A potential topic for my inquiry project, I was concerned with, is Internet privacy. While brainstorming and reading online about this topic I have already learned that there are going to be many different paths I could take. This topic interested me because I wonder if we really do have privacy on the internet.
I teamed up with my MacBook, that I have had for about half a decade now, to explore this topic. My journey begins here:
Wikipedia: Internet Privacy (Origin)
I chose to begin my journey here because it is very broad, gives me a lot of information, and this specific page is rich with links. After reading this article I have concluded that this is the main link. I will keep referring to this link and going back to it. This website is the hub of which all the other information branches off of, but leads back to. I first discover that privacy can entail personally identifiable information or non-personally identifiable information such as a site visitor’s activity. I proceeded on clicking on a link about personally identifiable information.
Here I figured out that PII is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. This information is becoming easier to collect and could be detrimental when obtained by a criminal. In more detail criminals can stalk and steal your identity. That is where I clicked for an even more detailed reading.
2. Wikipedia: Identity Theft (Dead End)
Although this is a dead end and I already know a lot about identity theft, I acquired even more vital information. Criminals can use identity theft in committing financial identity theft, identity cloning, medical identity theft, and child identity theft. By committing these crimes criminals can obtain goods and services with credit cards, use it in a daily life, and obtain medical care or drugs. Identity theft can also facilitate illegal immigration, terrorism, phishing and espionage. What was also found on this link were more in depth explanations and major examples throughout history. After visiting this site I went back to origin website.
3. Schneier on Security (Dead End)
As I continued reading the original article I stumbled upon two men that had different views of this situation. Steve Rambam, a private investigator specializing in Internet privacy cases, believes privacy no longer exists. On the other hand, Bruce Schneier says, “Privacy protects us from abuses by those in power, even if we’re doing nothing wrong at the time of surveillance.” I clicked on the reference to this quote because I wanted the break down of it and for it to be explained in more detail. On that website I learned other meanings of the word privacy and also new forms of debate such as “security versus privacy.”
After going back to the original site after yet another dead end, I found out that Internet Privacy is a subset of Information Privacy so I clicked on that link. This link was more of what I was looking for. It dealt with the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. Once I read that page I found a topic that was more interesting to me. I know there are set laws and loopholes on privacy over the internet, but what are the public’s expectation of privacy?
Here I learned that expectation of privacy is a legal test which is crucial in defining the scope of the applicability of the privacy protections of the Fourth Amendment. Just a heads up the Fourth Amendment prohibits unreasonable search and seizures and requires any warrant to be judicially sanctioned and supported by probable cause. There are in fact two types of expectations of privacy, subjective expectation of privacy that involves a certain individual’s opinion and objective that involves society. Overall it is related to but not he same thing as right to privacy. Right to privacy is more broad and to read more on this topic you must see privacy law.
6. Wikipedia: Privacy Law (Dead End)
Privacy laws deal with the regulation of personal information about individuals which can be collected by governments and other public as well as private organizations. I feel the online world opens a new realm of privacy since you choose to put that information out there. This page also lists specific privacy laws that include Online Privacy Laws but did not have a link to it. So might have to back up a few steps to get back on the path of privacy and the online world.
I think I might have found a great Inquiry Project topic! As I looked for more links in my original article I came across a link about privacy issues of social networking sites. This is probably the most modern article concerning online privacy I could find. This article deals with cyberstalking, location disclosure, social profiling, 3rd party disclosure, invasive privacy agreements, and law enforcement prowling the networks. All of those being potentially important pieces to the project. I again tried to narrow my scope to one topic and chose cyberstalking because it interested me.
8. Wikipedia: Cyberstalking (Dead End)
Cyberstalking, specifically is the use of Internet or other electronic means to stalk or harass an individual, a group, or an organization. It may include false accusations, defamation, slander, and libel. This made me question how they make these laws and how to they would go about writing them? I know I am asking a lot of what if questions but making threats I understand is serious but stalking? You can’t really do anything about that. If you choose to put your information out there then a person should be able to stalk. Well I think that is as in depth as I can get on that topic. So just to widen my range of information on online privacy I chose to click on the link to a Wikipedia page regarding Internet for information.
This topic goes back to being very general but I hope it puts me back on the path of online privacy. I read through this and I was familiar with a lot of the things listed in the article. I tried to find something I could relate privacy to and found computer and network surveillance.
The exact definition of this is the monitoring of computer activity, of data stored on a hard drive, or being transferred over computer networks such as the Internet. I found a little subsection dealing with social network analysis. Then I concluded that I could narrow my searching down to online privacy from the government specifically, since I have a lot of information about it above or just as a branch to my topic. Turns out they are already investing money into agencies working on these projects to create social network “maps” and research. These agencies include the Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA), and the Department of Homeland Security (DHS). I read up on each of those agencies and it seems like they have no limitations on how far they can search up information in online world.
In summation, I did not necessarily come to one complete conclusion on a topic but I could in fact use all of the significant information above to put in one paper. Throughout this trail I chose certain links that just sparked ideas in my head. I also chose to follow the ones I know would lead to another. But as you can see my links can tell you that my mind is all over the place and again I thought too hard about it. As you approach the last link it does not summarize or even mark the end of my searching. It only represents a road block until I can put all the links together or choose a specific one to deal with.
In the end my computer and I did well in the search. I could only wish that my computer could talk back to me and give me feed back. But by no means would have been able to reach the last link without working with the computer. In addition, my computer needed me for basic instructions and guidance. It was a mutual relationship between my computer and I because we worked off of each other. I look forward to future endeavors and trails to travel with my Macbook!