CFP last date
21 October 2024
Reseach Article

Privacy Preservation in Web Browsers through Privacy Enhancing Tools

by Swarnangini Ghosh, Rajesh Shukla
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 99 - Number 16
Year of Publication: 2014
Authors: Swarnangini Ghosh, Rajesh Shukla
10.5120/17459-8353

Swarnangini Ghosh, Rajesh Shukla . Privacy Preservation in Web Browsers through Privacy Enhancing Tools. International Journal of Computer Applications. 99, 16 ( August 2014), 31-35. DOI=10.5120/17459-8353

@article{ 10.5120/17459-8353,
author = { Swarnangini Ghosh, Rajesh Shukla },
title = { Privacy Preservation in Web Browsers through Privacy Enhancing Tools },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 99 },
number = { 16 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume99/number16/17459-8353/ },
doi = { 10.5120/17459-8353 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:28:24.199948+05:30
%A Swarnangini Ghosh
%A Rajesh Shukla
%T Privacy Preservation in Web Browsers through Privacy Enhancing Tools
%J International Journal of Computer Applications
%@ 0975-8887
%V 99
%N 16
%P 31-35
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Internet has revolutionized the way the world and everything around works. People today find it hard to imagine a world without electronic-mails and search engines where every piece of information is just a few clicks away. The use of social media, online banking services, emails and so on allow for many differernt details concerning our personal life to be stored and used online. Similarly misuse of our data by some unknown organisations is also not in our control. While accessible information about us is growing on the Internet, the potential ways to misuse or exploit them is likewise increasing. This has created privacy concerns and a need for better privacy control for users. It can be concluded from the literature survey, that more research in this area is restricted to conceptualization of privacy than a technological solution. The browsers act as an interface between the users and the Internet, hence more features need to be incorporated into them that can empower the users when interacting with the Internet. This paper emphasizes on the need for designing more privacy enhancing tools using a novel approach called Value Sensitive Design (VSD) which provides methods for creating and assessing a design outcome by taking human ethics into consideration.

References
  1. Aggarwal, G. , Bursztein, E. , Jackson, C. , and Boneh, D. 2010. An analysis of private browsing modes in modern browsers. In Proceedings of 19th USENIX Conference on Security, USENIX Security'10, USENIX Association, Washington DC, pp. 1-15. http://crypto. stanford. edu/~dabo/pubs/papers/privatebrowsing. pdf
  2. Bélanger, F. , and Crossler, R. E. 2011. Privacy in the digital age: a review of information privacy research in information systems, MIS Quarterly vol. 35 (4), pp. 1-36. http://mdc. ltindia. com/librarym/mm_files/privacy%20in%20the%20digital%20age. pdf
  3. Chung, W. , and Paytner, J. 2002. Privacy Issues on the Internet. In Proceedings of 35th Annual Hawaii International Conference on System Sciences, pp. 1-9. http://citeseerx. ist. psu. edu/viewdoc/download?doi=10. 1. 1. 111. 4421&rep=rep1&type=pdf
  4. Czeskis, A. , Dermendjieva, I. , Yapit, H. , Borning, A. , Friedman, B. , Gill, B. , and Kohno, T. 2010. Parenting from the Pocket: Value Tensions and Technical Directions for Secure and Private Parent-Teen Mobile Safety. In Proceedings of 6th SOUPS Symposium on Usable Privacy and Security, Redmond, WA USA, pp. 1–15. https://homes. cs. washington. edu/~borning/papers/czeskis-soups2010. pdf
  5. Datatilsynet, Privacy on 1-2-3 /What is privacy?[Online]. Available:http://www. datatilsynet. no/personvern/Hva-er-personvern/. Web-page retrieved on 22nd of June, 2013.
  6. Friedman, B. , Kahn, P. H. Jr. and Borning, A. 2013. Value Sensitive Design and Information Systems, Early engagement and new technologies: Opening up the laboratory Philosophy of Engineering and Technology. vol. 6, pp. 55-95. http://www. e-reading. ws/bookreader. php/141465/Himma_-_The_Handbook_of_Information_and_Computer_Ethics. pdf
  7. Genkina, A. , and Camp, L. J. 2005. Re-Embedding Existing Social Networks into Online Experiences to Aid in Trust Assessment, SSRN Working paper 707139. SSRN: http://ssrn. com/abstract=707139
  8. Krishnamurthy, B. , Naryshkin, K. , and Wills, C. 2011. Privacy leakage vs. Protection measures: the growing disconnect. In Proceedings of Workshop on Web 2. 0 Security and Privacy. http://web. cs. wpi. edu/~cew/papers/w2sp11. pdf
  9. Leon, P. G. , Ur, B. , Balebako, R. , Cranor, L. F. , Shay, R. , and Wang, Y. 2011. Why Johnny can't opt out: A usability evaluation of tools to limit online behavioral advertising. In Proceedings 10th international conference on Privacy enhancing technologies, Carnegie Mellon CyLab, Technical Report. http://www. cylab. cmu. edu/files/pdfs/tech_reports/CMUCyLab11017. pdf
  10. Microsoft, Tracking Protection List, 2011. Available:http://ie. microsoft. com/testdrive/browser/TrackingProtectionLists/
  11. Miller, J. K. , Friedman, B. , and Jancke, G. 2007. Value Tensions in Design: The Value Sensitive Design, Development, and Appropriation of a Corporation's Groupware System. In Proceedings of International ACM Conference on Supporting Group Work, Sanibel Island, Florida, pp. 281-290. http://www. vsdesign. org/publications/pdf/miller_codecoop. pdf
  12. Millett, L. I. , Friedman, B. , and Felten, E. 2001. Cookies and Web Browser Design: Toward Realizing Informed Consent Online. In Proceedings of SIGCHI Conference on Human Factors in Computing Systems, ACM, Seattle, WA, pp. 46–52. http://www. cs. stevens. edu/~nicolosi/classes/sp08-cspriv/ref6-3. pdf
  13. Park, Y. J. 2011. Digital literacy and privacy behavior online, Communication Research. http://crx. sagepub. com/content/early/2011/08/19/0093650211418338. abstract
  14. Sobey, J. , Biddle, R. , Oorschot, P. C. , and Patrick, A. S. 2008. Exploring User Reactions to New Browser Cues for Extended Validation Certificates. In Proceedings of 13th European Symposium on Research in Computer Security: Computer Security, Málaga, Spain, pp. 411–427. http://nparc. cisti-icist. nrc-cnrc. gc. ca/npsi/ctrl?action=rtdoc&an=8914096
  15. Whalen, T. , and Inkpen, K. M. 2005. Gathering Evidence: Use of Visual Security Cues in Web Browsers. In Proceedings of Graphics Interface, Canadian Human-Computer Communications Society School of Computer Science Victoria, Ontario, Canada, pp. 137–144. http://pdf. aminer. org/000/236/079/gathering_evidence_use_of_visual_security_cues_in_web_browsers. pdf
  16. Xu, H. , Irani, N. , Zhu, S. , and Xu, W. 2008. Alleviating Parental Concerns for Children's Online Privacy: A Value Sensitive Design Investigation. In Proc. 29th International Conference on Information Systems, Paris, pp. 1-9. http://www. cse. psu. edu/~szhu/papers/ICIS2008_COP. doc
Index Terms

Computer Science
Information Sciences

Keywords

Information Privacy Value Sensitive Design Privacy Enhancing Tools (PETs) Privacy Concern Internet Age.