Digital privacy is frequently used to advocate for the rights of individuals and consumers to privacy in e-services and is typically used in opposition to the business practices of many e-marketers, corporations, and companies who gather and use such information and data. Information privacy, communication privacy, and individual privacy are three sub-related characteristics that can be used to characterize digital privacy. 


Since information and data published on social media have become more and more valuable, interest in digital privacy has grown. Social media users are now seen as unpaid digital labourers, as one pays for free e-services by sacrificing their private.

 Types Privacy

1, Information Security

Information privacy in the context of digital privacy refers to the notion that people should have the ability to control how their digital information is gathered and utilized. For personally identifiable information, this is especially important.

2, Confidential Communication

In terms of digital privacy, communication privacy refers to the idea that people should be able to communicate information digitally freely and with the expectation that their communications will be secure—that is, that messages and communications will only be accessible to the sender's original intended recipient.

Nonetheless, there are numerous ways in which communications might be intercepted or transmitted to other recipients without the sender's awareness. Direct communication interception is possible via a variety of hacking techniques, such as the man-in-the-middle assault (MITM). 

Both the idea of information privacy and the field of information technology have developed throughout time (IT). The growth of networking and computing resulted in a significant change in how information is exchanged.

3, Specific Privacy

Individual privacy, as used in the context of digital privacy, refers to the idea that people have the freedom to use the internet without being bothered by unwanted information and the ability to choose what information they are exposed to.

 Receiving unsolicited advertisements, emails, or spam on the internet or being forced to take acts that they would not otherwise take are both examples of digital invasions of personal privacy. In these situations, the individual's right to privacy has been violated because they can no longer exist digitally unhindered by unwelcome information.

Violations of Privacy and Information

There are ways to get someone's personal information without their consent. Although the term hacking is often used to describe these targeted attacks, it only refers to the general practice and not the precise application of hacking techniques. Here is a list of various hacking techniques that can be used to invade someone's online privacy. There are two types of invasions in terms of intent inside hacking:

both directed attacks at a certain person or group of people.

Phishing

Private information can often be obtained through phishing.

 This often involves a somebody (often referred to in this context as a hacker) creating a website that resembles other significant websites that a target user frequently uses. The real website may seem exactly like the phishing website, but the URL may have a different domain or a different spelling, such as.org in place of.com. With a link in a fake email that is created to appear as though it came from the website the target person frequently visits, the site can be reached by the target person.

Development and Dissent

A popular societal issue right now is online privacy. For instance, over the previous ten years, the term digital privacy has been used more than five times as often in publications that have been published.  Following the 2013 mass surveillance revelations, Eric Berlow and Sean Gourley gave a TED talk that raised concerns about the privacy of cloud storage and social media.  Although the privacy of digital information is a broad problem, it frequently relates especially to data about a person's identity that is exchanged via public networks. 

Since the American Foreign Intelligence Surveillance Act's secrecy is more publicly known, digital privacy is becoming more and more of a concern in the context of widespread surveillance.


Post a Comment

Previous Post Next Post