Jedi Knights of Online Privacy Strike Back at Data-Mining Empires

By Goodale, Gloria | The Christian Science Monitor, March 14, 2012 | Go to article overview

Jedi Knights of Online Privacy Strike Back at Data-Mining Empires


Goodale, Gloria, The Christian Science Monitor


Firms such as CloudCapture, which launched Wednesday, and Abine, which debuted its 'Do Not Track Plus' app in February, see a ripe opportunity to turn the technology developed to mine personal data into a tool consumers can use to fight its abuse.

This has been dubbed "the year of Big Data," meaning a time when online firms such as Facebook and Google are capitalizing on an unprecedented and vast amount of personal, user-generated information.

But the rush to corral, and monetize, that data is also fast ushering in a new digital management industry built around growing worries over the loss of personal privacy.

"Every day consumers are beginning to pay more attention to this issue," says Rob D'Ovidio, an associate professor of criminal justice and an expert on Internet security at Drexel University in Philadelphia. As more services to tackle the topic appear, "they will not only give consumers new tools but they will play an educational role in pushing understanding of the larger privacy issues."

Concerns have been escalating over what these Internet giants are doing with user data. Everyone from the White House and the Federal Trade Commission to the EU, and digital rights groups from the US to Europe, have been tussling with the problem of how to get online companies to respect consumers' privacy rights.

So far, voluntary moves by players such as Facebook and Google to address privacy concerns - notably a "Do Not Track" button that has no enforcement mechanism behind it - lack teeth, say critics.

Private companies such as Los Angeles-based CloudCapture, which launched Wednesday, and Abine, which debuted its "Do Not Track Plus" application in February, see a ripe opportunity to turn the same complex technology that was developed to mine personal data into a tool consumers can use to fight its abuse.

"This is a repeat of what we saw at the beginning of the Internet," says Bill Kerrigan, chief executive officer of Abine, a four-year-old online security company based in Boston. "People slowly began to realize there were things going on all over the Internet they had no understanding about, and the antivirus industry was born." The same "awareness-driving-adoption" cycle is now building behind privacy issues, he says.

"Just as people began demanding tools to fight computer viruses, they are now waking up to the need to protect their personal privacy online," Mr. Kerrigan says. "We are at a point where consumers want someone working on their behalf."

More than 580 different technologies are being used to track personal data, he notes. Indeed, 73 percent of people using the Internet consider it an invasion of privacy for a search engine to keep track of searches and use that information to personalize future search results, according to a poll by the Pew Research Center released this past week. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Jedi Knights of Online Privacy Strike Back at Data-Mining Empires
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.