Difference between revisions of "IT Questions regarding the Future of Privacy"

From ScenarioThinking
Jump to navigation Jump to search
Line 13: Line 13:
<li>What privacy issues are related to customer loyalty cards?</li>
<li>What privacy issues are related to customer loyalty cards?</li>
<li>'''How does the price reduction and convergence of cameras affect privacy? (Patrick) '''
<li>'''How does the price reduction and convergence of cameras affect privacy? (Patrick) '''
<pre>
<div style="width:90%; font-size:8pt;overflow:auto">
With over 85% of cell phones in Japan, and an estimated 80% in the USA and Western Europe having built-in cameras, it is becoming much easier for people to  
With over 85% of cell phones in Japan, and an estimated 80% in the USA and Western Europe having built-in cameras, it is becoming much easier for people to  
take pictures of unaware victims or secret products. Increasing the ease of being able to take a quality picture at any time, also increases the amount of  
take pictures of unaware victims or secret products. Increasing the ease of being able to take a quality picture at any time, also increases the amount of  
Line 19: Line 19:
Many venues are already taking or considering taking precautions to remove cell phones from public changing areas or court rooms  
Many venues are already taking or considering taking precautions to remove cell phones from public changing areas or court rooms  
for privacy reasons, seeing as pictures from cell phones can be published online in mere seconds.
for privacy reasons, seeing as pictures from cell phones can be published online in mere seconds.
</pre>
</div>
</li>
</li>
<li>What is the influence of privacy on encryption algorithms?</li>
<li>What is the influence of privacy on encryption algorithms?</li>
<li>'''Does the progression of IT lead to easier stealing of private info? (Patrick)'''<br />
<li>'''Does the progression of IT lead to easier stealing of private info? (Patrick)'''<br />
<pre>
<div style="width:90%; font-size:8pt;overflow:auto">
Private info is commonly stored using encryption algorithms using different bit-coding, from 64bit all the way up to 2048bit encryption. Right now, it is almost  
Private info is commonly stored using encryption algorithms using different bit-coding, from 64bit all the way up to 2048bit encryption. Right now, it is almost  
impossible to crack even a 1024bit encrypted code with the current computing power. However, with nano computers becoming a reality, the safety of these codes is  
impossible to crack even a 1024bit encrypted code with the current computing power. However, with nano computers becoming a reality, the safety of these codes is  
Line 35: Line 35:
once that one piece is linked to the other two pieces, you have something to work with. This is the same with information. Useless raw data becomes meaningful and even  
once that one piece is linked to the other two pieces, you have something to work with. This is the same with information. Useless raw data becomes meaningful and even  
related to individuals as more data is logged and linked to other data.
related to individuals as more data is logged and linked to other data.
</pre>
</div>
</li>
</li>
<li>How much cyber crime is privacy related? (Robert)</li>
<li>How much cyber crime is privacy related? (Robert)</li>
<li>'''How does RFID, Galileo, GPS influence privacy? (Patrick)'''<br />
<li>'''How does RFID, Galileo, GPS influence privacy? (Patrick)'''<br />
<pre>
<div style="width:90%; font-size:8pt;overflow:auto">
RFID chips can be easily concealed in hidden places, this can be handy for supermarket checkouts, but it also means that once outside the store, strangers can  
RFID chips can be easily concealed in hidden places, this can be handy for supermarket checkouts, but it also means that once outside the store, strangers can  
continue reading exactly what is in a person's grocery bag. RFID chips can also hold personal information. New passports now carry a chip with details on the  
continue reading exactly what is in a person's grocery bag. RFID chips can also hold personal information. New passports now carry a chip with details on the  
Line 50: Line 50:
For example, in a survey done by Harris Interactive, only 6% of surveyed wanted their co-workers to know where they were at all times, and only 5% of people wished  
For example, in a survey done by Harris Interactive, only 6% of surveyed wanted their co-workers to know where they were at all times, and only 5% of people wished  
this for their employers.
this for their employers.
</pre>
</div>
</li>
</li>
<li>'''How is Google Earth viewed in regard to privacy? (Patrick)'''<br />
<li>'''How is Google Earth viewed in regard to privacy? (Patrick)'''<br />
<pre>
<div style="width:90%; font-size:8pt;overflow:auto">
Google Earth allows anybody to view relatively high resolution satellite images of almost any place in the world. This has led to complaints from private users as  
Google Earth allows anybody to view relatively high resolution satellite images of almost any place in the world. This has led to complaints from private users as  
well as the British military troops posted in Basra, claiming that the terrorists can easily use Google Earth to plan attacks on the UK troops seeing as the bases  
well as the British military troops posted in Basra, claiming that the terrorists can easily use Google Earth to plan attacks on the UK troops seeing as the bases  
Line 59: Line 59:
backyards. This is seen as a violation of privacy rights. Culturally, privacy is held in higher regard than other places. For this reason Google Earth poses an  
backyards. This is seen as a violation of privacy rights. Culturally, privacy is held in higher regard than other places. For this reason Google Earth poses an  
even greater threat. An article in the Arab News posts concern for Google Earth, as in the muslim culture, privacy is important.
even greater threat. An article in the Arab News posts concern for Google Earth, as in the muslim culture, privacy is important.
</pre>
</div>
</li>
</li>
<li>File Sharing trend and privacy issues?</li>
<li>File Sharing trend and privacy issues?</li>

Revision as of 09:32, 5 March 2007

<< back to 'Questions Regarding the Future of Privacy in 2015'

Questions

  1. What technology and technological solutions are there to maintain privacy? (Folkert)
  2. In what technological areas does privacy play a role? (Folkert)
  3. How is the ubiquity of computers influence privacy? (Folkert)
  4. What is the influence of social networks and privacy? (MSN Email Chat) (Folkert)
  5. Which malware infringes privacy (spam / popup / spyware) ? (Folkert)
  6. Blogs and privacy? (Folkert)
  7. Progress or regression of privacy in relation uprising of blogs and websites? (Folkert)
  8. Is the privacy issue larger in IT than in "real life"?
  9. How will the new passports influence privacy? (stealing, data easily) (Robert)
  10. What privacy issues are related to customer loyalty cards?
  11. How does the price reduction and convergence of cameras affect privacy? (Patrick)

    With over 85% of cell phones in Japan, and an estimated 80% in the USA and Western Europe having built-in cameras, it is becoming much easier for people to take pictures of unaware victims or secret products. Increasing the ease of being able to take a quality picture at any time, also increases the amount of clandestine pictures taken. Many venues are already taking or considering taking precautions to remove cell phones from public changing areas or court rooms for privacy reasons, seeing as pictures from cell phones can be published online in mere seconds.

  12. What is the influence of privacy on encryption algorithms?
  13. Does the progression of IT lead to easier stealing of private info? (Patrick)

    Private info is commonly stored using encryption algorithms using different bit-coding, from 64bit all the way up to 2048bit encryption. Right now, it is almost impossible to crack even a 1024bit encrypted code with the current computing power. However, with nano computers becoming a reality, the safety of these codes is at risk. Current computer processors are reaching their physical limits, and hence multi-core systems have been popular as of late (2006-2007), but even these systems take years to take on heavy encryption. On a more organization side of things; as IT is being used to store more information all the time, more information becomes vulnerable to system attacks and virtual thievery. Locking up important papers in hidden, heavily armored and monitored safes is still a much more secure way to store private data than any electronic method. As this information is moved from safes to electronic storage, the ease of stealing it increases. Another large trend is data mining and data warehousing. These technologies store allow large amounts of data to be stored relatively centrally and in a connected way. The more data is connected to other data, the easier raw data can be extrapolated into actual information. Having one piece of a three-piece device makes no sense, but once that one piece is linked to the other two pieces, you have something to work with. This is the same with information. Useless raw data becomes meaningful and even related to individuals as more data is logged and linked to other data.

  14. How much cyber crime is privacy related? (Robert)
  15. How does RFID, Galileo, GPS influence privacy? (Patrick)

    RFID chips can be easily concealed in hidden places, this can be handy for supermarket checkouts, but it also means that once outside the store, strangers can continue reading exactly what is in a person's grocery bag. RFID chips can also hold personal information. New passports now carry a chip with details on the passport holder, which can be read from a distance and then cloned. Just by walking past an area, a copy of your passport could be made without your passport ever leaving your pocket.

    GPS and the Galileo Project make tracking and tracing of invididuals even easier. The marketing manager of Ericsson Australia said in an interview: “Factors holding back GPS included the availability of integrated handsets and consumer worries about tracking and privacy“. Assuming that the Ericsson marketing department has done sufficient research in the field to come to this conclusion, it serves as evidence that being able to see or trace anything at any time is a cause for privacy concerns. For example, in a survey done by Harris Interactive, only 6% of surveyed wanted their co-workers to know where they were at all times, and only 5% of people wished this for their employers.

  16. How is Google Earth viewed in regard to privacy? (Patrick)

    Google Earth allows anybody to view relatively high resolution satellite images of almost any place in the world. This has led to complaints from private users as well as the British military troops posted in Basra, claiming that the terrorists can easily use Google Earth to plan attacks on the UK troops seeing as the bases are clearly visible on Google Earth. Personal blog posts on the internet also show concern for the visibility of nude sunbathers, and casual sunbathers in their backyards. This is seen as a violation of privacy rights. Culturally, privacy is held in higher regard than other places. For this reason Google Earth poses an even greater threat. An article in the Arab News posts concern for Google Earth, as in the muslim culture, privacy is important.

  17. File Sharing trend and privacy issues?

References

[1]Kanellos, Michael. Crave privacy? New tech knocks out digital cameras, September 19, 2005, CNET News, Link

[2]Charny, Ben. Gymgoers wary of camera phones, December 2, 2003, CNET News, Link

[3]Watching Them, Watching Us. RFID tag privacy concerns Retrieved from http://www.spy.org.uk/cgi-bin/rfid.pl on March 03, 2007

[4]Zetter, Kim. Hackers Clone E-Passports. August 3, 2006. Wired News, http://www.wired.com/news/technology/1,71521-0.html

[5]Jenkins, Chris. Big interest, little use for GPS. January 12, 2007. Australian IT, http://australianit.news.com.au/articles/0,7204,21048399%5E15306%5E%5Enbv%5E,00.html

[6]Hart, Roger. Privacy Concerns a Key Hurdle for Locaton Based Services. February 23, 2007. GeoCarta Blog, http://geocarta.blogspot.com/2007_02_01_archive.html

[7]Harris Interactive. Location-Based Services and Presence Technology: The Future of Telecommunications is Closer Than You Think. Volume 2, Issue 1, February 2007. The Harris Report

[8]Harding, Thomas. Terrorists 'use Google maps to hit UK troops'. January 13, 2007, Telegraph newspaper online, http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2007/01/13/wgoogle13.xml

[9]Al-Ghalib, Essam. Google Earth Raises Privacy, Security Issues. March 27, 2006. Arab News. http://www.globalsecurity.org/org/news/2006/060327-google-earth.htm