2010 Feb 21
see also the unit on Privacy Issues
|This web page has audio clips - just click on the icon (like the one to the left) and you can hear Prof. Richardson's voice adding additional information to topics on the page.||turn on your speakers to hear audio clips|
used in the following courses taught by Prof. Richardson
|INTRODUCTION||,||This unit covers
email surveillance and email filtering
have come from Iran, where the fundamental government controls the internet.
the number of Internet users is increasing very fast and recently the government
banned a high speed internet too.
fortunately I have read amazing news today from Canadian researchers in
University of Toronto. They have created great software which its name
think this article related to our discussion in the class when you mentioned
about “Firewalls” two weeks ago, I think there is a very important issue
in e-business, because for example If I was in clothing business, and If
I want to write some of those “META” codes for increasing my web site ranking,
I do not have to write “Woman”, “Underwear”, “Girls” and etc in the “Meta”
part because my web page will be filtering by those mess censorship computer
worries privacy groups"
"WASHINGTON — Governments worldwide have made it easier for authorities to augment citizen databases and eavesdrop on telephone and online conversations in order to fight terror, according to a survey of privacy regulations. The report, written by privacy activists Electronic Privacy Information Center www.epic.org and Privacy International, show the United States was not alone in passing new laws that value increased security over personal privacy."
permission to quote given by Joanne MacDonald, TORSTAR Syndicate Sales, in an email 2004 Dec 09
is the web page for the actual Report noted in the 2002 Star article
a general theme toward total identification," said Sarah Andrews, an author
of the report, which was released last week. "When you're outside in public
or when you're online, you can be identified.'That dismays privacy groups,
which worry about free speech restrictions and abuses of power. They
have fought new laws like the U.S. anti-terror legislation that lowered
the bar on surveillance requirements by authorities.
"Stewart Baker, a former general counsel for the NSA, said increased data sharing might have helped identify the Sept. 11 hijackers. He said many surveillance proposals were already moving toward passage, and speeded up by legitimized fears of a terrorist threat. "They're really complaining about changes in the world rather than changes in the law," said Baker.
"Web Trackers: The Spies
in Your Computer"
American law, data is owned not by the subject of the data but by the concern
"Web trackers -- software technology designed to track an individual's Web surfing habits for marketing purposes -- are becoming a more prevalent part of the Internet user experience than ever before, despite growing awareness of the privacy issues associated with them.
|The tracking companies that
make and sell the software appeal to potential clients by presenting
themselves as "solutions providers." While they emphasize their ability
to collate the information they collect, the real hard work of these
market research firms is obtaining the actual data to analyze, Gartner
senior research analyst Bill Gassman told NewsFactor Network.
"Data is the golden
nugget of their business model," Gassman told NewsFactor. "If they
lose that, they're toast."
The Spies in Your Computer"
"NewsFactor spoke with representatives of two Web tracking firms: Ottawa, Ontario-based WebHancer Corporation and Cambridge, Massachusetts-based NetGenesis. Despite their disparate data collection methods, both companies claimed that they assiduously protect user privacy -- and that it is in their best interest to do so. WebHancer tracks consumer Web surfing habits by installing a program (generally bundled with shareware and freeware programs that WebHancer sponsors) on users' Windows PCs. The application then shadows the users, reporting what Web sites they visit, their pattern once within a given Web site, and how long they remain at the site before abandoning it.
addition, the applications seek to determine to what degree usage patterns
are determined by the content and design of a given Web site or by technical
- at odds with privacy rights
|article by Sandra Rubin,
senior business writer, in the National Post, titled
"You've got mail, but who else reads it?; E-mail filtering is controversial, but prevalent"
Rubin explained that E-mail
filtering systems have developed at companies were the excessively large
volume of e-mail has created problems for the hardware capacity and as
a result there have been investigations as to why volume has been so high.
In some companies they read only the subject heading of email to determine
the % of personal vs. corporate, in other companies they read the entire
message, or use software programs that pick out key words.
- Public ready for products that assure e-mail privacy
By Tyler Hamilton 2004 Aug 30th (first published in the Toronto Star)
the full article is PDF'd on echoworx.com's website www.echoworx.com/news/TorontoStar_04-08-30.pdf
says "E-mail, leaves a digital trail
behind that others — your jealous spouse,
curious parents, mischievous colleagues or a prying boss — can
easily follow. As a text-based medium it can
be copied and forwarded to millions of people within minutes. Not only
that, copies are stored on ISP servers, corporate servers and in the computers
of both the sending and receiving parties, making it easy for people to
probe past messages."
the world moves to wireless through technologies such as Wi-Fi and Bluetooth,
e-mail becomes an even more vulnerable target. Earlier this month [2004
Aug], security experts at a hacker conference in Las Vegas demonstrated
a Bluetooth "rifle" that, when aimed at a Bluetooth-enabled mobile device
more than a kilometre away, can pluck e-mail messages and other information
from the air. Fake e-mail messages could be planted on the device without
the owner's knowledge."
Maney explains "An existing service called MessageTag can track whether an e-mail was opened. AOL can do the same for e-mail sent to other AOL users. But neither allows the extensive monitoring of DidTheyReadIt.com."
"The service comes from Rampell Software of Cambridge, Mass. DidTheyReadIt.com will cost $50 a year. You register on the Web site, and then every time you send an e-mail, you add .didtheyreadit.com to the end. An e-mail address would look like this: firstname.lastname@example.org. The tracking service could be used by job hunters who want to see if their résumés were read, or by salespeople wanting to track pitches."
From the website of DidTheyReadIt.com " When you use DidTheyReadIt, e-mails that you send are automatically and invisibly tracked. The instant the recipient opens your message, DidTheyReadIt automatically notifies you. "
permission to quote from ecommercetimes.com given by publisher Richard Kern in an email Dec 10th, 2004. Prof. Richardson is also a contributing writer to ecommercetimes.com. Copies of emails kept on file in the permissions binder.
permission to quote from, and use the EFF material was given by Kathy Ann, webmaster for the EFF in an email Dec 3rd, 2003. Copies of emails kept on file in the permissions binder.
permission to quote from
ComputingCanada given by publisher Joe Tersigni of itbusiness.ca, the parent
company, in May 2005. Copies of emails kept on file in the permissions
||CONTACT I MAIN PAGE I NEWS GALLERY I E-BIZ SHORTCUTS I INT'L BIZ SHORTCUTS I MKTG&BUSINESS SHORTCUTS I TEACHING SCHEDULE|
|MISTAKES ITEXTS USED I IMAGES I RANK IDISCLAIMER I STUDENT CONTRIBUTORS I FORMER STUDENTS I|