Protection of Privacy on the Web

Most people are concerned about online privacy but may not be aware of the various ways that personal information about them is collected during routine Web browsing. We review the types of personal information that may be collected voluntarily or involuntarily through the Web browser or disclosed by a Web server. We present a taxonomy of regulatory and technological approaches to protect privacy. All approaches to date have only been partial solutions. By its nature, the Web was designed to be an open system to facilitate data sharing, and hence Web privacy continues to be a challenging problem.

[1]  Scott Dick,et al.  A Survey and Analysis of the P3P Protocol's Agents, Adoption, Maintenance, and Future , 2007, IEEE Transactions on Dependable and Secure Computing.

[2]  Alfred Kobsa,et al.  Privacy-enhanced personalization , 2006, FLAIRS.

[3]  E. Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.

[4]  Fiona Fui-Hoon Nah,et al.  Web browsing and spyware intrusion , 2005, CACM.

[5]  Trevor T. Moores,et al.  Do consumers understand the role of privacy seals in e-commerce? , 2005, CACM.

[6]  Keng Siau,et al.  The value of mobile applications: a utility company study , 2005, CACM.

[7]  Hailin Wu,et al.  Hidden surveillance by Web sites: Web bugs in contemporary use , 2003, CACM.

[8]  Athman Bouguettaya,et al.  Privacy on the Web: Facts, Challenges, and Solutions , 2003, IEEE Secur. Priv..

[9]  Robert Tappan Morris,et al.  Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.

[10]  Simson L. Garfinkel,et al.  Web Security, Privacy and Commerce , 2001 .

[11]  David M. Kristol,et al.  HTTP Cookies: Standards, privacy, and politics , 2001, TOIT.

[12]  Paola Benassi,et al.  TRUSTe: an online privacy seal program , 1999, CACM.

[13]  Yossi Matias,et al.  Consistent, yet anonymous, Web access with LPWA , 1999, CACM.

[14]  Michael K. Reiter,et al.  Anonymous Web transactions with Crowds , 1999, CACM.

[15]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[16]  J. Rubenfeld The Right of Privacy , 1989 .

[17]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[18]  George W. Burruss,et al.  The General Theory of Crime and Computer Hacking: Low Self-control Hackers? , 2011 .

[19]  P. Kozyris Controlling Electronic Intrusion by Unsolicited Unwanted Bulk Spam: Privacy vs. Freedom of Communication , 2009 .

[20]  E. Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[21]  Neha Jain,et al.  HIPAA's Effect on Web Site Privacy Policies , 2007, IEEE Security & Privacy.

[22]  John Linn,et al.  Technology and web user data privacy - a survey of risks and countermeasures , 2005, IEEE Security & Privacy.

[23]  Ian Clarke,et al.  Protecting Free Expression Online with Freenet , 2002, IEEE Internet Comput..

[24]  Stephen C. Johnson,et al.  USENIX Association , 1992 .

[25]  International Journal of Digital Crime and Forensics , 2022 .