Jump to content

Draft:Cyber privacy

From Wikipedia, the free encyclopedia
  • Comment: As somebody who is minimally familiar with the literature behind this topic, there are multiple problems that need to be tackled:
    * As mentioned above, the tone of the article is completely wrong, this is not a research paper, this is not a persuasive document, the article should be written in the tone of summarizing existing literature on the topic, without convincing the user of anything specific. (if you want to use a existing article as reference Infostealer or Cross-site leaks (both articles that I have created) might be a good place to start)
    * I'm still not convinced that "cyber privacy" as a neologism actually exists in the world. Non of the sources cited here actually define cyber-privacy as being any different from internet privacy or Information privacy. At best, the sources convince me that this would be a redirect to Internet privacy which appear to be dealing with this exact topic.
    * I find it weird that this article manages to tackle this topic without ever referring to PoPETs, USENIX, IEEE SSP NDSS or ACM CCS which are considered to the best quality and most reliable conferences/sources in the areas of cybersecurity and privacy. A lot of the sources are instead memos, institute names, and what appear to be single mentions of the term which are not authoritative in the same way as a review paper in one of those conference would be.
    TLDR, I think this article needs to be completely rewritten to even stand a chance of being accepted in AFC. Sohom (talk) 05:42, 31 August 2024 (UTC)
  • Comment: Multiple unsourced paragraphs. Entities and Contributors to Cyber Privacy, Critics of Cyber Privacy Advocacy, Key Components of Cyber Privacy, Challenges and Future Directions all need more sources. Cowboygilbert - (talk) ♥ 05:20, 31 August 2024 (UTC)
  • Comment: All sources are about components of 'cyber privacy', not the term itself. '''[[User:CanonNi]]''' (talkcontribs) 10:34, 11 August 2024 (UTC)

In short, cyber privacy refers to the protection of personal information and communication across both online and offline digital networks and devices, focusing on the unique privacy challenges of cyberspace.

More specifically, cyber privacy involves the protection of personal information, data, and communication within the interconnected digital environment of cyberspace, addressing privacy concerns related to the security of computer networks and the online and offline activities that depend on these networks. This concept is distinct from information privacy and digital privacy, which covers the broader spectrum of protecting data across all electronic devices and platforms but typically does not account for the decentralized nature of distributed ledger systems, the risk of data re-identification through cyber methods, and several other specific concerns unique to cyberspace. In contrast internet privacy specifically focuses on safeguarding information during online interactions and activities, excluding considerations for offline intranets and other non-internet connected systems (extranets).

Importance of the Issue

[edit]

The subject of cyber privacy has, for decades, incited both practical and theoretical polemics, reflecting its complex and multifaceted nature..[1]. The practical importance is evident as individuals increasingly engage with online services, social media platforms, and interconnected devices, where they encounter significant risks such as identity theft, unauthorized data collection, and cyberattacks. Simultaneously, the theoretical discourse surrounding cyber privacy continues to evolve, with the very definition of the term remaining contentious among philosophers[2] , lawyers[3], scientists[4], government officials[5], journalists [6] and engineers. Despite decades of effort to delineate, refine, and master the concept, consensus remains elusive[7].

This ongoing debate unfolds on multiple fronts. On one side, proponents emphasize the need for robust protections to safeguard personal information[8][9], while on the other, opponents raise concerns about the potential impact on security, public safety[10], and corporate interests[11][3]. Different actors continue to employ their own definitions and terminologies, advocating either for or against cyber privacy within their own conceptual frameworks. This reflects the broader discourse on how to balance privacy with other critical societal needs, underscoring the dynamic and evolving nature of the interconnected issues of cybersecurity, privacy, security, and the varying interests of stakeholders in each of these areas.

Origins and Evolution of the Concept of 'Cyber Privacy'

[edit]

The concept of cyber privacy has developed in parallel with the evolution of the internet and advancements in communication technologies, early debates primarily centered on data protection and the ethical use of emerging systems. More specifically, the term cyber privacy began to gain prominence in the late 1990s as these interconnected networks became more widespread, raising concerns over the protection of personal information online. A targeted search[12] conducted via Google Scholar substantiates that one of the earliest documented uses of the phrase appears in an article by Susan Drucker [13] and Gary Gumpert [14] titled "The Ambiguity of Privacy Rights: Lost in Electronic Space," published in the Free Speech Yearbook[15] in January 1997. In this article, the authors discuss the challenges of ensuring message integrity and the uncertainties surrounding interpersonal cyber privacy, highlighting concerns over secure transactions on the Internet[16]. This represents one of the earliest uses of the term "cyber privacy" in academic literature.

Further, the documented uses of the phrase extend beyond academic circles, appearing, for example, in a journalist article by Louise Kehoe "US, EU at Odds over Cyber Privacy," published in The Financial Post on August 29, 1998[17] , and also gaining popular attention through television media, such as the Computer Chronicles episode titled 'Cyber Privacy,' presented by Stewart Cheifet on June 29, 1998[6]. Further evidence of the early usage of the term can be found in the William S. Richardson School of Law Review, where an article titled "Cyberprivacy on the Corporate Intranet: Does the Law Allow Private-Sector Employers to Read Their Employees' E-mail" was published in the Summer/Fall 1998 issue.[11]

The article by Louise Kehoe was cited[18] in Global Public Goods: International Cooperation in the 21st Century, a 1998 scholarly work by Debora Spar that discusses the differing approaches of the United States and the European Union regarding internet privacy regulations. The citation of Kehoe's article within this context highlights the early recognition of privacy concerns in the burgeoning digital landscape [19].

Further expanding on the theme of privacy in the digital age, journalist Bruce D. Berkowitz wrote an article in The Wall Street Journal on July 19, 2000, titled "Carnivore Won't Devour Cyber-Privacy," where he examined the implications of the FBI's Carnivore (software) surveillance tool designed to monitor email and electronic communications. Berkowitz used the phrase "cyber privacy" to discuss the potential threats posed by cyber surveillance methods to personal privacy.[20]

The year 2008 represented a pivotal moment in the evolution of cyber privacy, spurred by a series of technological milestones. Major advancements, such as Google's processing of 1 trillion URLs, Facebook's milestone of 100 million users, the launch of the first Android phone, and the introduction of reality mining—a technique leveraging cell phone data to uncover user patterns—highlighted the expanding scale of digital interaction[7]. These developments reinvigorated discourse surrounding the necessity of a more robust privacy framework. The early debates of the 1990s laid the foundation for contemporary interpretations of 'cyber privacy,' which continue to be shaped by ongoing deliberations among government agencies[21], legislative bodies[22] [23] , non-governmental organizations, and an increasingly diverse array of businesses[24][25]. These stakeholders actively engage in redefining, interpreting, and applying the concept to navigate the complexities of safeguarding personal information in an increasingly dynamic and interconnected digital landscape.

Entities and Contributors to Cyber Privacy

[edit]

Principled Advocates of Comprehensive Cyber Privacy

[edit]

Entities in this category advocate for robust and extensive protections of personal information and communication across digital networks. They emphasize the importance of comprehensive cyber privacy legislation and policies that address both current and emerging challenges in cyberspace.

The Cyber Privacy Project (CPP)[26] was an organization active primarily between the early 2010s and early 2020s, advocating for privacy rights in the digital era. CPP focused on various issues, including voter ID laws, national identity systems[27], and concerns about government overreach in cybersecurity legislation.[26]. It was among several privacy-focused organizations and experts that contributed to the Electronic Privacy Information Center's response to NIST's request for comments[28] on the first draft of the Smart Grid Cyber Security Strategy[29], highlighting, for example, privacy concerns related to the deployment of smart meters[30]. Besides, CPP was one of the 55 civil liberties groups, including the American Civil Liberties Union, that opposed the Protecting Cyber Networks Act, citing potential for increased surveillance.[31] The organization received grants to support its work, including from the Rose Foundation. Although no longer active, CPP contributed significantly to early discussions on cyber privacy. The CPP was among several organizations that joined a coalition urging[32] the White House not to renew the NSA telephone record collection program (‘Section 215’ of the USA PATRIOT Act) when it expired on June 20, 2014, following the European Court of Justice's decision to invalidate the EU Data Retention Directive. CPP published research and analyses on privacy issues related to air travel, national identity systems, voter ID laws, and medical privacy.[26] They also engaged in advocacy, challenging laws perceived as threats to civil liberties.

Strategic Proponents of Cyber Privacy and Data Security

[edit]

This group supports cyber privacy with a particular focus on the secure handling of data within existing legal frameworks. They advocate for strong data protection measures but balance these with other societal needs, such as security and business innovation.

The National Association of Attorneys General (NAAG) contributes to cyber privacy discussions[33] by emphasizing the secure handling of personal information. While they advocate for protecting user data from breaches and unauthorized access, their focus is often on ensuring compliance with existing laws and regulations[34], rather than pushing for new or more stringent privacy laws. Their advocacy often intersects with issues like consumer protection, especially in the context of preventing data breaches and ensuring companies adhere to privacy standards.

Moderate Advocates for Balanced Cyber Privacy

[edit]

Entities in this category support privacy protections but weigh these against other important interests, such as national security, economic growth, or public safety. They often advocate for flexible regulations that can adapt to different contexts.

Critics of Cyber Privacy Advocacy

[edit]

In the discourse surrounding cyber privacy, there exists a nuanced perspective that recognizes the necessity of certain surveillance measures within the framework of national security, public safety, and technological advancement. Proponents of these views argue that the responsible use of surveillance technologies, such as facial recognition system and mass data collection tools, can be instrumental in maintaining societal order and security. For instance, facial recognition system, while often criticized for its privacy implications, is also seen as a critical tool in law enforcement and public safety efforts, providing the capability to quickly identify and apprehend individuals who pose a threat to the community.[35]

Moreover, the advocacy for legislative frameworks like the USA PATRIOT Act is often grounded in the argument that enhanced surveillance capabilities are essential for protecting national security, particularly in the context of counterterrorism and cyber threats. These perspectives suggest that, in a world of increasingly sophisticated threats, the ability to monitor communications and collect data is indispensable for preempting attacks and ensuring national stability.[36] Likewise, cybersecurity measures that include user activity monitoring and data collection are defended on the basis that they are vital for protecting critical infrastructure and responding to emerging threats in real time, where the cost of inaction could be catastrophic.[37]

In the public safety domain, the deployment of surveillance cameras in public spaces is often justified by the argument that such measures serve as a deterrent to crime and provide valuable evidence in criminal investigations. This perspective suggests that the benefits of enhanced security and the potential to save lives can outweigh the concerns related to privacy, particularly when surveillance is conducted under strict regulatory oversight[38][39] . Similarly, during public health crises such as the COVID-19 pandemic, contact tracing technologies were widely supported as necessary tools for preventing the spread of disease. While these technologies raised concerns about privacy, they were also seen as crucial for safeguarding public health, illustrating the complex trade-offs that sometimes must be made between individual (cyber) privacy and collective safety.[40]

In these debates, the advocacy for surveillance and data collection is often framed within a broader context of ensuring security, efficiency, and public welfare, highlighting the intricate balance between privacy rights and other societal imperatives.

Key Components of Cyber Privacy

[edit]

The development of the term 'cyber privacy' reflects a convergence of influences from technological advancements, legal frameworks, corporate practices, and their interpretation by non-profit organizations and academic scholars. As digital technologies have become integral to various sectors, the discourse on cyber privacy has naturally expanded, though its scope remains subject to interpretation and debate. This section examines the primary components of cyber privacy, as identified in diverse academic, legal, and business literature, illustrating the nuanced and evolving nature of the concept.

Cybersecurity Integration

[edit]

Cyber privacy is deeply interconnected with cybersecurity, reflecting the increasing need for robust protection measures in the face of escalating cyber threats. Effective cybersecurity is fundamental to maintaining cyber privacy[24], encompassing a range of measures such as encryption, firewalls, secure communication protocols, and real-time monitoring systems. These tools are critical in preventing unauthorized access to personal data and ensuring the integrity of sensitive information across digital platforms. In 2024, according to a report by Goodwin Procter the adoption of Artificial intelligence-driven cybersecurity tools has accelerated, enabling more sophisticated threat detection and response mechanisms that adapt to evolving cyber risks[41]. For example, one such tool, named explicitly with "cyber privacy" in its title, utilizes Artificial Intelligence Markup Language implemented through the free web application from Pandorabots in combination with Android JS[42]. This Generative artificial intelligence-driven solution is designed to enhance user understanding and awareness of privacy in cyberspace, making a concerted effort to address the critical issue of human error in this sensitive field.[43]

Dynamic and Real-Time Privacy Challenges

[edit]

Unlike general data privacy, cyber privacy places a strong emphasis on dynamic, real-time protection mechanisms. The rise of advanced cyber threats, such as ransomware and AI-enabled attacks[44] , necessitates privacy protections that can respond instantly to potential breaches. This includes automated systems that can detect and mitigate risks as they occur, providing continuous protection for users. As companies increasingly integrate real-time monitoring and adaptive security measures, the line between cybersecurity and privacy continues to blur, with Electronic Frontier Foundation emphasizing the need for proactive, rather than reactive, privacy management.[45]

Global and Cross-Jurisdictional Privacy Issues

[edit]

Cyber privacy also tackles the complex challenges of data flow across international borders[15]. The global nature of the internet means that data can easily cross jurisdictions, each with its own set of privacy laws and regulations. In 2024, the European Union's General Data Protection Regulation (GDPR) and new cybersecurity laws such as the NIS2 Directive[46] have set stringent standards for data protection, influencing global practices. Meanwhile, the United States continues to see a fragmented approach, with different states implementing their own privacy laws, complicating compliance for multinational companies.[47] [48][49]

Digital Identity and Anonymity

[edit]

One perspective within the discourse on cyber privacy emphasizes the importance of protecting digital identities and ensuring that users have the option to maintain anonymity[6] in cyberspace. Proponents of this view argue that such measures are crucial for safeguarding individuals' rights to free expression and preventing identity theft. The continued growth of anonymizing technologies like Tor (network) and Virtual private networks appears to be driven by increasing awareness of and engagement with narratives about mass surveillance and data breaches[45][50]. These tools are essential for users seeking to protect their personal information from being tracked or exposed in the digital world.[51] Furthermore, technologies such as MAC address rotation [52], which can now be implemented on both PCs and devices running IOS 18 and Android 10, enhance privacy by periodically changing the device's MAC address even while connected to a network, thereby making it more difficult for third parties to track a user's movements.[53][54] Similarly, IP address rotation, often facilitated by Virtual private networks and proxy services, further protects user privacy by periodically changing the IP address, thereby reducing the risk of profiling and tracking by third parties[55][56]


The United States Congress has also explored legal frameworks for more proactive cyber defense measures, exemplified by Representative Tom Graves’ H.R.3270 - Active Cyber Defense Certainty Act, which aimed to authorize individuals and entities to undertake specific active defense actions against cyber threats while balancing the need for regulatory oversight[57]

Privacy in Interactions with Virtual Entities

[edit]

As AI and virtual entities become more integrated into daily life, cyber privacy emphasizes the need to protect personal data during interactions with these systems. The rise of AI-driven services, including virtual assistants and automated decision-making systems, has introduced new privacy challenges. These include concerns about the transparency of AI algorithms[58], the potential for manipulation, and the ethical use of personal data collected through these interactions. In 2024, there is a growing focus on AI governance, with regulators and companies working to embed privacy by design into AI systems to ensure user data is not misused[59][60]. Advanced techniques such as Containerization (computing), Hardware virtualization, and Sandbox (computer security)[61] are increasingly employed[60] to strengthen data environments against emerging threats.[50]

Challenges and Future Directions

[edit]

The field of cyber privacy faces ongoing challenges as technology evolves. Emerging technologies such as Quantum computing and the Internet of Things (IoT) introduce new privacy risks that require innovative solutions. Additionally, there is a growing need for international cooperation in developing consistent global standards for cyber privacy.

See also

[edit]

References

[edit]
  1. ^ "The Institute for Cyber Security & Privacy (ICSP) at H-BRS". Hochschule Bonn-Rhein-Sieg University of Applied Sciences. Archived from the original on 2023-02-06. Retrieved 2024-08-28. Cyber Security & Cyber Privacy are both cross-sectional disciplines that are already of immense importance for the economy, administration and society in a ubiquitously digitalised and interconnected reality of life.
  2. ^ Magnani, Lorenzo (2007). "4, "Knowledge as Duty: Cyberprivacy"". Morality in a Technological World: Knowledge as Duty. Cambridge: Cambridge University Press. pp. 110–118. doi:10.1017/CBO9780511498657. ISBN 9780511498657. Recent strides in communications and computer technology, while beneficial in many ways, pose increasingly great risks to identity and cyberprivacy. If too much knowledge is incorporated into external artificial things, the visibility of people can become dangerously excessive, and they risk diminished privacy, decreased control, less protection against interference, and weakened cyberdemocracy. We must be vigilant about monitoring the moral effects of distributing knowledge, and we must learn to anticipate possible negative outcomes and unethical consequences of evolving information policies.
  3. ^ a b Cossrow, Brent A. (2010). "2010 Is Not 1984: Stengart v. Loving Care Agency, Inc. and Cyber Privacy in the Workplace" (PDF). Bloomberg Law Reports. Bloomberg L.P. Retrieved 2024-08-28.
  4. ^ Bhavani Thuraisingham; Murat Kantarcioglu; Elisa Bertino; Chris Clifton (25–30 June 2017). Towards a Framework for Measuring Data Privacy in Practice. 2017 IEEE International Congress on Big Data (BigData Congress). Honolulu, HI, USA: IEEE. doi:10.1109/BigDataCongress.2017.92. ISBN 978-1-5386-1996-4. Retrieved 2024-08-31. In the 1990s that data privacy was seriously discussed among computer scientists. This was due to the fact that it was now possible to extract personally identifiable information from mining/analyzing the vast amounts of data...., this paper has provided a vision for developing a framework to measure cyber privacy. ... We identified several challenges including ... developing an approach for estimating the 'privacy' afforded by a [computer- and software-based data mining] technique or system .... to address the challenges ... a methodology to measure the privacy and utility of a system that combines different privacy-preserving techniques.
  5. ^ "Ley para la Protección de la Privacidad Cibernética de Nuestros Niños y Jóvenes (Cyber Privacy Protection Law)". Diario de Sesiones, Procedimientos y Debates de la Decimonovena Asamblea Legislativa, Quinta Sesión Ordinaria (PDF) (Report). Vol. LXXI. Senado de Puerto Rico. June 15, 2023. ...pueda publicar y/o divulgar información personal de usuarios menores de edad residentes en Puerto Rico, más allá del nombre y ciudad donde reside...
  6. ^ a b c Cheifet, Stewart (1998-06-23). "Cyber Privacy". Computer Chronicles. Season 15. Episode 18. PBS. Retrieved 2024-08-28. We'll show how to surf the web anonymously ... You'll see what can happen to all that information the websites gather about your personal behavior ... We'll introduce ... the way to encrypt your email so that only the intended recipient could read it.
  7. ^ a b Eltahawy, Bahaa (2022). "Understanding Cyberprivacy: Context, Concept, and Issues". Wirtschaftsinformatik 2022 Proceedings. Even though cyberprivacy is discussed in previous literature, there is a lack of a common understanding on cyberprivacy in terms of scopes, issues and context... we tried to address the topic of cyberprivacy and build an adequate understanding of it – which helps to improve protection of individuals, systems, and institutions in cyberspace.
  8. ^ Wang, Edward (2019). "Effects of Brand Awareness and Social Norms on User-Perceived Cyber Privacy Risk". International Journal of Electronic Commerce. 23 (2): 272–293. doi:10.1080/10864415.2018.1564553.
  9. ^ "The Implications of Consumer Privacy for Brand Trust". Archived from the original on 2024-02-25. Retrieved 2024-08-11. The immediacy of an ad appearing on social media right after you have had a conversation with a friend on a niche topic ... consumers find it "creepy.
  10. ^ "Communiqué de presse - Tribunal de Paris - Justice.fr" (PDF). Tribunal de Paris. Justice.fr. 2024-08-26. Retrieved 2024-08-29.
  11. ^ a b Beeson, Jared D. (1998). "Cyberprivacy on the Corporate Intranet: Does the Law Allow Private-Sector Employers to Read Their Employees' E-mail?" (PDF). University of Hawaii Law Review. 20 (1): 165–219. Retrieved 13 August 2024.
  12. ^ "Google Scholar Search for articles containing "cyber privacy" keywords from 1990 to 2000". Retrieved 13 August 2024.
  13. ^ "Susan Drucker's page at Hofstra University website". Retrieved 2024-08-14.
  14. ^ "Gary Gumpert at researchgate.net". Retrieved 2024-08-14.
  15. ^ a b "Free Speech Yearbook at ISSN portal". Retrieved 2024-08-14.
  16. ^ Drucker, Susan; Gumpert, Gary (January 1997). "The Ambiguity of Privacy Rights: Lost in Electronic Space". Free Speech Yearbook. 35: 13–26. doi:10.1080/08997225.1997.10556206. The extent to which a sender can ascertain that the recipient(s) have received a message as sent has become increasingly significant in cyberspace and has generated some of the most heated debate and litigation in the realm of cyber-privacy. Along the way, a message can be read, and even more, it can be modified.
  17. ^ Kehoe, Louise (1998-08-29). "US, EU at Odds over Cyber Privacy". The Financial Post. Retrieved 2024-08-28.
  18. ^ Global Public Goods: International Cooperation in the 21st Century. 1999. Retrieved 13 August 2024.
  19. ^ Spar, Debora L. (1999). "Global Public Goods: International Cooperation in the 21st Century". In Kaul, Inge; Grunberg, Isabelle; Stern, Marc A. (eds.). The Public Face of Cyberspace: Regulating Online Privacy in the European Union (PDF). Oxford University Press. pp. 344–363. doi:10.1093/0195130529.003.0017. Archived from the original on 2021-11-09. Retrieved 2024-08-28.
  20. ^ Berkowitz, Bruce D. (July 19, 2000). "Carnivore Won't Devour Cyber-Privacy". The Wall Street Journal. Retrieved 13 August 2024.
  21. ^ William Newhouse; Stephanie Keith; Benjamin Scribner; Greg Witte (August 2017). National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (PDF) (Report). NIST Special Publication. Gaithersburg, MD: National Institute of Standards and Technology (NIST). pp. 24–53. doi:10.6028/NIST.SP.800-181. Retrieved 2024-08-31. National Initiative for Cybersecurity Education, Framework Tasks... that have been identified as being part of a cybersecurity work role... task No T0871 "Collaborate on cyber privacy and security policies and procedures
  22. ^ Cyber Privacy Act (PDF) (H.R. 5108). 111th U.S. Congress. April 22, 2010. Retrieved 2024-08-31.
  23. ^ Cyber Privacy Fortification Act of 2015 (H.R. 104). 114th Congress. 2015-01-06. Retrieved 2024-08-29. A person who owns or possesses data in electronic form containing a means of identification and has knowledge of a major security breach of the system containing such data maintained by such person, must provide prompt notice of such breach to the United States Secret Service or Federal Bureau of Investigation.
  24. ^ a b "Cyber Privacy Solutions". Deloitte. Retrieved 2024-08-29. Cyber Privacy offers include... addressing regulatory compliance.
  25. ^ "Cyber Security Services: Privacy". KPMG. 12 September 2023. Retrieved 2024-08-29. [official job title:] The global cyber privacy leader and partner at KPMG
  26. ^ a b c "Cyber Privacy Project". Web Archive. Archived from the original on 2013-09-27. Retrieved 2024-08-26.
  27. ^ Crawford v. Marion County Election Board (U.S. Court of Appeals for the Seventh Circuit 2007) ("Amicus curiae Cyber Privacy Project (“CPP”) is a non-partisan organization focusing on governmental intrusions against Fourth and Fifth Amendment rights of privacy, particularly in governmental databanks and national identification schemes for voting, travel, and work."), Text, archived from the original on 2022-10-15.
  28. ^ "Draft NIST Interagency Report (NISTIR) 7628, Smart Grid Cyber Security Strategy and Requirements; Request for Comments". Gaithersburg, MD: National Institute of Standards and Technology (NIST). October 9, 2009. Retrieved 2024-08-30.
  29. ^ Lee, Annabelle; Brewer, Tanya (September 2009). DRAFT NISTIR 7628: Smart Grid Cyber Security Strategy and Requirements (PDF) (Report). National Institute of Standards and Technology (NIST). Retrieved 2024-08-30.
  30. ^ EPIC Comments on NIST Smart Grid Cyber Security Standards (PDF) (Report). Electronic Privacy Information Center. December 1, 2009. Archived from the original (PDF) on 2023-06-12. Retrieved 2024-08-30.
  31. ^ "Coalition Letter from 55 Civil Society Groups and Security Experts and Academics Opposing PCNA" (PDF). Newsamerica.org. Retrieved 2016-06-28.
  32. ^ "The U.S. should follow EU lead on privacy protections". Consumer Action. Archived from the original on 2023-02-08. Retrieved 2024-08-30.
  33. ^ "Internet Safety, Cyber Privacy, and Security Committee". National Association of Attorneys General (NAAG). Archived from the original on 2024-02-21. Retrieved 2024-08-28.
  34. ^ "NAAG Attorney General Amicus Briefs". National Association of Attorneys General (NAAG). Archived from the original on 2024-05-19. Retrieved 2024-08-28.
  35. ^ "Proponents' case for surveillance". axios.com. 7 September 2019. Retrieved 2024-08-26.
  36. ^ "We Built a Surveillance State. What Now?". POGO.org. Retrieved 2024-08-26.
  37. ^ Chin-Rothmann, Caitlin (8 December 2023). "Reforming Section 702 of the Foreign Intelligence Surveillance Act for a Digital Landscape". CSIS.org. Retrieved 2024-08-26.
  38. ^ La Vigne, Nancy G.; Lowry, Samantha S.; Markman, Joshua A.; Dwyer, Allison M. (2011). Evaluating the Use of Public Surveillance Cameras for Crime Control and Prevention (PDF) (Report). Urban Institute, Justice Policy Center. Retrieved 2024-08-29.
  39. ^ "Research roundup: Do surveillance cameras prevent crime?". The Journalist's Resource, Harvard Kennedy School. 2021-03-29. Retrieved 2024-08-29.
  40. ^ "Contact tracing and warning apps during COVID-19". commission.europa.eu. Retrieved 2024-08-26.
  41. ^ "Goodwin's 2024 Data, Privacy & Cybersecurity Outlook: Key Trends and Predictions for the Coming Year". Goodwin Law. 2024-01-15. Archived from the original on 2024-08-14. Retrieved 2024-08-11.
  42. ^ "AndroidJS". android-js.github.io. Retrieved 2024-08-14.
  43. ^ Irfan Syamsuddin, Rini Nur, Irmawati, Kasim Kasim, Muhammad Fajri Raharjo, Kahlil Muchtar (2023-08-02). "Evaluation of CyPACH: A Cyber Privacy Advisor Chatbot". 2023 2nd International Conference on Computer System, Information Technology, and Electrical Engineering (COSITE). IEEE. pp. 7–12. doi:10.1109/COSITE60233.2023.10249650. ISBN 979-8-3503-4306-9. Retrieved 2024-08-14.{{cite book}}: CS1 maint: multiple names: authors list (link)
  44. ^ Jhanjhi, NZ; Humayun, Mamoona; Almuayqil, Saleh N. (2021). "Cyber Security and Privacy Issues in Industrial Internet of Things" (PDF). Computer Systems Science and Engineering. 37 (3): 361–380. doi:10.32604/csse.2021.015206.
  45. ^ a b "Privacy Issues". Electronic Frontier Foundation. Retrieved 2024-08-11.
  46. ^ "NIS2 Directive: Measures for a High Common Level of Cybersecurity Across the Union". EUR-Lex (An official website of the European Union). European Union Law. 2022-12-27. Retrieved 14 August 2024.
  47. ^ "Goodwin's Data, Privacy & Cybersecurity Insights". Archived from the original on 2024-08-14. Retrieved 2024-08-27.
  48. ^ "What is the GDPR? The need-to-know guide for data protection". 7 November 2018. Retrieved 2024-08-11.
  49. ^ "California Consumer Privacy Act (CCPA) - Official Government Website". 15 October 2018. Retrieved 2024-08-11.
  50. ^ a b "Privacy + Data Security Predictions for 2024". Retrieved 2024-08-11.
  51. ^ "The Tor Project - Anonymity Online". Retrieved 2024-08-11.
  52. ^ Hugon, Johann; Cunche, Mathieu; Begin, Thomas (August 2022). "RoMA: Rotating MAC Address for Privacy Protection". SIGCOMM 2022 - 36th Conference of the ACM Special Interest Group on Data Communication – Poster Session. Amsterdam, Netherlands. doi:10.1145/3546037.3546055.
  53. ^ "The Evolution of Privacy Features: From MAC Randomization To MAC Address Rotation". Retrieved 2024-08-11.
  54. ^ "MAC Address Randomization: Privacy at the Cost of Security and Convenience". 9 October 2020. Retrieved 2024-08-11.
  55. ^ "What is a rotating IP address?". NordVPN. 12 June 2023. Retrieved 2024-08-11.
  56. ^ Dalvi, Ashwini; Paranjpe, Swapneel; Amale, Riddhi; Kurumkar, Sarvesh; Kazi, Faruk; Bhirud, Sunil G. (2021). "SpyDark: Surface and Dark Web Crawler". 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC). pp. 45–49. doi:10.1109/ICSCCC51823.2021.9478098.
  57. ^ "H.R.3270 - Active Cyber Defense Certainty Act". 28 June 2019. Retrieved 2024-08-14. Congress determines that the use of active cyber defense techniques, when properly applied, can also assist in improving defenses and deterring cybercrimes... [Additionally,] the purpose of this Act is to provide legal certainty by clarifying the type of tools and techniques that defenders can use that exceed the boundaries of their own computer network.
  58. ^ "Privacy in the World of AI" (PDF). Global: KPMG. September 2023. Archived from the original (PDF) on 2024-03-21. Retrieved 2024-08-30.
  59. ^ "AI How-To Sheets". CNIL. Retrieved 2024-08-29. The CNIL provides concrete answers for the creation of databases used to train artificial intelligence (AI) systems, which involve personal data.
  60. ^ a b "Cloudflare's Guide on Data Privacy". Retrieved 2024-08-11.
  61. ^ Verma, Manish; Nand, Parma (23–25 November 2023). A Profile-Based Privacy Protection Method using Sandbox Environment and k-Anonymity: Computer Data Privacy. 2023 International Conference on Communication, Security and Artificial Intelligence (ICCSAI). Greater Noida, India: IEEE. pp. 119–123. doi:10.1109/ICCSAI59793.2023.10421582. Retrieved 2024-08-29.