Even such things as warfare, terrorism and crime can be committed with the use of information systems and tools; these of which post an ominous threat to the privacy of users. The United States, with its highly networked infrastructure, is perhaps both the most powerful and the most vulnerable in this situation. The Pentagon is expected to suffer about two million information attacks this year and alone, and business losses to cyber crime, though difficult to measure precisely, total in the billions of dollars each year. The aim of this paper is to discuss all of this, as well as any and all key elements in relation to this issue. This is what will be dissertated in the following.
privacy protection in the area of computers, and these views can be incredibly differing in regards to the views of the legal or illegal nature of this issue. The government in general, the FBI, businesses, the American Civil Liberties Union, the United States Supreme Court, computer software manufacturers; each with their own separate opinion and ideals on the issue, and all of these which must be taken fully and thoroughly into consideration.
A new era of search is being ushered in, and with this comes new and innovative issues about search privacy. Most people are surprisingly shocked to discover that personal information about themselves is out on the web and made easily accessible through various different forums. Search engines such as Google have also been incorporated into this issue, although the fact "that the information was online has not been the search engines' fault, of course." (Sullivan, 2004). All the search engines have done, after all, is make it easier to find things that one is looking for. However, their role as conduits has meant that they have often times had to take the blame for someone else's poor security.
Internet privacy consists of privacy over the media of the Internet; it consists of the ability to control what information one reveals about oneself over the Internet, and as well, to control who can then access that information. "Internet privacy forms a subset of computer privacy." (Wikipedia, 2006). One thing which must be understood is that of the differing degrees of necessary privacy control. For example, those with only a casual interest in Internet privacy need not achieve total anonymity, while those who desire and/or require much stronger privacy often times must use Internet anonymity to ensure privacy - which is use of the Internet without giving any third parties the ability to link the Internet activities to personally-identifiable information of