Professional Documents
Culture Documents
Seminar Synopsis: 1 Information Privacy Awarness/Visualization Tools
Seminar Synopsis: 1 Information Privacy Awarness/Visualization Tools
Seminar Synopsis
Class: TE-A
1
Dr.D.Y.Patil Institute of Technology Pimpri
2
Information Privacy Awarness/Visualization Tools
ABSTRACT :
Due to the advancement in mobile and wireless communications in today’s
digital world, Internet services like social networks, search engines, etc., have brought
many benefits to the users. However, most of the services also collect excessive
information about the users and their day-to-day activities online. Using “Big Data”
technologies, the user information is collected and analyzed by the service providers
to improve their services, an approach giving rise to several privacy concerns.
INTRODUCTION
Through mobile and wireless technologies, communicating, collaborating,
and computing has resulted in a fast and easy access to a variety of services by the
users. Significant benefits have been accrued, thereby transforming the lives of the
users. More than 10 billion users have registered for more than 200 online social
networking sites over the globe (Kumar, Jain, & Srivastava, 2016) that result in a
large amount of communication about Internet users. The term “mass self-
communication” by Manuel Castells denotes online sharing of a huge amount of text
messages and posts by the Internet users (Castells, 2009). It is observed that 10 billion
2
Dr.D.Y.Patil Institute of Technology Pimpri
3
Information Privacy Awarness/Visualization Tools
text messages and 1 billion posts are shared online every day.
On the one hand, these technologies are carrying us to the new era of a
digital world where cars are driverless, patients are monitored remotely via wearable
medical devices, smart refrigerators tell us list of items as per the expiry dates, etc.
(Rule & Greenleaf, 2010). Users’ are tracked 24x7 by other entities using modern
technologies. This includes constant surveillance by security cameras or CCTV when
we are at shopping malls or at holiday destinations. So, the fact is that the users are an
integral part of the digital world. Hence, the wireless and mobile communication
experience generate efficient and convenient services. Hence, the wireless and mobile
communication experience yield into efficient and convenient services.
Data brokers collect the user data from the discrete sources like governments
(central and state government), openly available media (social media, the Internet,
blogs) and commercial sources (phone companies, banks, car companies, and so on).
After analysis of gathered data, they separate the users as sports loving, interested in
cancer solutions, trekking enthusiasts, blended with political posts, food choices, and
hence along. Besides, they organize collected information into different segments,
which are individually identifiable dossiers that containing, e.g., Marital status,
location, income, shopping, hobbies, job, and travel plan. Then, segmented
information is ready to sell to other data brokers, advertisers, or government sectors
without the user’s direct awareness .
• Web Of Trust :
Web of Trust (WOT) is a website reputation and review service that helps
people make informed decisions about whether to trust a website or not.
WOT is based on a unique crowdsourcing approach that collects ratings and
reviews from a global community of millions of users who rate and comment
on websites based on their individual experiences. Web of Trust goes beyond
simple vote-counting with an algorithm that incorporates user reputation, and
4
Dr.D.Y.Patil Institute of Technology Pimpri
5
Information Privacy Awarness/Visualization Tools
it pulls in data from third-party blacklists as well. Web of Trust marks safe
links with a green icon and dangerous ones with a red icon. For example, if
your friend posts an article on Facebook, and the link might lead somewhere
fishy, Web of Trust puts a red icon next to it.
• Collusion
It is a Firefox extension that will show you in real time, which sites are
tracking you, where you picked up their tracking cookies, and what they can
see. Collusion looks to offer more transparency to users by creating a
visualization of how your data is being spread to different companies as you
navigate the web. Each time it detects data being sent to a behavioral tracker,
it creates a red (advertisers), gray (websites) or blue dot on the visualization
5
Dr.D.Y.Patil Institute of Technology Pimpri
6
Information Privacy Awarness/Visualization Tools
and shows the links between the sites you visit and the trackers they work
with. Collusion does the effective job by visualizing how your data goes in
far and wide to places without your knowledge.
• MailPile(Beta):
A modern, fast web-mail client with user-friendly encryption and privacy
features.Mailpile is an e-mail client!.Mailpile is a search engine and a personal
webmail server.It is an easy way to encrypt your e-mail. Mailpile is software you run
yourself, on your own computer.
Mailpile is an effort to reclaim private communication on the Internet. A project to
rescue our personal lives from the proprietary cloud and prevent our conversations
from being strip-mined for corporate profit and government surveillance. Mailpile is
taking e- mail back.
6
Dr.D.Y.Patil Institute of Technology Pimpri
7
Information Privacy Awarness/Visualization Tools
OBJECTIVES
The Objectives are as follows :
• To understand the most important privacy risks involved when the user
communicates and access variety of online services.As this research revolves
around privacy awareness, so it’s vital to know the understanding of the users
towards privacy
• The indicators could be service providers’ policies over data collection and
sharing, or security measures adopted, ways of data collection, and so on.
• To understand issues and challenges: To get better insights of privacy issues and
challenges in privacy this surveys useful. This survey will give more chances to
identify the possible threats to the users’ information privacy
7
Dr.D.Y.Patil Institute of Technology Pimpri
8
Information Privacy Awarness/Visualization Tools
TOPIC DESCRIPTIPON
Privacy Protection of users’ information is accomplished by various
solutions. An abiding faith is important for users during effective communication with
service providers. A personal trust manager is an entity who can be responsible for
supporting users by communicating how safe the website is to communicate, or what
is the trustworthiness of the website.
• Current practices: The set of the questions in this section was focused to know the
user’s preferred online services, the location of access, etc.
• Awareness about privacy: This section contains the questions to assess the users’
knowledge of privacy. The answers to the questions in this section would provide the
possible threats or motivational factors for privacy protection or awareness.
• Seriousness when online: This section describes the list of questions to know the
how serious is the user whenever they are online.
• Behavior: The section focused on the users’ online behavior in different the context
of various scenarios like information sharing, responding to bulk messages, reactions
to online tracking.
• Privacy policies and law: Considering the privacy policies and concerned law, the
questions were listed in this section. The questions were asked to know policy reading
frequency, view on privacy policy, privacy law
• A user: in the context of medical and Health information: It was also important to
know the users’ activities on a cell phone like security, apps management, location
disclosure. Also, this section of the survey would like to know the users’ view on
8
Dr.D.Y.Patil Institute of Technology Pimpri
9
Information Privacy Awarness/Visualization Tools
APPLICATIONS
• These tools are used to enhance Privacy Enhancing Technologies(PET’s).
• Tools help you in keeping your information private.
• You can keep track of wich websites track you and what do they do with your
personal data.
• UMA(User Managed Access) tools allows you to choose how your data may be
used or what information to provide to certain websites.
• Tools like ghostery help you to avoid the hidden agreements which you may not
read during agreeing the conditions.
REFERENCES
1.)Abdullah, K., Gregory, C., & Beyah, R. (2008). A visualization framework for self- monitoring
of web-based information disclosure. IEEE International Conference on Communications, 1700–
1707. http://doi.org/10.1109/ICC.2008.328
2.)Alsagri, H. S., & Alaboodi, S. S. (2015). Privacy awareness of online social networking in
Saudi Arabia. 2015 International Conference on Cyber Situational Awareness, Data Analytics and
9
Dr.D.Y.Patil Institute of Technology Pimpri
10
Information Privacy Awarness/Visualization Tools
3.)Bureau of South and Central Asian Affairs. (2015). U.S. Relations With India. Retrieved May
29, 2017, from https://www.state.gov/r/pa/ei/bgn/3454.htm
4.)Cardenas, A. a., Manadhata, P. K., & Rajan, S. P. (2013). Big Data Analytics for Security.
IEEE Security & Privacy, 11(6), 74–76. http://doi.org/10.1109/MSP.2013.138
5.)Cheung, C. M. K., Chiu, P.-Y., & Lee, M. K. O. (2011). Online social networks: Why do
students use facebook? Computers in Human Behavior, 27(4), 1337–1343.
http://doi.org/10.1016/j.chb.2010.07.028
7.)Dhawan, S., Singh, K., & Goel, S. (2014). Impact of privacy attitude, concern and awareness on
use of online social networking. Proceedings of the 5th International Conference on Confluence
2014:
The Next Generation Information Technology Summit, 14–17.
http://doi.org/10.1109/CONFLUENCE.2014.6949226
8.)Dhotre, P. S., & Olesen, H. (2015). A Survey of Privacy Awareness and Current Online
Practices of Indian Users. In Proceedings of WWRF Meeting 34, Santa Clara, CA, USA, Apr.
2015 (p. 10). WWRF. Retrieved from http://vbn.aau.dk/en/publications/a-survey-of-privacy-
awareness-and-current- online-practices-of-indian-users(92c00b4f-a720-45b8-b3cb-
9cfbffc7d4bc).html
10
Dr.D.Y.Patil Institute of Technology Pimpri