Get Started. It's Free
or sign up with your email address
Privacy by Mind Map: Privacy

1. Privacy & Personal Info

1.1. Privacy is free from intrusion

1.2. Aspects

1.2.1. Freedom from intrusion

1.2.2. Control of information about oneself

1.2.3. Freedom from surveillance.

1.3. Issue

1.3.1. Health

1.3.2. Relationship

1.3.3. Family

1.4. Importance

1.4.1. Safety

1.4.2. Security

1.5. Privacy threat

1.5.1. Intentional

1.5.2. Unauthorized use or release.

1.5.3. Theft of information.

1.5.4. Inadvertent leakage of information

1.6. Search Query Database

1.6.1. Anything we do online is recorded

1.6.2. Save huge amounts of data

1.6.3. People not aware

1.7. Principle data collection and use

1.7.1. Invisible Information Gathering

1.7.2. Secondary Use

1.7.2.1. Data Mining

1.7.2.2. Computer Matching

1.7.2.3. Computer Profiling

1.8. Principle for personal data

1.8.1. Keep data only as long as needed

1.8.2. Maintain accuracy of data

1.8.3. Protect security of data

2. Communication privacy

2.1. Communication

2.2. Wiretapping and email protection

2.2.1. Telephone

2.2.2. Email

2.3. Secret intelligence gathering

2.4. Encryption policy

3. Impact Computer Technology

3.1. Communication

3.2. Faster access information

3.3. Business transactions

3.4. Shopping

3.5. Research tool

3.6. Education

3.7. Recreation

3.8. Meeting people

4. Privacy Risk

4.1. Marketing, personalization and customer records

4.1.1. Targeted marketing

4.1.1.1. Business use computer

4.1.1.2. Mailing list

4.1.1.3. Marketer side

4.1.2. Personalized marketing

4.1.3. Paying for customer information

4.1.4. Data firms and customer profile

4.2. Location Tracking

4.2.1. Technology that allow location tracking

4.2.2. Application include

4.2.2.1. Track people location

4.2.2.1.1. Improved inventory management system

4.2.2.2. Behavioral marketing and research

4.2.2.3. Identify and track patient in hospital

4.2.3. RFID tags

4.2.4. Risk

4.3. Stolen and lost data

4.3.1. Criminal steals

4.3.1.1. Buy the record

4.3.1.2. Hacking

4.3.1.3. Stealing

4.3.2. Spyware collects

4.3.2.1. Track web surfing

4.3.2.2. Credit card numbers

4.3.3. Investigator and data brokers use pretexing process to get information

5. Protecting privacy

5.1. Awareness

5.2. Privacy-enhancing technologies for consumers

5.3. Encryption

5.4. Business tools and policies

5.5. Right and law

5.6. Free-market view and consumer protection view