Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Privacy Preservation in Web Browsers through Privacy Enhancing Tools

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 99 - Number 16
Year of Publication: 2014
Swarnangini Ghosh
Rajesh Shukla

Swarnangini Ghosh and Rajesh Shukla. Article: Privacy Preservation in Web Browsers through Privacy Enhancing Tools. International Journal of Computer Applications 99(16):31-35, August 2014. Full text available. BibTeX

	author = {Swarnangini Ghosh and Rajesh Shukla},
	title = {Article: Privacy Preservation in Web Browsers through Privacy Enhancing Tools},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {99},
	number = {16},
	pages = {31-35},
	month = {August},
	note = {Full text available}


The Internet has revolutionized the way the world and everything around works. People today find it hard to imagine a world without electronic-mails and search engines where every piece of information is just a few clicks away. The use of social media, online banking services, emails and so on allow for many differernt details concerning our personal life to be stored and used online. Similarly misuse of our data by some unknown organisations is also not in our control. While accessible information about us is growing on the Internet, the potential ways to misuse or exploit them is likewise increasing. This has created privacy concerns and a need for better privacy control for users. It can be concluded from the literature survey, that more research in this area is restricted to conceptualization of privacy than a technological solution. The browsers act as an interface between the users and the Internet, hence more features need to be incorporated into them that can empower the users when interacting with the Internet. This paper emphasizes on the need for designing more privacy enhancing tools using a novel approach called Value Sensitive Design (VSD) which provides methods for creating and assessing a design outcome by taking human ethics into consideration.


  • Aggarwal, G. , Bursztein, E. , Jackson, C. , and Boneh, D. 2010. An analysis of private browsing modes in modern browsers. In Proceedings of 19th USENIX Conference on Security, USENIX Security'10, USENIX Association, Washington DC, pp. 1-15. http://crypto. stanford. edu/~dabo/pubs/papers/privatebrowsing. pdf
  • Bélanger, F. , and Crossler, R. E. 2011. Privacy in the digital age: a review of information privacy research in information systems, MIS Quarterly vol. 35 (4), pp. 1-36. http://mdc. ltindia. com/librarym/mm_files/privacy%20in%20the%20digital%20age. pdf
  • Chung, W. , and Paytner, J. 2002. Privacy Issues on the Internet. In Proceedings of 35th Annual Hawaii International Conference on System Sciences, pp. 1-9. http://citeseerx. ist. psu. edu/viewdoc/download?doi=10. 1. 1. 111. 4421&rep=rep1&type=pdf
  • Czeskis, A. , Dermendjieva, I. , Yapit, H. , Borning, A. , Friedman, B. , Gill, B. , and Kohno, T. 2010. Parenting from the Pocket: Value Tensions and Technical Directions for Secure and Private Parent-Teen Mobile Safety. In Proceedings of 6th SOUPS Symposium on Usable Privacy and Security, Redmond, WA USA, pp. 1–15. https://homes. cs. washington. edu/~borning/papers/czeskis-soups2010. pdf
  • Datatilsynet, Privacy on 1-2-3 /What is privacy?[Online]. Available:http://www. datatilsynet. no/personvern/Hva-er-personvern/. Web-page retrieved on 22nd of June, 2013.
  • Friedman, B. , Kahn, P. H. Jr. and Borning, A. 2013. Value Sensitive Design and Information Systems, Early engagement and new technologies: Opening up the laboratory Philosophy of Engineering and Technology. vol. 6, pp. 55-95. http://www. e-reading. ws/bookreader. php/141465/Himma_-_The_Handbook_of_Information_and_Computer_Ethics. pdf
  • Genkina, A. , and Camp, L. J. 2005. Re-Embedding Existing Social Networks into Online Experiences to Aid in Trust Assessment, SSRN Working paper 707139. SSRN: http://ssrn. com/abstract=707139
  • Krishnamurthy, B. , Naryshkin, K. , and Wills, C. 2011. Privacy leakage vs. Protection measures: the growing disconnect. In Proceedings of Workshop on Web 2. 0 Security and Privacy. http://web. cs. wpi. edu/~cew/papers/w2sp11. pdf
  • Leon, P. G. , Ur, B. , Balebako, R. , Cranor, L. F. , Shay, R. , and Wang, Y. 2011. Why Johnny can't opt out: A usability evaluation of tools to limit online behavioral advertising. In Proceedings 10th international conference on Privacy enhancing technologies, Carnegie Mellon CyLab, Technical Report. http://www. cylab. cmu. edu/files/pdfs/tech_reports/CMUCyLab11017. pdf
  • Microsoft, Tracking Protection List, 2011. Available:http://ie. microsoft. com/testdrive/browser/TrackingProtectionLists/
  • Miller, J. K. , Friedman, B. , and Jancke, G. 2007. Value Tensions in Design: The Value Sensitive Design, Development, and Appropriation of a Corporation's Groupware System. In Proceedings of International ACM Conference on Supporting Group Work, Sanibel Island, Florida, pp. 281-290. http://www. vsdesign. org/publications/pdf/miller_codecoop. pdf
  • Millett, L. I. , Friedman, B. , and Felten, E. 2001. Cookies and Web Browser Design: Toward Realizing Informed Consent Online. In Proceedings of SIGCHI Conference on Human Factors in Computing Systems, ACM, Seattle, WA, pp. 46–52. http://www. cs. stevens. edu/~nicolosi/classes/sp08-cspriv/ref6-3. pdf
  • Park, Y. J. 2011. Digital literacy and privacy behavior online, Communication Research. http://crx. sagepub. com/content/early/2011/08/19/0093650211418338. abstract
  • Sobey, J. , Biddle, R. , Oorschot, P. C. , and Patrick, A. S. 2008. Exploring User Reactions to New Browser Cues for Extended Validation Certificates. In Proceedings of 13th European Symposium on Research in Computer Security: Computer Security, Málaga, Spain, pp. 411–427. http://nparc. cisti-icist. nrc-cnrc. gc. ca/npsi/ctrl?action=rtdoc&an=8914096
  • Whalen, T. , and Inkpen, K. M. 2005. Gathering Evidence: Use of Visual Security Cues in Web Browsers. In Proceedings of Graphics Interface, Canadian Human-Computer Communications Society School of Computer Science Victoria, Ontario, Canada, pp. 137–144. http://pdf. aminer. org/000/236/079/gathering_evidence_use_of_visual_security_cues_in_web_browsers. pdf
  • Xu, H. , Irani, N. , Zhu, S. , and Xu, W. 2008. Alleviating Parental Concerns for Children's Online Privacy: A Value Sensitive Design Investigation. In Proc. 29th International Conference on Information Systems, Paris, pp. 1-9. http://www. cse. psu. edu/~szhu/papers/ICIS2008_COP. doc