How Much Privacy We Still Have?
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Informative Article | Information Technology | Malaysia | Volume 3 Issue 12, December 2014

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Privacy is very crucial to users nowadays especially to the OSNs or SNSs, cloud storage, and e-commerce sites. In the era of millions of users throughout the world, it becomes increasingly difficult to protect their private information from being exploited by attackers. Revealing too much of information on those sites will give negative impacts to users as their personal information might be stolen from third parties. In this paper, we analyze the private information whether to reveal or not regarding the privacy concerns, information leakage, and how to improve privacy. Location is considered as private data that the users do not want to reveal as it might contain private and confidential information. A new technology called Geo-location enables our device to detect and record the information. Therefore, the security awareness among the users is important in mitigating the security issues. Thus, this paper discuss on the privacy level that we still have in OSNs, cloud storage, geo-location, as well as in reality.

Keywords: Private information, information security, privacy, geo-location, security, security awareness, OSNs, SNSs, cloud storage, e-commerce

Edition: Volume 3 Issue 12, December 2014

Pages: 570 - 576

Share this Article

How to Cite this Article?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim, "How Much Privacy We Still Have?", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14362, Volume 3 Issue 12, December 2014, 570 - 576

133 PDF Views | 94 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Private information'

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1868 - 1870

A Survey on Privacy Assurance in Personalized Web Search

Abhilasha V. Biradar, K. B. Sadafale

Share this Article

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2923 - 2928

Hiding User Privacy in Location Based Services Through Clustering

Nilam V. Khandade, Snehal Nargundi

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 12, December 2016

Pages: 675 - 679

AES Enabled Private Information Retrieval Scheme for Location Based Queries

Lothe Ashwini Bhaskar, Apare Ravindra S

Share this Article

Similar Articles with Keyword 'information security'

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020

Pages: 1643 - 1647

Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana

Issah Bala Abdulai, Abu Sulemana

Share this Article

Review Papers, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 773 - 778

Information Security in ICT from an Islamic Perspective

Jamaludin Ibrahim, Fatima Ahmed Mohamed Nuhaabdulaziz Alyami Effra Altaf Haqani

Share this Article

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 2358 - 2361

Information Security

Asif Husain

Share this Article

Similar Articles with Keyword 'privacy'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2441 - 2444

Privacy-Preservation of Centralized and Distributed Social Network by Using L-Diversity Algorithm

Shankaranand, P. Rajasekar

Share this Article

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1868 - 1870

A Survey on Privacy Assurance in Personalized Web Search

Abhilasha V. Biradar, K. B. Sadafale

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1390 - 1394

Efficient Privacy Protection in Social Networks

Bharath Kumar Gowru, Ramadevi Polagani

Share this Article

Similar Articles with Keyword 'geo-location'

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2438 - 2440

Design and Determination of Feasible Centroid for Meeting from Multiple Geo-Points: A Review

Nikhita Jambhule, Jagdish Pimple

Share this Article

Similar Articles with Keyword 'security'

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1635 - 1639

Developing Firefox add-on for DOM vulnerability Assessment

Saranraj Ilangovan, Geogen George

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this Article

Informative Article, Information Technology, India, Volume 6 Issue 3, March 2017

Pages: 1283 - 1284

Android Security, An Overview

Raj Singh Gaur

Share this Article

Similar Articles with Keyword 'security awareness'

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Survey Paper, Information Technology, Malaysia, Volume 4 Issue 1, January 2015

Pages: 1287 - 1292

Survey on Mobile and Wireless Security Awareness: User Perspectives

Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim

Share this Article

Research Paper, Information Technology, Philippines, Volume 7 Issue 3, March 2018

Pages: 1805 - 1810

Assessment of the Digital Literacy of Agency Authorized Officers and Electronic File Handlers of GSIS Cagayan de Oro

Crystal Sylvette Lavender Palacio-Raro, Dr. Maria Angeles Dano-Hinosolango

Share this Article

Similar Articles with Keyword 'OSNs'

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1877 - 1881

An Ensemble Classification Technique to Control Unwanted Messages in Online Social Networking

M. Lavanya, S. Subadra

Share this Article

Similar Articles with Keyword 'cloud storage'

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 7, July 2015

Pages: 2400 - 2403

Secure Deduplication in Cloud Backup Services

Nidhi Panpaliya, Prachi Sorte

Share this Article

Survey Paper, Information Technology, India, Volume 5 Issue 3, March 2016

Pages: 1208 - 1210

Survey on Re-encryption based Attribute Revocation in Data Access Control for Multi-Authority Cloud Storage

Kalyani G. Kotangale, Milind Penurkar

Share this Article

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1865 - 1867

Survey on Cloud Computing Security Algorithms

Akash Kanthale, S. P. Potdar

Share this Article

Similar Articles with Keyword 'e-commerce'

Research Paper, Information Technology, Nigeria, Volume 4 Issue 4, April 2015

Pages: 264 - 267

Nigerian Cashless Banking Policy: A Multi-Aspectual View of Trust Issues Affecting the Adoption of E-Commerce and Other Technology Tools

Abdul-Hamid A.Kaduna; Mu'azu A. A. Kaduna; Hayatu M. Kaduna

Share this Article

Research Paper, Information Technology, Ghana, Volume 7 Issue 9, September 2018

Pages: 559 - 563

Examination of External and Internal Enablers of Organizational E-Readiness to Implement E-Commerce. A Study of Ghanas Financial Sector

Carlo K.M.H. Adadevoh, Benjamin Ntim

Share this Article

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Review Papers, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1904 - 1907

Web Testing: A Review on Tool, Challenges and Techniques

Jyoti

Share this Article

Research Proposals or Synopsis, Information Technology, Namibia, Volume 6 Issue 11, November 2017

Pages: 1395 - 1400

e-Readiness Assessment of Small to Medium Enterprises for Business to Consumer eCommerce in Namibia

Nkululeko Mthembo, Nomusa Dlodlo

Share this Article
Top