This will be my last blog for Digital Communication Strategies, and although I have already blogged on this subject, there is much more to talk about and touch upon, particularly observation and its application to advertising.
So, lets define Privacy as: the quality or state of being apart from company or observation. (Merriam Webster 2011) which can be applied to the digital world, especially in the case of observation. Types of observation on the Internet can be broad, from people seeing what you write to your Facebook friends, history showing other computer users what websites you last visited and cookies recording information you enter on certain websites. We can thank the controlling of privacy in general due to article 8 of the European Convention on Human Rights: Council of Europe (1950). Privacy, when applied digitally it is said “the UK’s independent public body is set up to uphold information rights in the public interest, promoting openness by public bodies and data privacy for individuals” (ICO, 2010).
When looking further into this, information is protected, but this mentions nothing about not handling private data altogether. One process of this act is ‘Not keeping information for longer than is necessary’. This means nothing to us in the digital world. It provides no privacy for the public. How do we know what they need the information for in order to judge how long they will need it for? Legislation for the digital age has limited experience and is definitely not a top priority for governments when publics are concerned. The passing of information to companies can target advertising to specific individuals, which could be an example of the mysterious ‘third parties’. We get specific adverts on social media (like I mentioned in my previous blog) and emails about offers and deals we didn’t sign up to or agree to receive.
Developing this further leads us onto cookies. Cookies were developed to maintain continuity on the web. In short, they contain text-character strings that encode relevant information about the user, which is then retrieved when they visit cookie-using websites. The web server can then retrieve that information, finding out information such as common Internet habits, which may not be seen as too much of a problem (Park & Sandhu, 2000). This use of cookies is found in over 50% of a common website sample. I have come across some websites that warn me because a cookie will be placed within my computer, but if I do not agree to this then I cannot proceed further to what I was doing. Therefore, we all know we would accept this cookie to be placed into the computer. They have warned us, therefore what harm can it do? They wouldn’t tell us about something really damaging would they, because then we wouldn’t accept it, would we? Well, the majority does accept it, because we think we know about them but really we have no idea of the dangers or risks.
When applying cookies to advertising, they are becoming a huge threat to online advertising. 30% of users are deleting cookies at least once a month (Soltani et al, 2009). This invasion of privacy can be deleted however, so is it really worth worrying about if you remember to clean up your computer? No. But the new ‘Persistent Identification Element’, developed by an online advertising agency, creates a storage unit within your browser that cannot be deleted by the typical anti cookie/virus software, never mind just deleting cookies from your computer. Surely this is the type of digital privacy breech we should be talking about.
This existence of all types of cookies creates opportunities for Identity theft and inputting information into websites can result in
1. Phishing.
2. Online/physical stalking
3. Embarrassment
4. Blackmailing
5. Reputational damage
Identity theft, you can assume, happens easily on the Internet due to the amount of information you input online, which can include your mothers maiden name and other security questions that are used (Guard privacy & Online Security, 2010). It is easier than physically stealing information as everything is on one platform and if somebody can access one piece of information, the chances are that they can access the rest.
Online stalking/physical stalking can be related back to the previous blog where I focus on Facebook and other social media. Looking at your profile can show where you live, what school/college/university/workplace you visit everyday, what you look like, what your interests are etc. which can create strange bonds to people and result in stalking. Advertisements online can also do this.
Phishing symptoms are finally one of the most popular ways of invasion of privacy from information from cookies. They can find out things, which are important and personal to you, and claim to be them in order to find out further information e.g. your bank asking for confirmation of banking details, Hotmail/Facebook threatening to delete or suspend your account unless certain action is taken. An experiment to test how effective phishing websites were showed 90% were fooled by ‘good’ phishing websites and overall participants made mistakes 40% of the time (Dhamija 2006). This type of privacy breach creates threat and worry amongst the person, as this is something that is an integral part of their lives. The disturbance of this would cause huge disruption for their lives if the ‘problem’ isn’t resolved, so there is a much better chance of falling for the scam due to an overriding panic or worry which occurs before rational thinking.
All of the mentioned above are all huge invasions of privacy as a result of you using the digital world for things as simple as eBay and Facebook. It also shows how advertising can take advantage of this breech. I would say we need to be aware of them, but is aware enough? Can we stop it from happening by being aware or ignoring? My answer is no, and I can honestly admit I have given up worrying about it. I know to check the address bar and other signs for phishing sites, I know only to disclose personal information to trusted websites (with Facebook not being a trusted site for my address) and that is probably all we can do in order to stay as digitally private as possible.