Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Privacy: Plug the Internet Peep Hole
Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
Blekinge Institute of Technology, Department of Software Engineering and Computer Science.
2001 (English)Independent thesis Advanced level (degree of Master (One Year))Student thesis
Abstract [en]

The Internet is a relatively new technology that has developed explosively during the last 10 years. The Internet-technology has been accepted rapidly by users, but the legal and ethical aspects have not been updated at the same rapid rate. Trust in electronic services or products is founded on knowledge and an understanding of what happens during a session and of the effects that might occur. Within electronically based services there are obvious risks for invisible and undesired results such as intrusions on privacy. In the traditional relationship of a service provider and a user, the question of privacy is clear, whereas in the new, Internet-related relationship between a service provider and a user, it is not. We have performed an informed survey concerning privacy, carried out through interviews. From the answers in the interviews it is clear that the threat against privacy is perceived as a problem, but that it is overshadowed by other issues such as safe conducts of payment, functioning distribution systems and reclamation etc. This could be due to the difficulty of addressing an intangible problem such as privacy when there are other issues that are as important and easier to address since they concern an actual purchase. To increase the trust of the users in the Internet and e-commerce branch, we believe that the Internet peephole needs to be plugged from within the branch. A user should neither have to worry about where his or her personal information goes or who has access to it nor for which purpose it will be used. The users must be made aware of what threats their information faces and which certificates that can protect it. If the providers of products and services on the Internet do not gain the trust of the users, in the end, cyberspace will be a desolate place.

Place, publisher, year, edition, pages
2001. , p. 36
Keywords [en]
Privacy, Informationsintegritet, Integrity, Electronic security, Säkerhet, Certifiering
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:bth-1568Local ID: oai:bth.se:arkivex7E2E125BD0CB47BEC1256AB0002DC464OAI: oai:DiVA.org:bth-1568DiVA, id: diva2:828811
Uppsok
Technology
Supervisors
Available from: 2015-05-18 Created: 2001-08-22 Last updated: 2018-01-11Bibliographically approved

Open Access in DiVA

fulltext(265 kB)191 downloads
File information
File name FULLTEXT01.pdfFile size 265 kBChecksum SHA-512
313eeb5ab7915a13189960c056c2524e227fdf550efac3c8b6ccdd03f0d10fdc0bdaefb3eef2a32f4561559b42f13a7f10e4f6f5f0ca50befe9ea8477f694a69
Type fulltextMimetype application/pdf

By organisation
Department of Software Engineering and Computer Science
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 191 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 222 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf