Technology: How Advertisers Are Trying to Get Into Your Head
Total Page:16
File Type:pdf, Size:1020Kb
Convenient or Invasive: The Information Age Adam Barreras Amit Mathur Justin Blincoe Jessica McKnight Brittany Burgess Brent McRae Madison Buske Brett Mencin Matthew Collett Kimberly Miller Christopher Cook Kyle Momii Alexa Cowen Steve Monahan Eric Dawson Steven Moulton Joy Eagle Ryan Murray Krista Fox Minji Park Jacob Fuller Sejal Patel Kelsey Good Travis Rabi Mari Gottlieb Amanda Rick Lauren Griffin Jarret Roberts Lindsey Gross Danielle Shea Anna Kaufman Jamie Stoll Nicole Kennedy Caroline Sweeney Ji Hye Kim Thomas Van De Bogart Valerie Kirby Kim Ward Blair Krause Ben Weinbaum Morgan MacBaisey Yael Wolf Matt Macko Drew Woodcock Editorial Committee: Brittany Burgess, Krista Fox, Kelsey Good, Mari Gottlieb, Anna Kaufman, Nicole Kennedy, Matt Macko, Jessica McKnight, Steve Monahan, Amanda Rick, Thomas Van De Bogart, Drew Woodcock Formatting Committee: Sejal Patel and Brent McRae Cover Design: Valerie Kirby Editors: Kai R. Larsen Zoya A. Voronovich ETHICA PUBLISHING Boulder, Colorado i FIRST EDITION, MAY 2007 Copyright © 2007 by Ethica Publishing All rights reserved under International and Pan-American Copyright Conventions. Published in the United States by Ethica Publishing. Library of Congress Cataloging-in-Publication Data Convenient or Invasive: The Information Age/ Kai. R. Larsen and Zoya A. Voronovich. (editors) – 1st ed. ISBN 0-9764284-3-1 1. Social Sciences – Business Ethics Typeface: Palantino Linotype ii TABLE OF CONTENTS Acknowledgements ...................................................................................iv Preface .........................................................................................................v I. Personal Information Privacy 1. Campus Invasion: Security Breaches and Their Trends in Universities across the U.S. ......................................................2 2. Is Banking Online a Safe Alternative to the Old Fashioned Paper and Pen ............................................................................12 3. FICO Scores: Uses and Misuses ...............................................21 4. Privacy Issues Pertaining to Gender Identity and Sexual Orientation .................................................................................31 5. Politicians and Privacy ..............................................................41 II. Consumer Privacy 6. International Privacy and Travel .............................................52 7. Biometrics: Does Convenience Outweigh Privacy? ...............62 8. Advertising and Technology: How Advertisers Are Trying to get Into Your Head ....................................................................72 9. Paypal’s Phishing Dilemma ......................................................82 10. Are Marketers Crossing the Line with Online Tracking? .....92 III. Social Networks and Privacy 11. Can Your Friends Make or Break You? The Analysis of How Friends Portray Each Other ......................................................102 12. Social Networking Privacy and Its Affects on Employment Opportunities .............................................................................111 13. Privacy and Online Dating .......................................................124 14. How does Cyworld and Personal Networking Communities effect people’s communication and relationships? ................135 IV. Corporate Privacy 15. Email Regulation of Employers and Implications on the Workplace ...................................................................................142 16. Celebrity CEOs and Privacy Issues ..........................................152 17. A Balancing Act: Privacy, Regulation, and Innovation in Hedge Funds...............................................................................164 V. Emerging Technology and Privacy Implications 18. Wireless Location Tracking.......................................................176 19. The Evolution of Global Positioning Systems ........................187 20. Consequences of Camera Phones in Today’s Society ............200 21. Risky Business at Wireless Hot Spots ......................................210 22. Citywide Wireless: Process, Implementation, Execution and Privacy .........................................................................................219 iii ACKNOWLEDGEMENTS The authors and editors of this book would like to express their gratitude and thanks to the for their aid in the funding of this text, and their commitment to helping Colorado business students achieve success. Further, we would like to thank Anne Bliss for all her help with the process of writing the book as well as her guest lecture that started us out on the right foot. Other guest-lecturers also helped with different aspects of research for the book: Carol Krismann (libraries), Jay Ballantine (Leeds School), Paul Ohm (School of Law), Gerhard Eschelbeck (CIO, Webroot). iv PREFACE A 1998 Carnegie Foundation report suggested that large research universities should improve undergraduate education through large- scale participation of undergraduates in the universities' research mission. This book is an example of putting the Carnegie suggestion into practice, and it was borne out of the belief that research universities can add unique elements to student education. As a highly ranked research university, the University of Colorado at Boulder has top-notch students with research abilities that should be tapped more often. By learning how to conduct research and by carrying it out, students improve their critical thinking abilities and develop other skills that carry over to all other aspects of their future professional life. Three years ago, when the book Technology and Privacy in the New Millennium was published, it seemed unlikely that an equally pensive and interesting book on the topic of privacy would see the light of day. With the 2007 release of Convenient or Invasive: The Information Age, Leeds School students have once again demonstrated their ability to write and edit a major work of research in less than a semester. The writing level and the quality of the editing of this year’s authors are superb, showcasing the quality of Leeds School graduating undergraduates. Some of these undergraduate students are already on par with graduating Ph.D. students. Most importantly, the students have improved greatly in both areas over the course of the semester. After considering the content of the book, the students decided to focus the title on privacy invasion and convenience, two factors at the core of many of today’s technologies. In this book, we define privacy as an individual or entity’s ability to control personal information. Convenience is defined as any method, opportunity, or object that simplifies a process; something that makes life easier. Perhaps more than anything, as the facilitator for this book, I have learned much from working with these dedicated and intelligent students. Throughout this process of helping students find the inspiration to write their own textbook, several goals have been at the forefront: 1. Expose students to cutting-edge materials 2. Challenge students intellectually 3. Involve students in actual research 4. Instill enthusiasm for scholarship While goals 1-3 were clearly reached; only time will tell whether goal number four was reached. It is hoped that the combination of knowledge gained from researching and writing this book will combine with the increased focus on privacy in the media to develop further interest in scholarship. In fact, just days before the chapters for this book were due in their final version, The Wall Street Journal broke a major story about the privacy of Wal-Mart employees and partners. In what can best be described as a truly Orwellian setup, Wal-Mart security staff routinely read employee emails on the Wal-Mart email system as well as their v private email on such systems as Hotmail and GMail, monitored employee telephone and computer use as well as computer use of employees of partner organizations, while banning use of alternative modes of communication, such as personal cell-phones. Nothing in the story came as a surprise to the chapter authors of this book, as each individual chapter detailed a piece of the societal trend of giving up privacy for convenience. However, as the Wal-Mart example aptly demonstrated, often citizens and employees have no choice in whether to give up their privacy. For anyone reading Orwell’s 1984, perhaps the biggest surprise is the technological simplicity of the government surveillance techniques. Only a few citizens could be monitored through their TVs at the same time, and behavior was modified through the fear of being monitored. Today, almost anything we do can be and is being monitored, including our online hobbies and real-life friends, the places we visit and when we visit that location (through our cell phones and GPS technology), what we talk about in the privacy of our own homes and vehicles (through the microphones on computers and onboard navigation systems), and even what we think (through monitoring of the brain’s p300 responses). In the year of 1984, the general consensus was that Orwell had incorrectly predicted the technological sophistication that 36 years could bring. Today, close to 60 years after Orwell wrote his book, we are far beyond any technology Orwell imagined, and we are living with today’s technology permeating our lives. vi II PPEERRSSOONNAALL IINNFFOORRMMAATTIIOONN PPRRIIVVAACCYY 1 11 Campus Invasion: Security Breaches and Their Trends in Universities Across