Informative Article | Information Technology | Malaysia | Volume 3 Issue 12, December 2014
How Much Privacy We Still Have?
Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim
Privacy is very crucial to users nowadays especially to the OSNs or SNSs, cloud storage, and e-commerce sites. In the era of millions of users throughout the world, it becomes increasingly difficult to protect their private information from being exploited by attackers. Revealing too much of information on those sites will give negative impacts to users as their personal information might be stolen from third parties. In this paper, we analyze the private information whether to reveal or not regarding the privacy concerns, information leakage, and how to improve privacy. Location is considered as private data that the users do not want to reveal as it might contain private and confidential information. A new technology called Geo-location enables our device to detect and record the information. Therefore, the security awareness among the users is important in mitigating the security issues. Thus, this paper discuss on the privacy level that we still have in OSNs, cloud storage, geo-location, as well as in reality.
Keywords: Private information, information security, privacy, geo-location, security, security awareness, OSNs, SNSs, cloud storage, e-commerce
Edition: Volume 3 Issue 12, December 2014
Pages: 570 - 576
How to Cite this Article?
Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim, "How Much Privacy We Still Have?", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14362, Volume 3 Issue 12, December 2014, 570 - 576
133 PDF Views | 94 PDF Downloads
Similar Articles with Keyword 'Private information'
Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016
Pages: 1868 - 1870A Survey on Privacy Assurance in Personalized Web Search
Abhilasha V. Biradar, K. B. Sadafale
Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014
Pages: 570 - 576How Much Privacy We Still Have?
Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015
Pages: 2923 - 2928Hiding User Privacy in Location Based Services Through Clustering
Nilam V. Khandade, Snehal Nargundi
Research Paper, Information Technology, India, Volume 5 Issue 12, December 2016
Pages: 675 - 679AES Enabled Private Information Retrieval Scheme for Location Based Queries
Lothe Ashwini Bhaskar, Apare Ravindra S
Similar Articles with Keyword 'information security'
Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014
Pages: 570 - 576How Much Privacy We Still Have?
Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1576 - 1580Intrusion Detection in Wireless Network Using Fuzzy Rules
Ketaki P. Bhusari, Swati G. Kale
Survey Paper, Information Technology, Ghana, Volume 9 Issue 4, April 2020
Pages: 1643 - 1647Analysis of the Security Threat and Vulnerability of Smartphone use among Tertiary Students in Ghana
Issah Bala Abdulai, Abu Sulemana
Review Papers, Information Technology, Malaysia, Volume 3 Issue 12, December 2014
Pages: 773 - 778Information Security in ICT from an Islamic Perspective
Jamaludin Ibrahim, Fatima Ahmed Mohamed Nuhaabdulaziz Alyami Effra Altaf Haqani
Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017
Pages: 2358 - 2361Information Security
Asif Husain
Similar Articles with Keyword 'privacy'
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 91 - 93A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud
Dilipprasad.E, Ajay.R, K. Durairaj
Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016
Pages: 1751 - 1754Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage
Kalyani G. Ktangale, Milind Penurkar
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 2441 - 2444Privacy-Preservation of Centralized and Distributed Social Network by Using L-Diversity Algorithm
Shankaranand, P. Rajasekar
Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016
Pages: 1868 - 1870A Survey on Privacy Assurance in Personalized Web Search
Abhilasha V. Biradar, K. B. Sadafale
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 10, October 2014
Pages: 1390 - 1394Efficient Privacy Protection in Social Networks
Bharath Kumar Gowru, Ramadevi Polagani
Similar Articles with Keyword 'geo-location'
Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014
Pages: 570 - 576How Much Privacy We Still Have?
Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim
Survey Paper, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 2438 - 2440Design and Determination of Feasible Centroid for Meeting from Multiple Geo-Points: A Review
Nikhita Jambhule, Jagdish Pimple
Similar Articles with Keyword 'security'
Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020
Pages: 1598 - 1602An Approach to Storage of Data on Cloud Computing and Challenges Involved
Pranshu Prenam, Rahul Chawda
Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016
Pages: 1751 - 1754Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage
Kalyani G. Ktangale, Milind Penurkar
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1635 - 1639Developing Firefox add-on for DOM vulnerability Assessment
Saranraj Ilangovan, Geogen George
Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016
Pages: 1465 - 1469PTP Method in Network Security for Misbehavior Detection Using Entropy
Neha Pathak, R. S. Apare
Informative Article, Information Technology, India, Volume 6 Issue 3, March 2017
Pages: 1283 - 1284Android Security, An Overview
Raj Singh Gaur
Similar Articles with Keyword 'security awareness'
Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014
Pages: 570 - 576How Much Privacy We Still Have?
Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim
Survey Paper, Information Technology, Malaysia, Volume 4 Issue 1, January 2015
Pages: 1287 - 1292Survey on Mobile and Wireless Security Awareness: User Perspectives
Nadhirah binti Nazri, Noor Azian binti Mohamad Ali, Jamaludin Ibrahim
Research Paper, Information Technology, Philippines, Volume 7 Issue 3, March 2018
Pages: 1805 - 1810Assessment of the Digital Literacy of Agency Authorized Officers and Electronic File Handlers of GSIS Cagayan de Oro
Crystal Sylvette Lavender Palacio-Raro, Dr. Maria Angeles Dano-Hinosolango
Similar Articles with Keyword 'OSNs'
Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014
Pages: 570 - 576How Much Privacy We Still Have?
Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim
Research Paper, Information Technology, India, Volume 3 Issue 12, December 2014
Pages: 1877 - 1881An Ensemble Classification Technique to Control Unwanted Messages in Online Social Networking
M. Lavanya, S. Subadra
Similar Articles with Keyword 'cloud storage'
Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016
Pages: 1751 - 1754Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage
Kalyani G. Ktangale, Milind Penurkar
Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014
Pages: 570 - 576How Much Privacy We Still Have?
Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim
Research Paper, Information Technology, India, Volume 4 Issue 7, July 2015
Pages: 2400 - 2403Secure Deduplication in Cloud Backup Services
Nidhi Panpaliya, Prachi Sorte
Survey Paper, Information Technology, India, Volume 5 Issue 3, March 2016
Pages: 1208 - 1210Survey on Re-encryption based Attribute Revocation in Data Access Control for Multi-Authority Cloud Storage
Kalyani G. Kotangale, Milind Penurkar
Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016
Pages: 1865 - 1867Survey on Cloud Computing Security Algorithms
Akash Kanthale, S. P. Potdar
Similar Articles with Keyword 'e-commerce'
Research Paper, Information Technology, Nigeria, Volume 4 Issue 4, April 2015
Pages: 264 - 267Nigerian Cashless Banking Policy: A Multi-Aspectual View of Trust Issues Affecting the Adoption of E-Commerce and Other Technology Tools
Abdul-Hamid A.Kaduna; Mu'azu A. A. Kaduna; Hayatu M. Kaduna
Research Paper, Information Technology, Ghana, Volume 7 Issue 9, September 2018
Pages: 559 - 563Examination of External and Internal Enablers of Organizational E-Readiness to Implement E-Commerce. A Study of Ghanas Financial Sector
Carlo K.M.H. Adadevoh, Benjamin Ntim
Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014
Pages: 570 - 576How Much Privacy We Still Have?
Ayn Nur Azhana Binti Azhar Amanullah, Nur Faizah Binti Ab Aziz, Maya Novia Sari, Jamaludin Bin Ibrahim
Review Papers, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 1904 - 1907Web Testing: A Review on Tool, Challenges and Techniques
Jyoti
Research Proposals or Synopsis, Information Technology, Namibia, Volume 6 Issue 11, November 2017
Pages: 1395 - 1400e-Readiness Assessment of Small to Medium Enterprises for Business to Consumer eCommerce in Namibia
Nkululeko Mthembo, Nomusa Dlodlo