International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 110

Informative Article | Information Technology | Malaysia | Volume 3 Issue 12, December 2014


How Much Privacy We Still Have?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim


Abstract: Privacy is very crucial to users nowadays especially to the OSNs or SNSs, cloud storage, and e-commerce sites. In the era of millions of users throughout the world, it becomes increasingly difficult to protect their private information from being exploited by attackers. Revealing too much of information on those sites will give negative impacts to users as their personal information might be stolen from third parties. In this paper, we analyze the private information whether to reveal or not regarding the privacy concerns, information leakage, and how to improve privacy. Location is considered as private data that the users do not want to reveal as it might contain private and confidential information. A new technology called Geo-location enables our device to detect and record the information. Therefore, the security awareness among the users is important in mitigating the security issues. Thus, this paper discuss on the privacy level that we still have in OSNs, cloud storage, geo-location, as well as in reality.


Keywords: Private information, information security, privacy, geo-location, security, security awareness, OSNs, SNSs, cloud storage, e-commerce


Edition: Volume 3 Issue 12, December 2014,


Pages: 570 - 576


How to Cite this Article?

Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim, "How Much Privacy We Still Have?", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB14362, Volume 3 Issue 12, December 2014, 570 - 576

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Private information'

Downloads: 106

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1868 - 1870

A Survey on Privacy Assurance in Personalized Web Search

Abhilasha V. Biradar, K. B. Sadafale

Share this Article

Downloads: 111

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2923 - 2928

Hiding User Privacy in Location Based Services Through Clustering

Nilam V. Khandade, Snehal Nargundi

Share this Article

Similar Articles with Keyword 'information security'

Downloads: 112

Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020

Pages: 1643 - 1647

Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana

Issah Bala Abdulai, Abu Sulemana

Share this Article

Downloads: 114

Review Papers, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 773 - 778

Information Security in ICT from an Islamic Perspective

Jamaludin Ibrahim, Fatima Ahmed Mohamed Nuhaabdulaziz Alyami Effra Altaf Haqani

Share this Article

Similar Articles with Keyword 'privacy'

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Downloads: 2 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Similar Articles with Keyword 'security'

Downloads: 0

Survey Paper, Information Technology, Iraq, Volume 10 Issue 7, July 2021

Pages: 1341 - 1348

Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study

Zainab Dalaf Katheeth, Bashar Dheyaa Noor, Ammar Dheyaa Noor

Share this Article

Downloads: 2 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Similar Articles with Keyword 'security awareness'

Downloads: 113

Survey Paper, Information Technology, Malaysia, Volume 4 Issue 1, January 2015

Pages: 1287 - 1292

Survey on Mobile and Wireless Security Awareness: User Perspectives

Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim

Share this Article

Downloads: 164

Research Paper, Information Technology, Philippines, Volume 7 Issue 3, March 2018

Pages: 1805 - 1810

Assessment of the Digital Literacy of Agency Authorized Officers and Electronic File Handlers of GSIS Cagayan de Oro

Crystal Sylvette Lavender Palacio-Raro, Dr. Maria Angeles Dano-Hinosolango

Share this Article

Similar Articles with Keyword 'cloud storage'

Downloads: 101

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Downloads: 106

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1865 - 1867

Survey on Cloud Computing Security Algorithms

Akash Kanthale, S. P. Potdar

Share this Article

Similar Articles with Keyword 'ecommerce'

Downloads: 91 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Information Technology, United States of America, Volume 9 Issue 7, July 2020

Pages: 1087 - 1088

Modern Warehouse Operations Execution Using Mobile Devices

Dhanesh Thatikonda

Share this Article

Downloads: 101 | Monthly Hits: ⮙1

Research Paper, Information Technology, United States of America, Volume 9 Issue 7, July 2020

Pages: 946 - 948

Retail Business Operations Transformation by 5G

Dhanesh Thatikonda

Share this Article

Similar Articles with Keyword 'Private'

Downloads: 101

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Downloads: 103

Survey Paper, Information Technology, Malaysia, Volume 3 Issue 4, April 2014

Pages: 754 - 759

The Ethical Dilemma of Professional IT

Cutifa Safitri, Yunura Azura, Jamaluddin Bin Ibrahim

Share this Article

Similar Articles with Keyword 'information'

Downloads: 324 | Monthly Hits: ⮙2

Survey Paper, Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir

Share this Article

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article
Top