Protecting Online Privacy
Total Page:16
File Type:pdf, Size:1020Kb
University of Kentucky UKnowledge Theses and Dissertations--Communication Communication 2016 Protecting Online Privacy Stephanie D. Winkler University of Kentucky, [email protected] Digital Object Identifier: http://dx.doi.org/10.13023/ETD.2016.130 Right click to open a feedback form in a new tab to let us know how this document benefits ou.y Recommended Citation Winkler, Stephanie D., "Protecting Online Privacy" (2016). Theses and Dissertations--Communication. 47. https://uknowledge.uky.edu/comm_etds/47 This Master's Thesis is brought to you for free and open access by the Communication at UKnowledge. It has been accepted for inclusion in Theses and Dissertations--Communication by an authorized administrator of UKnowledge. For more information, please contact [email protected]. STUDENT AGREEMENT: I represent that my thesis or dissertation and abstract are my original work. Proper attribution has been given to all outside sources. I understand that I am solely responsible for obtaining any needed copyright permissions. I have obtained needed written permission statement(s) from the owner(s) of each third-party copyrighted matter to be included in my work, allowing electronic distribution (if such use is not permitted by the fair use doctrine) which will be submitted to UKnowledge as Additional File. I hereby grant to The University of Kentucky and its agents the irrevocable, non-exclusive, and royalty-free license to archive and make accessible my work in whole or in part in all forms of media, now or hereafter known. I agree that the document mentioned above may be made available immediately for worldwide access unless an embargo applies. I retain all other ownership rights to the copyright of my work. I also retain the right to use in future works (such as articles or books) all or part of my work. I understand that I am free to register the copyright to my work. REVIEW, APPROVAL AND ACCEPTANCE The document mentioned above has been reviewed and accepted by the student’s advisor, on behalf of the advisory committee, and by the Director of Graduate Studies (DGS), on behalf of the program; we verify that this is the final, approved version of the student’s thesis including all changes required by the advisory committee. The undersigned agree to abide by the statements above. Stephanie D. Winkler, Student Dr. Sherali Zeadally, Major Professor Dr. Bobi Ivanov, Director of Graduate Studies PROTECTING ONLINE PRIVACY THESIS A thesis submitted in partial fulfillment of the requirements for the degree of Master of Arts in the College of Communication at the University of Kentucky BY Stephanie Winkler Lexington; Kentucky Co-Directors: Dr. Sherali Zeadally Professor of Communication and Dr. Bobi Ivanov, Professor of Communication Lexington, Kentucky 2016 Copyright © Stephanie Winkler 2016 ABSTRACT OF THESIS PROTECTING ONLINE PRIVACY Online privacy has become one of the greatest concerns in the United States today. There are currently multiple stakeholders with interests in online privacy including the public, industry, and the United States government. This study examines the issues surrounding the protection of online privacy. Privacy laws in the United States are currently outdated and do little to protect online privacy. These laws are unlikely to be changed as both the government and industry have interests in keeping these privacy laws lax. To bridge the gap between the desired level of online privacy and what is provided legally users may turn to technological solutions. KEYWORDS: Online Privacy, Privacy Laws, Technology, Encryption, United States Stephanie Winkler 4/25/16 PROTECTING ONLINE PRIVACY BY Stephanie Winkler Dr. Sherali Zeadally Director of Thesis Dr. Bobi Ivanov Director of Graduate Studies 4/25/16 ACKNOWLEDGMENTS This thesis, while completed individually, would not be what it is today without the guidance of several individuals. First and foremost, I would like to thank my chair Dr. Sherali Zeadally whose example has been instrumental to this thesis and my development as a scholar. In addition, Dr. Anthony Limperos was always available for helpful criticism and insight during the entire thesis process. I would like to thank Dr. Bobi Ivanov for extending his support for me to move forward with this thesis. Finally, I would like to thank my entire thesis committee Dr. Sherali Zeadally, Dr. Anthony Limperos, and Dr. Michail Tsikerdekis for devoting time out of their busy schedules to help with the preparation of this thesis and the defense. iii TABLE OF CONTENTS List of Figures…………………………………………………………………………… v Chapter One: Introduction Background ……………………………………………………………………… 1 Communication Privacy Management…………………………………………… 2 Research Questions………………………………………………………………. 6 Methods……………………………………………………………………………7 Chapter Two: United States Privacy Laws Introduction………………………………………………………………………. 7 United States Privacy Laws……………………………………………………… 8 Summary…………………………………………………………………18 Organization Policies…………………………………………………………….23 Policy Recommendations……………………………………………………….. 25 Chapter Three: Barriers to Privacy Protections Introduction………………………………………………………………………28 Industry Objections………………………………………………………………28 Law Enforcement Objections……………………………………………………30 Summary…………………………………………………………………………32 Chapter Four: Privacy Enhancing Technologies Introduction………………………………………………………………………32 Data Collection Methods……………………………………………………….. 33 Types of Data…………………………………………………………………… 34 Privacy Enhancing Technologies……………………………………………….. 35 Anonymity Technology………………………………………………… 48 Chapter Five: Discussion and Conclusion Summary…………………………………………………………………………51 Limitations and Future Research………………………………………………...53 Conclusion……………………………………………………………………….54 References………………………………………………………………………………..56 Vita……………………………………………………………………………………….65 iv LIST OF FIGURES Figure 1, Ghostery Sign-up Screen………………………………………………………36 Figure 2, Disconnect Interface………………………………………………………….. 38 Figure 3, Privacy Badger Interface………………………………………………………39 Figure 4, Off The Record Plug-in Button in Pidgin…………………………………….. 45 Figure 5, Off The Record Plug-in Drop Down Menu……………………………………46 Figure 6, Dmail Function within Gmail………………………………………………….47 Figure 7, Privnote Online Form………………………………………………………….48 Figure 8, TOR Browser Menu…………………………………………………………...50 Figure 9, TOR Privacy and Security Setting Levels……………………………………..51 v Protecting Online Privacy The Internet has grown in importance in the United States with 87% of adults reporting that they used the Internet in 2013 (Pew Research Center, 2014). This is a significant increase from the 14% of adults that reported using the Internet in 1995 which was only a few years after the Internet was first introduced commercially (Pew Research Center, 2014). The widespread use of the Internet has played an integral part in shaping the United States today by breaking down communication barriers and opening doors for the average person to be a content creator. These changes have sparked public debates about rights and regulations in a digital age. At the center of these debates is the nature of what is considered public, and what is considered to be private. The line between public and private has become blurred online (Barnes, 2006; Strauß & Nentwich, 2013). Information that is typically only shared with specific people in an offline setting is widely available to others online (Albanesius, 2010). This phenomenon is even more pronounced when examining social platforms which are based around sharing personal information online (Chen & Michael, 2012). With social media currently being used by 70% of all Internet users (Duggen et al., 2015), people are moving more of their lives online. Despite the tendency to publically post information in places easily accessible (like social media), users express feelings of their privacy being violated when the information is accessed by an unintended audience (Barnes, 2006). Online privacy has been a popular topic in academic research for over a decade. However, the concept of online privacy was pushed into popular media after Edward Snowden leaked classified National Security Agency documents in 2013 (Preibusch, 2015). After the Snowden revelations most Americans believe that their privacy is being 1 threatened (Madden, 2014) with 66% of adults stating that the current laws are not enough to protect online privacy (Rainie, Kiesler, Kang, & Madden, 2013). Though this feeling is prevalent there is little research into how online privacy is protected in the United States. This study seeks to explore the online privacy protections available to users. 1.1 Online Privacy Even though there is an expressed concern for online privacy in both popular culture and research, online privacy does not have a consistent definition. This is partly because privacy is a difficult term to define since the term itself is highly subjective. Since one of the ways that privacy definitions vary is by culture our definition of privacy will be limited to the United States. Privacy must be conceptualized in the context of online activity since there are significant differences between the offline and online worlds. Many offline activities can be conducted without any observation of others which means privacy can be conceptualized in terms of secrecy (Kemp & Moore, 2007). However, any activity online leaves behind a trail of information also known as a digital footprint (Weaver & Gahegan, 2007). A digital footprint can be composed of numerous types of information including metadata (e.g. location, Internet Protocol