How Much Privacy We Still Have?
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Informative Article | Information Technology | Malaysia | Volume 3 Issue 12, December 2014

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Privacy is very crucial to users nowadays especially to the OSNs or SNSs, cloud storage, and e-commerce sites. In the era of millions of users throughout the world, it becomes increasingly difficult to protect their private information from being exploited by attackers. Revealing too much of information on those sites will give negative impacts to users as their personal information might be stolen from third parties. In this paper, we analyze the private information whether to reveal or not regarding the privacy concerns, information leakage, and how to improve privacy. Location is considered as private data that the users do not want to reveal as it might contain private and confidential information. A new technology called Geo-location enables our device to detect and record the information. Therefore, the security awareness among the users is important in mitigating the security issues. Thus, this paper discuss on the privacy level that we still have in OSNs, cloud storage, geo-location, as well as in reality.

Keywords: Private information, information security, privacy, geo-location, security, security awareness, OSNs, SNSs, cloud storage, e-commerce

Edition: Volume 3 Issue 12, December 2014

Pages: 570 - 576

Share this Article

How to Cite this Article?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim, "How Much Privacy We Still Have?", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14362, Volume 3 Issue 12, December 2014, 570 - 576

94 PDF Views | 65 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Private information'

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1868 - 1870

A Survey on Privacy Assurance in Personalized Web Search

Abhilasha V. Biradar, K. B. Sadafale

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2923 - 2928

Hiding User Privacy in Location Based Services Through Clustering

Nilam V. Khandade, Snehal Nargundi

Share this Article

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 12, December 2016

Pages: 675 - 679

AES Enabled Private Information Retrieval Scheme for Location Based Queries

Lothe Ashwini Bhaskar, Apare Ravindra S

Share this Article

Similar Articles with Keyword 'information security'

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Review Papers, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 773 - 778

Information Security in ICT from an Islamic Perspective

Jamaludin Ibrahim, Fatima Ahmed Mohamed Nuhaabdulaziz Alyami Effra Altaf Haqani

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1241 - 1243

Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology

Prateek Shivhare, Savaridassan.P

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1358 - 1360

A Secure Image Stegnography Process

Sakshi, Jaspreet Kaur

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Similar Articles with Keyword 'privacy'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 2037 - 2040

A Survey on Privacy Protection in Personalized Web Search

Khwaja Aamer, Dr. A.S Hiwale

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Share this Article

Research Proposals or Synopsis, Information Technology, Malaysia, Volume 4 Issue 12, December 2015

Pages: 1015 - 1020

The Negative Impact of Social Networking Sites on College Students? Time, and Education

Ahmed Mohamed Mahmoud

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 6 Issue 6, June 2017

Pages: 1640 - 1644

Personalizing Search Based on User Profile by Using Anonymization

Abhilasha V. Biradar, K. B. Sadafale

Share this Article

Similar Articles with Keyword 'geo-location'

Survey Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2438 - 2440

Design and Determination of Feasible Centroid for Meeting from Multiple Geo-Points: A Review

Nikhita Jambhule, Jagdish Pimple

Share this Article

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Similar Articles with Keyword 'security'

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1635 - 1639

Developing Firefox add-on for DOM vulnerability Assessment

Saranraj Ilangovan, Geogen George

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 607 - 611

A Survey Based on Fingerprint Recognition - Minutiae

Annapoorani. D, Caroline Viola Stella Mery. M

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Share this Article

Similar Articles with Keyword 'security awareness'

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Survey Paper, Information Technology, Malaysia, Volume 4 Issue 1, January 2015

Pages: 1287 - 1292

Survey on Mobile and Wireless Security Awareness: User Perspectives

Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim

Share this Article

Research Paper, Information Technology, Philippines, Volume 7 Issue 3, March 2018

Pages: 1805 - 1810

Assessment of the Digital Literacy of Agency Authorized Officers and Electronic File Handlers of GSIS Cagayan de Oro

Crystal Sylvette Lavender Palacio-Raro, Dr. Maria Angeles Dano-Hinosolango

Share this Article

Similar Articles with Keyword 'OSNs'

Research Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1877 - 1881

An Ensemble Classification Technique to Control Unwanted Messages in Online Social Networking

M. Lavanya, S. Subadra

Share this Article

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Similar Articles with Keyword 'cloud storage'

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1470 - 1474

Role Based Encryption with Efficient Access Control in Cloud Storage

G. V. Bandewar, R. H. Borhade

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2109 - 2113

Secured Deduplication using Hybrid Cloud Approach

Gaurav Kakariya, Sonali Rangdale

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 7, July 2015

Pages: 2400 - 2403

Secure Deduplication in Cloud Backup Services

Nidhi Panpaliya, Prachi Sorte

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 1061 - 1065

Review On design and Implementation of Enhanced Security in Multicloud Storage System Using Distributed File System

Priyanka R. Raut, Vaidehi Baporikar

Share this Article

Similar Articles with Keyword 'e-commerce'

Research Paper, Information Technology, Nigeria, Volume 4 Issue 4, April 2015

Pages: 264 - 267

Nigerian Cashless Banking Policy: A Multi-Aspectual View of Trust Issues Affecting the Adoption of E-Commerce and Other Technology Tools

Abdul-Hamid A.Kaduna; Mu'azu A. A. Kaduna; Hayatu M. Kaduna

Share this Article

Research Paper, Information Technology, Ghana, Volume 7 Issue 9, September 2018

Pages: 559 - 563

Examination of External and Internal Enablers of Organizational E-Readiness to Implement E-Commerce. A Study of Ghana's Financial Sector

Carlo K.M.H. Adadevoh, Benjamin Ntim

Share this Article

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 570 - 576

How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim

Share this Article

Review Papers, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1904 - 1907

Web Testing: A Review on Tool, Challenges and Techniques

Jyoti

Share this Article

Research Paper, Information Technology, Iraq, Volume 3 Issue 9, September 2014

Pages: 1419 - 1425

Building and Developing E-commerce Website

Elham Mohammed Thabit AbdAlameer

Share this Article
Top