervento. Utilizzare Windows Live Writer Fase 4 Un’altra possibilità per scrivere un blog è offerta da Windows Live Writer.
    [Show full text]
  • High Technology, Consumer Privacy, and U.S. National Security
    Georgetown University Law Center Scholarship @ GEORGETOWN LAW 2015 High Technology, Consumer Privacy, and U.S. National Security Laura K. Donohue Georgetown University Law Center, [email protected] This paper can be downloaded free of charge from: https://scholarship.law.georgetown.edu/facpub/1457 http://ssrn.com/abstract=2563573 Bus. L. Rev. (forthcoming) This open-access article is brought to you by the Georgetown Law Library. Posted with permission of the author. Follow this and additional works at: https://scholarship.law.georgetown.edu/facpub Part of the Constitutional Law Commons, Consumer Protection Law Commons, Fourth Amendment Commons, and the National Security Law Commons HIGH TECHNOLOGY, CONSUMER PRIVACY, AND U.S. NATIONAL SECURITY Laura K. Donohue* I. INTRODUCTION Documents released over the past year detailing the National Security Agency’s (“NSA”) telephony metadata collection program and interception of international content under the Foreign Intelligence Surveillance Act (FISA) implicated U.S. high technology companies in government surveillance. 1 The result was an immediate, and detrimental, impact on U.S. corporations, the economy, and U.S. national security. The first Snowden documents, printed on June 5, 2013, revealed that the government had served orders on Verizon, directing the company to turn over telephony metadata under Section 215 of the USA PATRIOT Act.2 The following day, The Guardian published classified slides detailing how the NSA had intercepted international content under Section 702 of the FISA Amendments Act.3 The type of information obtained ranged from E-mail, video and voice chat, videos, photos, and stored data, to Voice over Internet Protocol, file transfers, video conferencing, notifications of target activity, and online social networking.4 The companies involved read like a who’s who of U.S.
    [Show full text]
  • Privacy-Enhanced Sharing of Personal Content on the Web∗
    Privacy-Enhanced Sharing of Personal Content on the Web∗ Mohammad Mannan, Paul C. van Oorschot School of Computer Science, Carleton University Ottawa, Ontario, Canada {mmannan, paulv}@scs.carleton.ca ABSTRACT 1. INTRODUCTION Publishing personal content on the web is gaining increased Through social networking and photo-sharing websites, popularity with dramatic growth in social networking web- and personal blogs, it is becoming increasingly popular to sites, and availability of cheap personal domain names and make personal content available on the Internet. For some hosting services. Although the Internet enables easy pub- users, these sites provide a textual and/or pictorial docu- lishing of any content intended to be generally accessible, mentary of life. Primarily because it is the easiest mode of restricting personal content to a selected group of contacts operation, many users of these services allow their personal is more difficult. Social networking websites partially enable web content to be accessed by all other Internet users, often users to restrict access to a selected group of users of the with the false impression that none other than their family same network by explicitly creating a “friends’ list.” While or friends would look into their personal online posts [29]. this limited restriction supports users’ privacy on those (few) Privacy concerns are largely being ignored (sometimes un- selected websites, personal websites must still largely be pro- knowingly) in the current rush to online lifecasting. tected manually by sharing passwords or obscure links. Our Social networking websites such as Facebook and MyS- focus is the general problem of privacy-enabled web con- pace provide access control mechanisms for partially restrict- tent sharing from any user-chosen web server.
    [Show full text]