http://si410wiki.sites.uofmhosting.net/api.php?action=feedcontributions&user=Timsun&feedformat=atomSI410 - User contributions [en]2024-03-28T19:17:31ZUser contributionsMediaWiki 1.25.2http://si410wiki.sites.uofmhosting.net/index.php?title=COVID-19_Data_Privacy&diff=103257COVID-19 Data Privacy2021-04-23T13:20:50Z<p>Timsun: </p>
<hr />
<div>COVID-19 data privacy concerns refer to the balance between health and privacy during the pandemic, and the concerns that citizens have over their personal information. As COVID-19 caused a global emergency in March of 2020, several restrictions were implemented by governments and institutions in order to save lives. Mounting evidence demonstrates that the collection, use, sharing, and further processing of data can help limit the spread of the virus and aid in accelerating the recovery, especially through digital contact tracing<ref> World Health Organization. [https://www.who.int/news/item/19-11-2020-joint-statement-on-data-protection-and-privacy-in-the-covid-19-response "Joint Statement on Data Protection and Privacy in the COVID-19 Response"] 19, Nov. 2020</ref>.<br />
Data collection could include vast amounts of personally and/or non-personally sensitive data. There have been several concerns from the public that certain measures put in place during the COVID-19 pandemic have led to the infringement of fundamental human rights and freedoms.<br />
[[File:Coviddata.jpg|thumb|right|500px|Privacy in relation to COVID-19<ref>https://www.coe.int/en/web/human-rights-rule-of-law/-/corona-apps-chair-of-the-committee-of-convention-108-and-data-protection-commissioner-on-the-need-to-avoid-unwanted-effects</ref>]]<br />
<br />
== Concerns by Country ==<br />
===<b> China </b>=== <br />
China, known as "Country-0" for the global pandemic<ref> Duarte, F. (2020, February 23). Who is 'Patient Zero' in the Coronavirus Outbreak? Retrieved April 06, 2021, from https://www.bbc.com/future/article/20200221-coronavirus-the-harmful-hunt-for-covid-19s-patient-zero </ref>, used artificial intelligence, cloud computing, big data, blockchain and 5G to control the spread of COVID-19<ref name="hi"> Xiaxoxia, Q. (2020, April 08). How Emerging Technologies Helped Tackle COVID-19 in China: World Economic Forum. Retrieved April 06, 2021, from https://perma.cc/TU48-DG2K </ref>.<br />
[http://research.baidu.com/ Baidu Research], a leader in AI research and development, open-sourced its linear-time AI algorithm called LinearFold to epidemic prevention centers, gene testing institutions, and global scientific research institutions<ref name="hi"/>. This algorithm reduced the time taken to predict and study coronavirus’s RNA secondary structure from 55 minutes to just 27 seconds, ultimately improving speed 120 times<ref name="hi"/>. Furthermore, artificial intelligence was developed for the Beijing subway police to identify commuters who were not wearing masks, and new temperature measurements were created to quickly take commuters' temperatures. All of these measures were implemented without the consent of passengers<ref name="hi"/>. Baidu also has an online consultation service, which has handled over 15 million inquiries<ref name="hey"> Claypoole, Theodore. [https://businesslawtoday.org/2020/03/covid-19-data-privacy-health-vs-privacy/ "COVID-19 and Data Privacy: Health vs. Privacy"] 26, March 2020</ref>. <br />
<br />
Chinese legislation doesn’t limit Baidu in what they can do with health information from its users, giving power to a company whose intentions may be unclear<ref name="hey"/>. Furthermore, [https://en.wikipedia.org/wiki/Qihoo_360 Qihoo 360], a Chinese internet company who has a history of inappropriate data collection and usage<ref>Obel, M. (2015, December 06). Privacy Issues With China's Qihoo 360 technology, Which Provides Free Antivirus Software, Are Becoming More Public; But Qihoo Strongly Rebuts Accusations. Retrieved April 06, 2021, from https://www.ibtimes.com/privacy-issues-chinas-qihoo-360-technology-which-provides-free-antivirus-software-are-1181437 </ref>, posted a Big Data Migration Map, which allowed citizens to view the trends and hotspots of COVID-19<ref name="hi"/>. Another company, [https://www.alibaba.com/ Alibaba], known as the world’s largest e-commerce firm, launched a drug delivery service to treat people with chronic illnesses. The service entered health information from patients into an extensive database, which also tracked their online purchases<ref name="hey"/>. Alongside these resources, an app was launched by China Mobile, China Telecom, China Unicom, and China Academy of Information and Communications Technology (CAICT), called Telecommunication Data Based Travel Itinerary Card<ref>Fighting COVID-19. (n.d.). Retrieved April 06, 2021, from http://www.caict.ac.cn/english/research/covid19/202004/t20200426_280273.html</ref>. With the consent from the user, this app tracks travel history and reports a color card to prove if the user is or is not safe. The app disclaims the collection national ID numbers, home addresses, or other data, however, privacy concerns have surfaced<ref name="yo">Zhang, L. (2020, June 01). Regulating Electronic Means to Fight the Spread of COVID-19. Retrieved April 06, 2021, from https://www.loc.gov/law/help/coronavirus-apps/china.php#_ftn4 </ref>. In August of 2019, Comparitech ranked the world’s top ten most surveilled cities with Chinese cities receiving eight of the ten spots<ref>Chen, L. (2020, January 27). China Wakes Up to Wide Web of Online Data Leaks And Privacy Concerns. Retrieved April 06, 2021, from https://perma.cc/S2N7-PCPS </ref>, and 95% of respondents to a survey from a Chinese newspaper stated their personal data had been stolen, making it unsurprising that the country has enough data on their citizens to control the pandemic <ref name="yo"/>.<br />
<br />
=== <b> South Korea </b> ===<br />
<br />
In South Korea, the government has taken actions to combat the virus by tracking the movements of its citizens who have tested positive for COVID-19. These different tracking measures include credit/debit card transactions, phone GPS, and South Korea’s own surveillance cameras.<ref> Cellan-Jones, Rory. [https://www.bbc.com/news/technology-52681464l "Tech Tent: Can we learn about coronavirus-tracing from South Korea?"] 15, May 2020</ref> The country argues these methods help them trace the whereabouts of infected persons before they were notified and inform people who may have been in contact with them. The system also publicly shares patient info, and regularly scrutinizes to impede individuals’ privacy.<br />
<br />
South Korea is often praised for their ability to stop COVID-19 from spreading early on in the pandemic. This success may be attributed to having to handle a previous viral outbreak in 2015, known as the Middle East Respiratory Syndrome (MERS) outbreak. Learning from this experience, South Korea implemented a Reform of the National Infectious Disease Response System<ref> Jeong Jin-yeop. [https://www.korea.kr/news/policyBriefingView.do?newsId=156072752 "Confirmation and announcement of plans to reform the national defense system"]</ref> outlining how they will address future viruses. The results of these guidelines increased public surveillance and public health tracking tools. In the wake of COVID-19, they launched an app, Self Quarantine Safety Protection App, for users to report symptoms and monitor individuals in quarantine to ensure they do not leave their respective homes.<ref> Kim, Max. [https://www.technologyreview.com/2020/03/06/905459/coronavirus-south-korea-smartphone-app-quarantine/ "South Korea is watching quarantined citizens with a smartphone app"] 6, March 2020</ref><br />
[[File:Cnnpic.jpg|thumb|right|500px|Coronavirus mobile app in South Korea<ref> Watson, Ivan. [https://www.cnn.com/2020/02/28/tech/korea-coronavirus-tracking-apps/index.html "Coronavirus mobile apps are surging in popularity in South Korea"] 28, Feb. 2020</ref> ]]<br />
<br />
=== <b> Israel </b> ===<br />
When Israel ordered citizens to stay at home, they used a cell phone tracking tool, which was previously designed to track terrorists, so that the government could identify if citizens were breaking protocols. Some politicians in Israel referred to the mobile phone tracking system as an assault on the privacy of Israelis. Supercom, a biometric company headquartered in Israel, introduced an electronic monitoring and tracking platform for the population.<ref> Claypoole, Theodore. [https://businesslawtoday.org/2020/03/covid-19-data-privacy-health-vs-privacy/ "COVID-19 and Data Privacy: Health vs. Privacy"] 26, March 2020</ref><br />
<br />
===<b> United States </b>===<br />
In the US, the government partnered with the data-mining company, Palantir, to model the virus outbreak. The government also worked with various companies to scrape public social media data to monitor public discussion of symptoms. Furthermore, they had active talks with Facebook and Google (among others) about using location data from Americans’ phones to map the spread of the infection.<ref> Grind, K., McMillan, R., and Wilde, A. [https://www.wsj.com/articles/to-track-virus-governments-weigh-surveillance-tools-that-push-privacy-limits-11584479841 "To Track Virus, Governments Weigh Surveillance Tools That Push Privacy Limits"] 17, March 2020</ref><br />
<br />
===<b> United Kingdom </b>===<br />
Public Health England (PHE) is an executive agency of the government that makes an effort to maintain transparency while the COVID-19 pandemic continues to spread. Their current goal is to protect and improve the nation’s health and wellbeing while attempting to control the spread of COVID-19. They claim to only collect demographic, health, and treatment information when absolutely necessary. This information can come from the individual directly, their healthcare providers, or from a variety of organizations (NHS Digital, National Pathology Exchange, etc.) that are approved for collecting sensitive information in the interest of public health. The legal basis that allows this collection and handling of personal health information includes the General Data Protection Regulation (GDPR) and the Data Protection Act of 2018 <ref> “COVID-19 Privacy Information.” GOV.UK, 1 Mar. 2021, www.gov.uk/government/publications/phe-privacy-information/covid-19-privacy-information. </ref>.<br />
<br />
In July of 2020, the UK government broke their own privacy laws to implement a new test-and trace-system. Although the National Health Service (NHS) application is completely voluntary, a full assessment of the privacy implications was not completed before its implementation <ref> “Privacy in a Pandemic: A Comparison between the Contact Tracing Applications of India and the United Kingdom.” LSE Human Rights, 13 July 2020, blogs.lse.ac.uk/humanrights/2020/06/12/privacy-in-a-pandemic-a-comparison-between-the-contact-tracing-applications-of-india-and-the-united-kingdom. </ref>. This led to a minimum of three different data breaches across the country. The data protection implement assessment (DPIA) is a safety step required by law before processing any “high risk” personal data. The government claimed it was not “high risk” data, but then openly admitted to their mistake after the Open Rights Group (ORG) threatened to take them to court <ref> Marsh, Sarah, and Alex Hern. “Government Admits Breaking Privacy Law with NHS Test and Trace.” The Guardian, 20 July 2020, www.theguardian.com/technology/2020/jul/20/uk-government-admits-breaking-privacy-law-with-test-and-trace-contact-tracing-data-breaches-coronavirus. </ref>.<br />
<br />
More recently, a new technology has been developed by UK-based company, Anglo American. Its intentional use is to limit the spread of communicable diseases in the work place for not only COVID-19, but future viruses. This product is still in the testing phase, but has already partnered with the popular South Korean company, Samsung, to make and distribute them eventually. It is essentially a fitness watch that works as a test-and-trace tool. It can log up to 8,000 contact events a day and can even set off an alarm sound when social distancing rules are being breached. This product has the potential to slow the spread of COVID-19, but the threats to privacy it may pose are something yet to be considered <ref> McKay, David. “Anglo Is Watching You ... How the UK Group Is Hoping to Contain Covid-19 at Work.” Miningmx, 9 Apr. 2021, www.miningmx.com/uncategorized/45662-anglo-is-watching-you-how-the-uk-group-is-hoping-to-contain-covid-19-at-work. </ref>.<br />
<br />
==Concerns by Practice== <br />
=== <b> Contact Tracing </b> ===<br />
Contact tracing is the process of identifying individuals who may have come into contact with an infected person and subsequent collection of further information about these contacts. According to the World Health Organization (WHO), data protection and privacy laws need to be in place to provide a legal basis for data processing, restrictions on data use, measures to establish oversight, and sunset clauses to dismantle certain technologies. The WHO also outlined several principles for the appropriate use of tracking technologies, which include time limitation, data minimization, and transparency.<ref> World Health Organization. [https://www.who.int/publications/i/item/WHO-2019-nCoV-Ethics_Contact_tracing_apps-2020.1 "Ethical considerations to guide the use of digital proximity tracking technologies for COVID-19 contact tracing"] 28, May 2020</ref><br />
<br />
=== <b> Testing </b> ===<br />
COVID-19 testing has led to increased data collection from citizens. Personal data and test results are sometimes shared freely between health care providers and public health officials. In some cases, first responders have been given the addresses of people who have tested positive for COVID-19. Several countries, including the UK, US, and Germany, have considered using antibody test information as “immunity certificates”.<ref> Bracy, Jedidiah. [https://iapp.org/news/a/should-first-responders-know-the-addresses-of-those-with-covid-19/ "Should first responders know the addresses of those with COVID-19?"] 10, April 2020</ref> There have been concerns that employers testing their workers for COVID-19 could inadvertently collect biometric information in violation of state privacy laws.<ref> https://www.businessinsurance.com/article/20201110/NEWS06/912337665/Workplace-COVID-19-testing-raises-biometric-privacy-concerns-Michael-Jerinic-v- </ref><br />
<br />
=== <b> Vaccines </b> ===<br />
Vaccinations for COVID-19 require data collection from the general public. In an effort to vaccinate the population quickly, Philadelphia partnered with a nonprofit, Philly Fighting COVID. It was eventually discovered that the nonprofit changed its status to ‘for profit’ and its privacy policy claimed that it could sell preregistration data it collected. The data it collected included name, birthday, address, and occupation.<ref> Morrison, Sara. [https://www.vox.com/recode/22251118/vaccine-health-data-privacy-laws-philadelphia "Are vaccine providers selling your health data? There’s not much stopping them."] 28, Jan. 2021</ref> <br />
There have also been concerns that collecting personal data could dissuade undocumented people from getting vaccinated.<ref> Drees, Jackie. [https://www.beckershospitalreview.com/cybersecurity/state-officials-express-privacy-concerns-over-cdc-s-call-for-covid-19-vaccine-data-registry.html "State officials express privacy concerns over CDC's call for COVID-19 vaccine data registry"] 8, Dec. 2020</ref> <br />
<br />
=== <b> Health Code </b> ===<br />
Health Code was launched by the Chinese government during the COVID-19 pandemic to serve as a digital passport when traveling and entering public areas. It is now widely used in mainland China area and was now introduced to Hong Kong S.A.R. There are three health levels, representing the risk of a person infected by COVID-19, with green representing normal people while red representing the highest risk level. Chinese official media Xinhua claimed that this helps to promote work and production resumption. <ref> Xinrong He, Jiefei Hu [http://www.xinhuanet.com/politics/2020-03/04/c_1125662427.htm "Helps promote public health, instead of blocking anti-pandemic"] Xinhua She </ref> However, this also raised several ethical issues. The health code records one's ID number, body temperature, and recent travel history. Telecom operators track people’s movements while social media platforms like WeChat and Weibo have hotlines for people to report others who may be sick. However, these data are entered by users but whether the health code collects more data and how the code works remain unknown. There have been complaints by Chinese social media users about a lack of transparency over how the app works and what data it is storing. Some reported being unable to change erroneous “red” designations. One resident complained on Weibo that he had driven through Hubei without stopping but his colour code changed to yellow from green, indicating he would need to be quarantined. <ref> Helen Davidson [https://www.theguardian.com/world/2020/apr/01/chinas-coronavirus-health-code-apps-raise-concerns-over-privacy "China's coronavirus health code apps raise concerns over privacy"] Others worry that health code might becomes a normalcy after the pandemic. Wang Aizhong, an activist based in Guangzhou, said: “This epidemic undoubtedly provides more reason for the government to surveil the public. I don’t think authorities will rule out keeping this up after the outbreak.” <ref> Lily Kuo [https://www.theguardian.com/world/2020/mar/09/the-new-normal-chinas-excessive-coronavirus-public-monitoring-could-be-here-to-stay "The new normal: China's excessive coronavirus public monitoring could be here to stay"] </ref> In Hangzhou, the authority published gradient colored health code, ranking based on how much they exercised, their eating and drinking habits, whether they smoked and even how much they slept the night before. This policy was seen as being too invasive and raised a storm of criticism in Weibo, an social media platform similar to Twitter. <ref> Josh Horwitz, Brenda Goh [https://www.reuters.com/article/us-health-coronavirus-china-tech/as-chinese-authorities-expand-use-of-health-tracking-apps-privacy-concerns-grow-idUSKBN23212V "As Chinese authorities expand use of health tracking apps, privacy concerns grow"] The Reuters </ref><br />
<br />
==Future Concerns==<br />
[[File:Ibmhealth.jpg|thumb|right|500px|The Digital Health Pass App created by IBM<ref>IBM.[https://www.ibm.com/products/digital-health-pass “IBM Digital Health Pass”]</ref> ]]<br />
Various factors surrounding COVID-19 data can potentially impact individuals in the future. If data is breached by cybercriminals through databases or apps, this could create an opportunity for identity theft. Although unknown who it would target, this could negatively impact many lives where their data and information is misused.<ref>Altuglu, V., Salgado, M., Celmanbet, O., Haque, R., Yanguas, L. [https://www.natlawreview.com/article/assessing-damages-data-privacy-and-data-breach-class-actions-involving-health-data “Assessing Damages in Data Privacy and Data Breach Class Actions Involving Health Data in the Wake of COVID-19”] 15, March 2021</ref> Criminals can also steal an individual’s identity by posting their paper vaccination card on social media. When they have access to your date of birth, it’s easier for them to piece together your social security number, giving them access to all of your personal information which can then be sold on platforms like the black market.<ref>Irick, Whitney.[https://www.nbcchicago.com/news/coronavirus/heres-why-you-shouldnt-post-your-covid-19-vaccine-card-on-social-media/2464735/ “Here's Why You Shouldn't Post Your COVID-19 Vaccine Card on Social Media”] 17, March 2021</ref> <br />
<br />
Some countries, such as Isreal, have implemented a COVID-19 “vaccination passport” app created by companies like IBM<ref>IBM.[https://www.ibm.com/products/digital-health-pass “IBM Digital Health Pass”]</ref> and The World Economic Forum.<ref>World Economic Forum.[https://www.weforum.org/platforms/covid-action-platform/projects/commonpass “Common Trust Network”]</ref> These apps are designed to store vaccine and health data for individuals who have been fully vaccinated. Vaccine passes can be utilized to scan and get access to hotels, restaurants, gyms, and other open spaces. Although this would bring back some normalcy to our everyday lives, it could also be used to track individuals’ movements without their knowledge or consent.<ref>WKRC.[https://local12.com/news/coronavirus/why-covid-19-vaccine-passports-could-be-pandoras-box-for-data-privacy-ethical-issues “Why COVID-19 "vaccine passports" could be "Pandora's box" for data privacy, ethical issues”] 15, March 2021</ref> Access to this proprietary information by owners of this data could reveal more than people anticipate. It can disclose habits, sexual preferences, religion, political affiliations, and different search results<ref>Bernal, Paul.[https://www.tandfonline.com/doi/citedby/10.1080/23738871.2016.1228990?scroll=top&needAccess=true “Data gathering, surveillance and human rights: recasting the debate”] 2016</ref> people don’t know these applications have access to. <br />
<br />
“Vaccine passport” apps could create a larger divide between those who have access to the vaccine and those who do not or do not plan on getting it themselves, portraying a skewed and unrealistic representation of data.<br />
<br />
== Legislation ==<br />
===<b> Consumer Data Protection Act </b>=== <br />
Introduced in April 2020, the COVID-19 Consumer Data Protection Act,<ref>Fazlioglu, Muge.[https://iapp.org/news/a/republican-senators-to-introduce-the-covid-19-consumer-data-protection-act/ “Republican senators to introduce the COVID-19 Consumer Data Protection Act”] 1, May 2021</ref> would make it unlawful for a covered entity to “collect, process, or transfer the covered data of an individual” without prior notice and express consent unless necessary to comply with a legal obligation. Covered in the bill, entities would need to provide individuals with the right to opt-out from having data collected. Entities would also be required to delete information when it is no longer useful and minimize their collection of data.<ref>U.S. Senate.[https://www.congress.gov/bill/116th-congress/senate-bill/3663 “S.3663 - COVID-19 Consumer Data Protection Act of 2020”] 7, May 2021</ref><br />
<br />
===<b> Public Health Emergency Privacy Act </b>=== <br />
Senators are trying to pass better privacy health laws in order reassure the public that their health information stays private. The Public Health Emergency Privacy Act<ref>U.S. Senate.[https://www.congress.gov/bill/116th-congress/senate-bill/3749 “S.3749 - Public Health Emergency Privacy Act”] 14, May 2021</ref> is one piece of legislation that would provide some legal safeguards. The act, introduced in May 2020, would do the following: <br />
* Ensure that data collected for public health is strictly limited for use in public health;<br />
* Explicitly prohibit the use of health data for discriminatory, unrelated, or intrusive purposes, including commercial advertising, e-commerce, or efforts to gate access to employment, finance, insurance, housing, or education opportunities;<br />
* Prevent the potential misuse of health data by government agencies with no role in public health;<br />
* Require meaningful data security and data integrity protections – including data minimization and accuracy – and mandate deletion by tech firms after the public health emergency;<br />
* Protect voting rights by prohibiting conditioning the right to vote based on a medical condition or use of contact tracing apps;<br />
* Require regular reports on the impact of digital collection tools on civil rights;<br />
* Give the public control over their participation in these efforts by mandating meaningful transparency and requiring opt-in consent;<br />
* Provide for robust private and public enforcement, with rulemaking from an expert agency while recognizing the continuing role of states in legislation and enforcement.<br />
<br />
==Notes==<br />
<references /></div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Virtual_Private_Network&diff=103247Virtual Private Network2021-04-21T11:19:45Z<p>Timsun: /* Ethical Concerns */</p>
<hr />
<div>A [https://en.wikipedia.org/wiki/Virtual_private_network virtual private network] (VPN) is a service that protects a user's online privacy and anonymity by creating a private network from a public internet connection. VPNs mask a user's internet protocol (IP) address, making their online activities virtually untraceable. Moreover, VPN services establish secure and encrypted connections to provide greater privacy than even a secured Wi-Fi hotspot. <ref name="Norton">[https://us.norton.com/internetsecurity-privacy-what-is-a-vpn.html Symanovich, Steve. "What is a VPN?" <i>Norton</i>, 14 Jan. 2021, us.norton.com/internetsecurity-privacy-what-is-a-vpn.html. Accessed 8 Apr. 2021.]</ref> VPNs are classified into three main categories: remote access, intranet-based site-to-site, and extranet-based site-to-site. Aside from the various types of VPNs, it also includes a number of other services and features such as VPN protocols, security features, auto-connect settings, and real-time chat support. <ref>[https://www.vpnmentor.com/blog/different-types-of-vpns-and-when-to-use-them/ Greenberg, Ran. "Different Types of VPNs and When to Use Them" <i>VPNMentor</i>, 15 Apr. 2021, https://www.vpnmentor.com/blog/different-types-of-vpns-and-when-to-use-them/ Accessed 19 Apr. 2021.]</ref> As the use of VPNs grows in popularity, so do ethical concerns about VPN users, such as piracy, security, and misleading advertisements.<br />
==History==<br />
Gurdeep Pall, a Microsoft software developer, created the first VPN in 1996. It was designed as an efficient way for employees to securely access company data from remote locations, and it was built on the Point-to-Point Tunneling Protocol (PPTP), a method that is still in use today. <ref>[https://www.vyprvpn.com/blog/brief-history-of-vpns "A Brief History of VPNs." vypervpn, 21 June 2016, https://www.vyprvpn.com/blog/brief-history-of-vpns. Accessed 10 April 2021.]</ref><br />
<br />
VPNs evolved from a method for employees to work from home to much broader applications over time. Transport Layer Security (TLS), or its predecessor Secure Sockets Layer (SSL) encryption is one of the most common applications today. This is a feature of the vast majority of websites on the internet, and it is frequently indicated by a lock icon in the browser's search bar and labeled "Connection Secure."<br />
<ref>[https://searchsecurity.techtarget.com/definition/SSL-VPN Rosencrance, Linda. "SSL VPN (Secure Sockets Layer virtual private network)." SearchSecurity, April 2020, https://searchsecurity.techtarget.com/definition/SSL-VPN. Accessed 10 April 2021.]</ref><br />
<br />
==Types of VPNs==<br />
[[File:TunnelBear.png|525px|right|thumb|A screenshot from the TunnelBear homepage.<ref>[https://www.tunnelbear.com/ <i>TunnelBear</i>. www.tunnelbear.com/. Accessed 9 Apr. 2021.]</ref>]]<br />
<br />
===Site-to-Site===<br />
A Site-to-Site VPN, also called a Router-to-Router VPN, occurs when at least one user's network connects to another.<ref name="Geeks">[https://www.geeksforgeeks.org/types-of-virtual-private-network-vpn-and-its-protocols/ "Types of Virtual Private Network (VPN) and its Protocols." <i>Geeks for Geeks</i>, 10 Apr. 2019, www.geeksforgeeks.org/types-of-virtual-private-network-vpn-and-its-protocols/. Accessed 8 Apr. 2021.]</ref> According to cybersecurity company Fortinet, these types of VPNs are often found in business settings. These routers connect to essentially form one large network comprised of local networks.<ref name="Fortinet">[https://www.fortinet.com/resources/cyberglossary/what-is-site-to-site-vpn "What is a Site-to-Site VPN?" <i>Fortinet</i>, www.fortinet.com/resources/cyberglossary/what-is-site-to-site-vpn. Accessed 8 Apr. 2021.]</ref> This allows someone on one of the local connections to access information from any of the other local networks connected to the VPN. One subtype of this category is an Intranet-Based Site-to-Site VPN. Intranet-Based Site-to-Site VPNs are often used within a company when the flow of information is relatively free. That is, all networks involved in the VPN have equal access and sharing of all resources. This helps simulate the experience of everyone working on the same local network.<ref name="Fortinet"/><ref name="Geeks"/> Conversely, Extranet-Based Site-to-Site VPNs are used for more selective sharing.<ref name="Fortinet"/> <i>GeeksforGeeks</i>, a popular educational programming website, describes them as "companies [using] ... VPN ... to connect to the office of another company."<ref name="Geeks"/><br />
<br />
===Remote Access===<br />
With a [[Remote Access]] VPN, rather than connecting to another router, the user connects securely to a remote network.<ref>[https://www.vpnmentor.com/blog/different-types-of-vpns-and-when-to-use-them/ “Different Types of VPNs and When to Use Them.” <i>VPNMentor</i>, www.vpnmentor.com/blog/different-types-of-vpns-and-when-to-use-them/. Accessed 12 Mar 2021.]</ref> By using a remote access VPN, an encrypted "tunnel" is created from the user's location to the VPN destination. This destination is determined by the creator of the private network being accessed, and some VPNs allow the user to choose their destination.<ref name="Norton"></ref> [https://en.wikipedia.org/wiki/TunnelBear TunnelBear] is an example of a VPN service where the user is able to choose where they would like to "tunnel" their data.<br />
<br />
* Intranet-based VPN: When several offices of the same company are connected using a Site-to-Site VPN type, it is called an Intranet-based VPN. <ref name='Geeks'></ref><br />
* Extranet-based VPN: When companies use a Site-to-site VPN type to connect to the office of another company, it is called an Extranet based VPN. <ref name='Geeks'></ref><br />
<br />
==Types of VPN Protocols==<br />
A VPN protocol is a set of rules or instructions that will determine how your data routes between your device and the VPN server. VPN providers rely on protocols to ensure a stable and secure connection. VPN protocols have unique specifications that offer benefits to the VPN user based on the circumstances. Some specialize in privacy while others put an emphasis on speed. VPNs utilize different protocols depending on the device being used, what you want to do, and how you want to do it. <ref name='reflearnlearn'>[https://learn.g2.com/vpn-protocols Calvello, Mara. "VPN Protocols: Are You Using the Right One?" <i>Learn Hub</i>, https://learn.g2.com/vpn-protocols 28 April. 2020, Accessed 19 Apr. 2021.]</ref><br />
<br />
[[File:Vpn protocols.png|400px|right|thumb|An image showing the relationship between the client, VPN protocol, and the VPN.<ref name='reflearnlearn'></ref>]]<br />
<br />
===Internet Protocol Security (IPSec)===<br />
An IPSec is used to secure internet communication across an IP network. IPSec secures internet protocol communication by verifying the sessions and encrypts each data packet during the connection. <ref name='VPN GFG'>[https://www.geeksforgeeks.org/types-of-virtual-private-network-vpn-and-its-protocols/ pp_pankaj. "Types of Virtual Private Network (VPN) and its Protocols" <i>GeeksforGeeks</i>, https://www.geeksforgeeks.org/types-of-virtual-private-network-vpn-and-its-protocols/ 10 Apr. 2019, Accessed 19 Apr. 2021.]</ref><br />
<br />
===Point-to-Point Tunneling Protocol (PPTP)===<br />
Point-to-point tunneling protocol is one of the oldest VPN protocols in existence. A PPTP generates a tunnel and confines the data packet. <ref name='VPN GFG'></ref> The point-to-point part of the protocol refers to the connection created by PPTP. It allows one point (user computer) to access another specific point (remote network) over the internet. The tunneling part of the protocol refers to the way one protocol is encapsulated within another protocol. In PPTP, the point-to-point protocol is wrapped inside the TCP/IP protocol, which provides the internet connection. <ref>[https://techterms.com/definition/pptp Christensson, P. "PPTP definition" <i>TechTerms</i>, https://techterms.com/definition/pptp 2006, Accessed 19 Apr. 2021.]</ref><br />
<br />
===OpenVPN===<br />
OpenVPN is an open-source protocol that allows developers access to its underlying code. This protocol has grown in popularity due to its use of (virtually unbreakable) AES-256 bit key with 2048-bit RSA authentication and a 160-bit SHA1 hash algorithm. <ref name='refnetmotion'>[https://www.netmotionsoftware.com/blog/connectivity/vpn-protocols Harkness, Adam. "5 Common VPN protocols explained" <i>NetMotion</i>, https://www.netmotionsoftware.com/blog/connectivity/vpn-protocols 15 May. 2019, Accessed 19 Apr. 2021.]</ref><br />
<br />
===Secure Socket Tunneling Protocol (SSTP)===<br />
An SSTP is popular due to its full integration with every Microsoft operating system since Windows Vista SP 1. It utilizes 2048-bit SSL/TLS certificates for authentication and 256-bit SSL keys for encryption which provides good security. <ref name='refnetmotion'></ref><br />
<br />
===Internet Key Exchange version 2 (IKEv2)===<br />
IKEv2 is a common VPN tunneling protocol that provides a secure key exchange session. Similar to L2TP, it is normally paired with IPSec for encryption and authentication. This protocol is very good at re-establishing the link after temporary connection loss and excels at switching connections across network types. <ref name='refnetmotion'></ref><br />
<br />
==Uses==<br />
<br />
===Access Remote Sites===<br />
Using a remote access VPN, users from across the globe can access a singular private network.<ref>[https://ieeexplore.ieee.org/abstract/document/913204 “Virtual private networks.” <i>IEEE Potentials</i>, vol. 20, no. 1, 2001, pp. 11-15, doi:10.1109/45.913204. Accessed 12 Mar. 2021.]</ref> At the University of Michigan, a VPN is used to allow students to access the University's encrypted data when not on the campus internet. This allows students to remotely access information stored at the university, such as databases, or to take advantage of network protection provided through the university.<ref>[https://its.umich.edu/enterprise/wifi-networks/vpn “Virtual Private Network (VPN).” <i>Information and Technology Services</i>, University of Michigan, its.umich.edu/enterprise/wifi-networks/vpn. Accessed 12 Mar. 2021.]</ref> Throughout the Covid-19 pandemic, companies have relied on VPNs to grant employees access to servers, internal applications, and data hosted on-site. These actions were taken to limit the exposure of sensitive data.<ref name="Cloudflare Business VPN">[https://www.cloudflare.com/learning/access-management/what-is-a-business-vpn/ “What is a business VPN?” <i>Cloudflare</i>, www.cloudflare.com/learning/access-management/what-is-a-business-vpn/. Accessed 12 Mar. 2021.]</ref><ref>[https://openvpn.net/why-companies-are-turning-to-vpns-during-the-coronavirus-outbreak/ “Why Companies Are Turning To VPNs During The Coronavirus Outbreak.” <i>OpenVPN</i>, openvpn.net/why-companies-are-turning-to-vpns-during-the-coronavirus-outbreak. Accessed 12 Mar. 2021.]</ref><br />
<br />
[[File:Vpnvisual.jpg|400px|left|thumb|This image shows who cannot see a user's data while they are using a VPN. Note that the VPN provider is not in the image.<ref>[https://cybersecurity.att.com/blogs/security-essentials/the-ultimate-guide-to-vpn-encryption-protocols-and-ciphers “The ultimate guide to VPN encryption, protocols, and ciphers.” <i>ATT</i>, 31 July 2019, cybersecurity.att.com/blogs/security-essentials/the-ultimate-guide-to-vpn-encryption-protocols-and-ciphers. Accessed 25 Mar. 2021.]</ref>]]<br />
<br />
===Privacy===<br />
As a VPN [https://en.wikipedia.org/wiki/Encryption encrypts] the data between the user and the network, it can help keep a user's information private.<ref name="Cloudflare Business VPN"/> This functionality is similar to how VPNs are used to access remote sites, as they help a user access data without having to worry about the WiFi network they're connected to.<ref>[https://www.cnn.com/2020/09/17/cnn-underscored/how-to-setup-a-vpn Levin, Benjamin. “A VPN is vital when working from home, so here’s everything you need to know.” <i>CNN</i>, 17 Sept. 2020, www.cnn.com/2020/09/17/cnn-underscored/how-to-setup-a-vpn. Accessed 12 Mar. 2021.]</ref> By encrypting the information, the internet provider, government, and others who control the network can see less of what a user is doing online. Not only does this limit what data is collected about the user, but it can also decrease the number of targeted ads and help to hide the user's location.<ref name="What is a VPN">[https://www.cloudflare.com/learning/access-management/what-is-a-vpn/ “What is a VPN.” <i>Cloudflare</i>, www.cloudflare.com/learning/access-management/what-is-a-vpn/. Accessed 12 Mar. 2021.]</ref><br />
<br />
===Accessing Information From Other Countries===<br />
A VPN can also allow a user to access region-locked content or information that would otherwise be unavailable by making it appear as if they are located in a different location.<br />
<br />
====Circumventing Government Censorship====<br />
By disguising the [https://en.wikipedia.org/wiki/IP_address IP address] that a request comes from, a VPN can help to access sites blocked by the government in the country where the user is located. In China, [https://en.wikipedia.org/wiki/Great_Firewall "The Great Firewall"] is a name given to the country-wide censorship of the internet. By using a VPN, Chinese citizens are able to access information that would otherwise be restricted by their government.<ref>[https://www.theguardian.com/news/2018/jun/29/the-great-firewall-of-china-xi-jinpings-internet-shutdown Economy, Elizabeth C. “The great firewall of China: Xi Jinping’s internet shutdown.” <i>The Guardian</i>, 29 June 2018, www.theguardian.com/news/2018/jun/29/the-great-firewall-of-china-xi-jinpings-internet-shutdown. Accessed 12 Mar. 2021.]</ref> This has also allowed Chinese companies to conduct business with overseas partners. As new programs in China seek to control internet usage, some argue that VPNs can be useful tools to avoid these restrictions.<ref>[https://www.wsj.com/articles/chinas-vpn-crackdown-weighs-on-foreign-companies-there-1501680195 Shanghai, Liza Linin and Josh Chin. "China’s VPN Crackdown Weighs on Foreign Companies There." <i>The Wall Street Journal</i>, 2017 Aug. 2, www.wsj.com/articles/chinas-vpn-crackdown-weighs-on-foreign-companies-there-1501680195. Accessed 8 Apr. 2021.]</ref> China is not the only location where VPNs are used to access blocked content. In Kashmir, citizens use VPNs to access social media sites such as WhatsApp or Instagram that have been banned by the government.<ref>[https://www.reuters.com/article/us-india-kashmir-internet/india-cracks-down-on-use-of-vpns-in-kashmir-to-get-around-social-media-ban-idUSKBN20D0LT Bukhari, Fayaz. “India cracks down on use of VPNs in Kashmir to get around social media ban.” <i>Reuters</i>, 19 Feb. 2020, www.reuters.com/article/us-india-kashmir-internet/india-cracks-down-on-use-of-vpns-in-kashmir-to-get-around-social-media-ban-idUSKBN20D0LT. Accessed 12 Mar. 2021.]</ref><br />
<br />
====Streaming Services====<br />
Another common use for a VPN is accessing streaming services that are not available in a given country. Viewers use VPNs to access the libraries of these services, primarily Netflix, by changing their virtual location to that of another country that has the desired content.<ref>[https://www.cnet.com/news/vpn-use-surges-during-the-coronavirus-lockdown-but-so-do-security-risks/ Hodge, Rae. “VPN use surges during the coronavirus lockdown, but so do security risks.” <i>CNET</i>, 23 Apr. 2020, www.cnet.com/news/vpn-use-surges-during-the-coronavirus-lockdown-but-so-do-security-risks/. Accessed 12 Mar. 2021.]</ref> For example, as of November 2020, <i>Star Trek: Discovery</i> was not available on Netflix in the US and Canada but was in other countries.<ref>[https://www.pcmag.com/how-to/how-to-unblock-netflix-with-a-vpn Eddy, Max. "How to Use a VPN to Watch Netflix From Other Countries." <i>PCMag</i>, 20 Nov. 2020, www.pcmag.com/how-to/how-to-unblock-netflix-with-a-vpn. Accessed 9 Apr. 2021.]</ref> In 2016, Netflix began taking steps to prevent the use of VPNs, though the CEO described the number of VPN users to be “really inconsequential.” <ref> [https://www.wired.com/2016/04/netflixs-ceo-says-vpn-users-really-arent-big-deal/. Greenberg, Julia. "Netflix's CEO Says VPN Users Really Aren't a Big Deal." Wired, 18 April 2020, https://www.wired.com/2016/04/netflixs-ceo-says-vpn-users-really-arent-big-deal/. Accessed 10 April 2021.]</ref><br />
They did this by comparing the location of the user's IP address (which the VPN has altered) and their [https://en.wikipedia.org/wiki/Domain_Name_System Domain Name Server (DNS)] which could still reveal the user's true location.<ref>[https://www.techradar.com/vpn/how-does-netflix-detect-and-block-vpn-use Parker, Jacob. "How does Netflix detect and block VPN use?" <i>TechRader</i>, 30 June 2020, www.techradar.com/vpn/how-does-netflix-detect-and-block-vpn-use. Accessed 9 Apr. 2021.]</ref> <br />
<br />
Netflix’s measures have reduced the general effectiveness of VPNs, rendering many services incompatible. However, there is still a multitude of options available that still bypass the region locking of the platform [https://www.vpnmentor.com/blog/5-best-vpns-netflix-actually-work/ Hochstadt, Ariel. "8 Best Netflix VPNs That Still Work Reliably [Tested in 2021]." vpnMentor, 5 April 2021, https://www.vpnmentor.com/blog/5-best-vpns-netflix-actually-work/. Accessed 10 April 2021.]</ref><br />
<br />
==The 5 Eyes, 9 Eyes, and 14 Eyes Agreements==<br />
After World War II, the United States and the United Kingdom signed the BRUSA Agreement to share intelligence between the two countries. (The BRUSA Agreement is now known as the [https://en.wikipedia.org/wiki/UKUSA_Agreement UKUSA Agreement].<ref>[https://www.nsa.gov/news-features/declassified-documents/ukusa/ "UKUSA Agreement Release." <i>National Security Agency Central Security Service</i>, www.nsa.gov/news-features/declassified-documents/ukusa/. Accessed 1 Apr. 2021.]</ref> Over time, this agreement grew to include more countries, eventually leading to the 5 Eyes, 9 Eyes, and 14 Eyes agreements (each one involving a different group of countries). <br />
<br />
The initial intent of these agreements was to gather intelligence on the Soviet Union. The member countries of the official 5 Eyes treaty included the United States, Canada, the United Kingdom, Australia, and New Zealand. In 1982, the 14 Eyes group was formed, consisting of Germany, Italy, Spain, France, Sweden, the Netherlands, Norway, Belgium, and Denmark on top of the existing members of the 5 Eyes treaty. 9 Eyes is not outlined in a specific treaty but consists of the 5 Eyes members plus Denmark, Norway, France, and the Netherlands. <ref>[https://protonvpn.com/blog/5-eyes-global-surveillance/ Koch, Richie. "What countries are in the 5 Eyes, 9 Eyes, and 14 Eyes aggreements?" ProtonVPN, 30 August 2018, https://protonvpn.com/blog/5-eyes-global-surveillance/. Accessed 10 April 2021.]</ref><br />
<br />
As a part of this agreement, any intelligence gained by one country is automatically shared with all other countries in the agreement.<ref name="privacy">[https://privacyinternational.org/learn/five-eyes "Five Eyes." <i>Privacy International</i>, privacyinternational.org/learn/five-eyes. Accessed 8 Apr. 2021.]</ref> Some VPN companies, such as Restore Privacy, highlight this arrangement in support of using their services, claiming that they can help users escape government surveillance and information sharing between countries with these agreements.<ref>[https://restoreprivacy.com/5-eyes-9-eyes-14-eyes/ Taylor, Sven. "Five Eyes, Nine Eyes, 14 Eyes – Explained." <i>Restore Privacy</i>, 3 Sep. 2020, restoreprivacy.com/5-eyes-9-eyes-14-eyes/. Accessed 8 Apr. 2021.]</ref><br />
<br />
==Ethical Concerns==<br />
<br />
===Pirating of Paid Content===<br />
Since VPNs can help make a user's web access history a secret from their [https://en.wikipedia.org/wiki/Internet_service_provider Internet Service Provider (ISP)], VPNs have become popular tools for illegally obtaining copyrighted material. This has resulted in lawsuits from producers who argue that VPN companies promote and facilitate pirating.<ref>[https://www.techradar.com/news/this-top-vpn-is-being-sued-by-filmmakers Sharma, Mayank. “This top VPN is being sued by filmmakers.” <i>Future US</i>, 11 Mar 2021, www.techradar.com/news/this-top-vpn-is-being-sued-by-filmmakers. Accessed 12 Mar. 2021.]</ref> One popular method of pirating material like this is "torrenting" copyrighted material like movies, music, or video games. "Torrenting" refers to a method of [https://en.wikipedia.org/wiki/Peer-to-peer_file_sharing peer-to-peer file sharing] that uses the [https://en.wikipedia.org/wiki/BitTorrent BitTorrent] protocol. VPNs are often used in conjunction with this method because it hides the illegal file-sharing activity from Internet Service Providers.<ref>[https://www.comparitech.com/blog/vpn-privacy/is-torrenting-safe-illegal-will-you-be-caught/ Bischoff, Paul. "What is Torrenting? Is it Safe? Is it illegal? Are you likely to be caught?" <i>Comparitech</i>, 8 Apr. 2021, www.comparitech.com/blog/vpn-privacy/is-torrenting-safe-illegal-will-you-be-caught/. Accessed 9 Apr. 2021.]</ref><br />
<br />
[[File:Liquid VPN Torrenting.png|thumbnail|right|Liquid VPN Advertising their service to access torrenting websites primarily used for pirating.<ref>[https://www.liquidvpn.com/popcorn-time-vpn/ “Popcorn Time VPN.” <i>LiquidVPN</i>, www.liquidvpn.com/popcorn-time-vpn/. Accessed 25 Mar 2021.]</ref>]]<br />
<br />
===Security of a VPN===<br />
Using a VPN does not hide the information being sent from everyone, but instead shifts the ability to see the information from the user's internet service provider to the VPN provider.<ref>[https://www.youtube.com/watch?v=WVDQEoe6ZWY “This Video Is Sponsored By ███ VPN.” <i>YouTube</i>, uploaded by Tom Scott, 28 Oct 2019, www.youtube.com/watch?v=WVDQEoe6ZWY.]</ref> Some argue, however, that VPNs are not completely safe because the user is still dependent on the VPN company for their security. As an example, [https://en.wikipedia.org/wiki/NordVPN NordVPN], a leading provider, got hacked in 2019 and did not disclose the hack for several months.<ref>[https://techcrunch.com/2019/10/21/nordvpn-confirms-it-was-hacked/ Whittaker, Zack. “NordVPN confirms it was hacked.” <i>TechCrunched</i>, 21 Oct. 2019, techcrunch.com/2019/10/21/nordvpn-confirms-it-was-hacked/. Accessed 12 Mar. 2021.]</ref><br />
<br />
According to M.T. Khan and others, users rely on virtual private network services for a number of reasons: to preserve their privacy, circumvent censorship, and access geo-filtered content. A 2018 evaluation of sixty-two commercial VPN providers showed that while the services seem less likely to intercept or tamper with user traffic, some VPNs do leak user traffic through a variety of means. From the study, in 10% of the providers studied, between 5 and 30% of the VPNs appeared to be hosted on servers located in countries other than those advertised to users.<ref name="khan">[https://dl.acm.org/doi/abs/10.1145/3278532.3278570? Khan, M. T., et al. "An Empirical Analysis of the Commercial VPN Ecosystem." <i>In Proceedings of the Internet Measurement Conference 2018</i>, Association for Computing Machinery, 31 Oct. 2018, pp. 443-56, doi.org/10.1145/3278532.3278570. Accessed 9 Apr. 2021.]</ref> Perta et al. analyzed fourteen of the most popular commercial VPN services in 2015 and inspected their internals and infrastructures. They found that the majority of VPN services suffer from IPv6 traffic leakage. A sophisticated DNS hijacking attack would allow all traffic to be transparently captured. <ref name="perta">[https://qmro.qmul.ac.uk/xmlui/bitstream/handle/123456789/10855/Tyson%20A%20Glance%20through%20the%20VPN%202015%20Published.pdf Perta, V. et al. "A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients." <i>Proceedings on Privacy Enhancing Technologies</i>, vol. 2015, no. 1, 2015, pp. 77-91, doi:10.1515/popets-2015-0006. Accessed 9 Apr. 2021.].</ref><br />
<br />
===Misleading Advertisements===<br />
Several VPN companies have been found to have made misleading claims about their product. In 2019, NordVPN had an advertisement banned in the UK when they made false claims suggesting that users without a VPN are broadcasting their passwords to hackers on public WiFi. The Advertising Standards Agency found that the ad incorrectly made viewers believe that public networks are inherently insecure.<ref>[https://www.pcmag.com/news/nordvpn-ad-banned-for-exaggerating-threat-of-public-wi-fi Smith, Adam. “NordVPN Ad Banned for Exaggerating Threat of Public Wi-Fi.” <i>PCMag</i>, 1 May 2019, www.pcmag.com/news/nordvpn-ad-banned-for-exaggerating-threat-of-public-wi-fi. Accessed 12 Mar 2021.]</ref> Other companies have claimed that they keep no logs on user information, but independent investigations have found that several of these companies, including UFO VPN, have kept logs.<ref>[https://www.comparitech.com/blog/vpn-privacy/ufo-vpn-data-exposure/ Bischoff, Paul. "'Zero logs' VPN exposes millions of logs including user passwords, claims data is anonymous." <i>Comparitech</i>, 21 July 2020, www.comparitech.com/blog/vpn-privacy/ufo-vpn-data-exposure/. Accessed 12 Mar 2021.]</ref>.<br />
<br />
===Illegalness of VPN in China===<br />
VPN is legal in most countries and regions in the world. However, unauthorized VPNs are not allowed in China. To prevent citizens from accessing external contents that may contain reactionary speech and controversial events, Chinese government establish a Internet censorship system, which is also known as the Great Firewall. This system blocks from accessing websites such as BBC News, Wikipedia, Google, and Youtube. However, the existence of VPN can encrypt accessing request and therefore bypass the censorship system. Therefore, according to the Ministry of Industry and Information Technology of PRC, all legal VPN needs to be registered and authorized. According to Article 6 of the "Interim Regulations on the Management of International Networking of Computer Information Networks of the People's Republic of China", "The direct international networking of computer information networks must use the international access channels provided by the National Public Telecommunications Network of the Ministry of Posts and Telecommunications. Any Units and individuals are not allowed to establish or use other channels for international networking". Security organs can warn those who violate this regulation and impose a fine of up to 15,000 yuan. <ref> Chinese Government Website [http://www.gov.cn/gongbao/content/2011/content_1860856.htmPublic "Measures for the Administration of the Security Protection of the International Networking of Computer Information Networks"] </ref>According to , about 20-30 million Chinese citizens are using VPN to access external websites. Individual unauthorized VPN used to be a "grey area" in China. It was nominally illegal but was seldom actually controlled. However, starting 2017, Chinese government has launched a series of operations to restrict personal VPN usage, including banning VPN apps from app stores. One of the largest VPN provider GreenVPN was shut down and removed from App Store in request of the authorities. <ref> Josh Ye [https://www.scmp.com/news/china/policies-politics/article/2064587/chinas-move-clean-vpns-and-strengthen-great-firewall "China tightens Great Firewall by declaring unauthorised VPN services illegal"] South China Morning Post </ref> <ref> Saheli Roy Choudhury [https://www.cnbc.com/2017/07/31/apple-removes-vpn-apps-in-china-app-store.html "Apple removes VPN apps in China as Beijing doubles down on censorship"] CNBC News </ref> Besides, a series of reports show that the Public Security Bureau starts to punish individual usage of VPN. In 2017, <br />
In 2019, Gao Yu, a Chinese citizen, was harassed by police for her postings on Twitter. The police also had here son fired from his job. <ref> Dahai Han [https://www.voanews.com/east-asia-pacific/voa-news-china/chinese-authorities-punish-citizens-using-foreign-social-media "Chinese Authorities Punish Citizens for Using Foreign Social Media"] Voice of America </ref> In 2017, a man was fine 500,000 yuan and sentenced for 5 years for running VPN server. <ref> Haas Benjamin [https://www.theguardian.com/world/2017/dec/22/man-in-china-sentenced-to-five-years-jail-for-running-vpn Man in China sentenced to five years' jail for running VPN] The Guardian]<br />
<br />
==See Also==<br />
*[[Censorship in China]]<br />
*[[Digital Piracy]]<br />
*[[Remote Access]]<br />
<br />
==References==<br />
<references/><br />
[[Category:Services]]<br />
[[Category:Software]]<br />
<br />
([[Topics|back to index]])</div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Touch_ID&diff=102765Touch ID2021-04-19T09:06:50Z<p>Timsun: </p>
<hr />
<div>[[File:Touch.jpeg|400px|thumb|right|Touch ID Usage <ref>“How to Set up Touch ID on Your IPhone or IPad - Apple Support.” YouTube, YouTube, 5 Mar. 2018, www.youtube.com/watch?v=xTZ2LALWZlg.</ref>]] <br />
{{Nav-Bar|Topics##}}<br><br />
<br />
'''Touch ID''' was first made by [https://www.apple.com/sitemap/. Apple Inc.] as a fingerprint recognition security feature on iPhones. It was used to unlock iPhones, make purchases on the Apple Store, and use Apple Pay. Touch ID was first introduced in 2013 with the iPhone 5S, and over time, Touch ID was improved and added to even more Apple products. Although the Touch ID is still used and incorporated in many Apple products today, Face ID, a facial recognition security feature, is used a lot in the new Apple phones. Face ID was introduced in 2017 with the iPhone X and created quite the commotion among many Apple product users.<br />
<br />
Touch ID works by using a sensor to pass a small current to the user's finger and create a 'fingerprint map'. This map is then stored in a chip in your phone so hackers cannot externally access that information.<br />
<br />
== History ==<br />
<br />
=== History Behind FingerPrints ===<br />
<br />
Fingerprints are tiny patterns on the tip of our fingers that are completely unique to each person. No two people have ever been found to have the same fingerprints, so they are seen as one of the most secure ways to verify people. Another reason fingerprints are considered a highly secure feature is that they don't change with age and are easily collected from people. The use of fingerprints as a security feature has been most commonly utilized by state prisons, police stations, and even the FBI<ref>Watson, Stephanie (2021). [https://science.howstuffworks.com/fingerprinting.htm "How Fingerprinting Works"] ''howstuffworks''.</ref>.<br />
<br />
==== Uses Outside Phones ====<br />
<br />
The FBI and police use fingerprints to identify suspects and solve different crimes where fingerprints can be found at the scene. Often they use fingerprint identification to decide sentences, probation, and paroles. The way they find fingerprints is often through chemical techniques and then find matches through online programs<ref>The Scientific Research Honor Society (2021). [https://www.americanscientist.org/article/crime-scene-chemistry-fingerprint-analysis#:~:text=Law%20enforcement%20has%20relied%20on,%2C%20probation%2C%20and%20parole%20decisions "Crime Scene Chemistry: Fingerprint Analysis"] ''American Scientist''.</ref>.<br />
<br />
[[File:TouchID2nd.png|300px|thumb|right|Touch ID Setup on Mac<ref>"Use Touch ID on Mac" Apple Support. Web. 17 Apr. 2021. https://support.apple.com/guide/mac-help/touch-id-mchl16fbf90a/mac</ref>]]<br />
=== History Behind TouchID ===<br />
<br />
In 2012, Apple bought [https://www.reuters.com/article/us-authentec-acquisition-apple/apple-buys-mobile-security-firm-authentec-for-356-million-idUSBRE86Q0KD20120727 AuthenTec] for $356 million and used their technology to build the Touch ID sensors on the iPhone 5S. Once the Touch ID feature was finished and perfected, it wasn't long before companies like [https://www.motorola.com/us/?ds_rl=1242193&ds_rl=1242196&gclid=CjwKCAjwjuqDBhAGEiwAdX2cj0qTp-UoPkRhZ-8y5qAIgVRZKaE0hsW-lAIckw1vQ9-2GFLGXA9o4RoCn3cQAvD_BwE&gclsrc=aw.ds Motorola] and [https://www.fujitsu.com/us/ Fujitsu] tried to potentially buy out Apple, but Apple eventually won. In 2013, the iPhone 5S came out with a Touch ID protocol for their iPhones which was used only to unlock the phone. Simply resting your finger on the sensor area will automatically read the fingerprint. In certain scenarios, like rebooting the phone, Touch ID is disabled and the user's numerical passcode is required<ref>Apple Inc. (October, 2014). [https://web.archive.org/web/20150319073804/https://www.apple.com/business/docs/iOS_Security_Guide.pdf "IOS Security"] ''IOS Security''.</ref>. A year later, when the iPhone 6 and 6 Plus were released, Touch ID was able to not only unlock the phone, but could be used to make purchases in the App Store, iTunes, and Apple Pay. The Touch ID technology is now on 6S, 6S Plus, 7, 7 Plus, 8, 8 Plus, SE (2nd generation), MacBook Pro, MacBook Air, iPad Pro, and iPad Air. With the more recent Touch ID, you can choose to show details about your notifications only after your fingerprint is read. This way other people who look at your phone can't read your notifications if your iPhone is locked. Now with Facial Recognition rising, it seems that Touch ID's time might be slowly coming to an end. However, its impact on our technological advancements has been revolutionary in the field of technology<ref>Dormehl, Luke. (July 28, 2020). [https://www.cultofmac.com/440033/today-in-apple-history-apple-acquires-the-company-behind-id/ "Today in Apple history: Apple acquires the company behind Touch ID"] ''Cult of Mac''.</ref>.<br />
<br />
==== The Chip ====<br />
<br />
The Fingerprint data was first stored in the Apple A7 chip in the iPhone 5S, but with new phones came new chips. They are now stored inside the Apple A8, A8X, A9, A9X, A10, A10X, A11, A12, A13, and A14 processors in the iPhones and in the T1 and T2 in the MacBook Pro and MacBook Air. Contrary to popular belief, the fingerprints are not stored in iCloud or any place outside the physical iPhone itself.<br />
<br />
[[File:FindPhone.png|300px|thumbnail|left|Image of Find my iPhone<ref>"Locate a Device in Find My on IPhone." Apple Support. Web. 08 Apr. 2021. https://support.apple.com/guide/iphone/locate-a-device-iph09b087eda/ios</ref>]]<br />
==== Apple and Anti-theft technology ====<br />
<br />
As one of the leading technology companies, Apple has invested heavily in anti-theft technology. If an Apple device is lost or stolen, touch ID and [https://www.apple.com/icloud/find-my/ Find My iPhone] work together to offer additional protection against theft<ref>Apple Inc. (2021). [https://support.apple.com/en-us/HT204587 "About Touch ID advanced security technology"] ''Apple Inc''.</ref>. If the iPhone owner realizes their device is missing, there are numerous ways to lock and locate it. Without the iCloud account info, passcode, or touch ID, it is impossible to get into the device unless you have the original box and the iPhone's serial number. If the owner can't locate an iPhone, you can remotely erase your devices to protect their information.<br />
<br />
Essentially, Apple has created a general culture that their products, especially their most popular product, iPhones, can't be stolen effectively. This process has coined the term [https://mpdc.dc.gov/page/stolen-smart-phone-brick-it "brick"] for iPhones that have been stolen and locked. Unless the original owner deactivates the security protocols and unlocks the devices, it has no viable use other than spare parts.<ref>Srinivasan, Avinash, and Wu, Jie. (2012). [https://link.springer.com/chapter/10.1007/978-3-642-35362-8_2 "SafeCode–safeguarding security and privacy of user data on stolen iOS devices"] ''International Symposium on Cyberspace Safety and Security''.</ref><br />
<br />
However, hackers are becoming more advanced by the day, and while it is implausible that a stolen phone would end up in a hacker's hands, it is possible. <br />
<br />
In this case, Apple has set another safeguard called the [https://support.apple.com/en-us/HT204587 Secure Enclave], which Apple developed to protect your passcode and fingerprint data. Meaning touch ID doesn't store any fingerprint images and instead relies only on a mathematical representation. It isn't possible for someone to reverse engineer your actual fingerprint image from this stored data therefore your biometrics are protected.<br />
<br />
===Why Do People Use Touch ID===<br />
<br />
People started using Touch ID because it allows users to quickly unlock their phones. Before Touch ID, in order to unlock a locked phone, users would need to enter a passcode. This passcode was either a combination of numbers (a PIN) or a combination of characters selected from the alphabet and symbols (periods, question marks, etc.)<ref>Cherapau, Ivan, and Muslukhov, Ildar, and Asanka, Nalin, and Beznosov, Konstantin. (2015).[https://www.usenix.org/conference/soups2015/proceedings/presentation/cherapau "On the Impact of Touch ID on iPhone Passcodes"] ''Symposium on Usable Privacy and Security''.</ref>. It was found that users spend a significant amount of their overall device time entering in their passcode<ref>De Luca, Alexander, and Hang, Alina, and Von Zezschwitz, Emanuel, and Hussmann, Heinrich. (2015). [https://dl.acm.org/doi/10.1145/2702123.2702141 "I Feel Like I'm Taking Selfies All Day!"] ''Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems''.</ref>. So, by utilizing Touch ID, iPhones could be more efficient to users and all they need is their fingerprint. And Touch ID can unlock a user's phone in seconds. Additionally, multiple fingerprints can be stored with Touch ID<ref>Bud, Andrew. (2018). [https://www.sciencedirect.com/science/article/abs/pii/S0969476518300109 "Facing the Future: The Impact of Apple FaceID"] ''Biometric Technology Today''.</ref>. This makes Touch ID easier to use in that if a user can’t use the original finger that Touch ID was set up with (maybe they broke a finger or it’s dirty) they can use another one of their fingers/fingerprints they set up<ref name="Ahmad">Ahmad, Diana Al, and Al, Hadeel, and Hamad, Nada. (2015). [https://thesai.org/Publications/ViewPaper?Volume=6&Issue=1&Code=IJACSA&SerialNo=22 "Effectiveness of Iphone’s Touch ID: KSA Case Study"] ''International Journal of Advanced Computer Science and Applications''.</ref>. In addition, when a user purchases something from the App Store, instead of having to re-enter their passcode as was previously required, users can simply place their finger on the scanner and use Touch ID<ref name="Ahmad"></ref>. And, finally, using Touch ID gives users peace of mind that hackers will have a more difficult time getting into their phones and accessing their information<ref name="Ahmad"></ref>. Because a person’s fingerprint is unique to them, it will be hard, if not impossible, for someone to recreate it. So, essentially, Touch ID is providing users with a stronger passcode completely unique to them, that doesn’t change over time.<br />
===Various Usage of Touch ID===<br />
<br />
The most commons usage is to unlock your iPhone, iPad, or MacBook devices. However, this function is banned when the user hasn't been using his or her device for 8 hours. In this situation, the user must self-enter the password. Apart from that, Touch ID can also be applied to various scenes. According to Apple, Touch ID can be used to make purchases in App Store and set for Apple Pay. Additionally, if the individual app supports Touch ID, it can also be used to unlock or make purchases on that app. <ref> Apple [https://support.apple.com/en-us/HT201371 Use Touch ID on iPhone and iPad] </ref> In Apple's Autofill function, which auto-fills the account and password for users, the user needs to first verify their identity using Touch ID. <br />
===Touch ID or Face ID===<br />
<br />
When Apple launched iPhone X, Apple first introduces Face ID. In the following generations of iPhone or iPad Pro, Apple gradually replaces Touch ID with Face ID. However, Touch ID is still widely used in Apple's product line. Currently, the newest generation of iPad Air, MacBook Pro, and MacBook Air are still using Touch ID. According to Apple, the probability that a random person in the population could look at your iPhone or iPad Pro and unlock it using Face ID is approximately 1 in 1,000,000. <ref> Apple [https://support.apple.com/en-us/HT208108 "About Face ID Advanced Technology"] </ref> In comparison, the probability for Touch ID is 1 in 50,000. Apple says Face ID is a huge improvement in security. However, the actual experience differs in different situations. For example, when a person is wearing gloves, Touch ID would not work because no distortion is generated in the button's electrostatic field. <ref> William Judd [https://www.mobilefun.co.uk/blog/2016/09/psa-the-iphone-home-button-wont-work-with-gloves/ "The iPhone home button won’t work with gloves"] </ref> However, under the COVID-19 global pandemic where everyone has to wear masks, Touch ID is easier because one does not need to put his mask off. However, according to BBC, Apple will make Face ID work with masks in the newest update iOS 14.5. <ref> [https://www.bbc.com/news/technology-55904562 "Apple Face ID to work for mask wearers] BBC News</ref><br />
<br />
== Ethical Dilemmas ==<br />
<br />
=== Access To Our Information ===<br />
<br />
One of the ethical issues that arise with biometric fingerprinting is the right to privacy. For instance, “Biometric data are personally identifying information. Thus biometric systems have the potential to collect not only pattern recognition information captured by sensors, but also other information that can be associated with the biometric data themselves or with data records already contained within the system.”<ref>National Research Council. (2010). [www.nap.edu/read/12720/chapter/6#111 “Read ‘Biometric Recognition: Challenges and Opportunities’ at NAP.edu.”] ''National Academies Press: OpenBook''.</ref> As a result, the problem arises with what data should be stored and for what purposes. This dilemma gets even more complicated when private companies are allowed to collect your information. For instance, “The GPS Act permits service providers to collect geolocation information in the normal course of business”<ref>U.S. Senator Ron Wyden of Oregon. [www.wyden.senate.gov/priorities/gps-act “GPS Act”] ''Ron Wyden United States Senator for Oregon''.</ref>. Hence, it has become ever more important to know what information is being sent and collected about the user while accessing laptops, phones, smartwatches, etc.<br />
<br />
As a follow-up to the concerns mentioned above, the issue arises here regarding informed consent of the user in terms of what they are signing up for because understanding what you are signing up for before giving away sensitive information is an important aspect of a person’s privacy right. “In general, adults are considered to have sufficient ability to understand information. The problem is mainly the child’s informed consent when using biometrics (24). Similar informed consent issues also come from vulnerable populations such as the elderly, mentally ill, and poorly understood people”<ref>Cooper, Isaac. (September 2019). [www.researchgate.net/publication/335768067_Ethical_Issues_in_Biometrics “(PDF) Ethical Issues in Biometrics”] ''ResearchGate''.</ref>. Therefore, understanding the terms and conditions before signing up has become important in today’s world.<br />
<br />
One of the steps that Apple has taken recently to address some of the issues regarding the storage and retrieval of sensitive information is the use of tokens. For instance, “With Apple Pay, your exact credit card information is never sent over the internet. Instead, a token or random string of numbers representing the card is sent. Biometric tokenization is similar, but it's your biometric data, rather than credit card info, that is obfuscated and transmitted.”<ref>Simic, Bojan. (25 Sept. 2017). [www.forbes.com/sites/forbestechcouncil/2016/12/22/the-promise-and-challenges-of-biometrics/?sh=73359d7c7e6b “Council Post: The Promise And Challenges Of Biometrics”] ''Forbes Magazine''.</ref><br />
<br />
=== How Secure Is Touch ID? ===<br />
<br />
Touch ID is more secure than Face ID but less secure than person password entering. The question is how much less secure is this more convenient option than typing in your password every time you need to unlock your phone or sign in to an account? Apply claims the uniqueness of an individual's fingerprint makes this system extremely secure but researchers have recently discovered a new way to break this security barrier. Researchers at Michigan State University and New York University have discovered that because the fingerprint scanners on phones are so small, they only read partial fingerprints--making the images easier to duplicate. Touch ID works by taking about ten different images creating ten partial images of your fingerprint from different angles, never creating one full unique fingerprint image. Therefore, a hacker only needs to match one of these ten partial fingerprint images to unlock the phone. Through the study, using computer simulations, researchers "were able to develop a set of artificial “MasterPrints” that could match real prints similar to those used by phones as much as 65 percent of the time.” <ref>Goel, Vindu (April 10, 2017). [http://www.nytimes.com/2017/04/10/technology/fingerprint-security-smartphones-apple-google-samsung.html%20www.nytimes.com/2017/04/10/technology/fingerprint-security-smartphones-apple-google-samsung.html "That Fingerprint Sensor on Your Phone Is Not as Safe as You Think"] ''The New York Times''. </ref> Although this is a concerningly high number, these tests were not done with phones. Instead, they were tested on Touch ID systems not connected to phones, making the realistic percentage of replicated prints much smaller. There is concern about the idea that hackers only need to match one of the ten partial prints to unlock your phone but realistically, this is still a very unlikely and difficult thing to do. Although Touch ID is a very secure system, this study highlights some minor weaknesses it presents that could easily be fixed. Most of the researchers were quoted saying they still use Touch ID to secure their phones, but might suggest users use personal password insertion for more confidential log-ins like bank accounts.<br />
<br />
=== User Accessibility Concerns ===<br />
<br />
Apple has made massive efforts in improving accessibility in recent years. This includes adding categories such as “Vision,” Interaction,” “Hearing,” “Media,” and “Learning” to their “Accessibility” section in their phone settings. However, the release of the iPhone X prompted some concern among the blind/low-vision community <ref> Thompson, Terrill. (2018). [www.washington.edu/accesscomputing/resources/accesscomputing-news-february-2018/iphone-x-and-accessibility “iPhone X and Accessibility | AccessComputing”] ''AccessComputing''. </ref>. The removal of the home button with the additional Touch ID feature posed some complications with those who relied on the physical feeling of the home button to navigate unlocking their phone. <br />
<br />
Luckily, the new Face ID feature has proven to outdo Touch ID at every level in regards to accessibility. First, the set-up process of Face ID is much faster and requires less precision which can be a hindrance to many with limited fine-motor skills. Beyond set-up, Face ID has allowed Apple to make a virtually hands-free experience. The VoiceOver feature has been a vital tool to the blind/low-vision community and this coupled with the Face ID unlocking feature make iPhone products all the more accessible. You still have to occasionally swipe up from the bottom of the screen to the top, but this requires less precision than the former home button/Touch ID as mentioned previously <ref> Aquino, Steven. (21 Nov. 2017). [www.stevensblog.co/blogs/what-face-id-means-for-accessibility “What Face ID Means for Accessibility”] ''Steven’s Blog''.</ref>.<br />
<br />
Although Face ID is generally more accessible, there was previous concern with the “look-to-unlock” feature that requires an active gaze would create a barrier. People with visual impairments or blindness find this task difficult or impossible to do. They also don’t naturally hold the phone up to their face when using them. However, Apple thought this through and allows users to disable this feature by going to Settings > Face ID and Passcodes > Required Attention for Face ID <ref> RightPoint. (6 Dec. 2017). [www.rightpoint.com/thought/articles/2017/12/06/what-does-x-face-mean “The iPhone X: What Does Face ID Mean for Accessibility?”] ''Rightpoint''.</ref>. Apple does say, “Requiring Attention makes Face ID more secure,” but unlike Touch ID which allows multiple fingerprints to be added, only one face can be entered for Face ID <ref> Ingber, Janet. (Feb. 2018). [www.afb.org/aw/19/2/15124 “The iPhone X for People with Visual Impairments: Face ID, New Gestures, and Useful Commands | AccessWorld | American Foundation for the Blind”] ''American Foundation for the Blind''.</ref>. Touch ID is not made with accessibility in mind. Apple went a more inclusive route by creating and implementing Face ID instead. <br />
<br />
<br />
==See also==<br />
{{resource|<br />
*[[Face recognition]]<br />
*[[Face recognition in law enforcement]]<br />
}}<br />
<br />
== References ==<br />
<references/><br />
[[Category:Services]]<br />
[[Category:Software]]</div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Touch_ID&diff=102764Touch ID2021-04-19T09:03:42Z<p>Timsun: /* Touch ID or Face ID */</p>
<hr />
<div>[[File:Touch.jpeg|400px|thumb|right|Touch ID Usage <ref>“How to Set up Touch ID on Your IPhone or IPad - Apple Support.” YouTube, YouTube, 5 Mar. 2018, www.youtube.com/watch?v=xTZ2LALWZlg.</ref>]] <br />
{{Nav-Bar|Topics##}}<br><br />
<br />
'''Touch ID''' was first made by [https://www.apple.com/sitemap/. Apple Inc.] as a fingerprint recognition security feature on iPhones. It was used to unlock iPhones, make purchases on the Apple Store, and use Apple Pay. Touch ID was first introduced in 2013 with the iPhone 5S, and over time, Touch ID was improved and added to even more Apple products. Although the Touch ID is still used and incorporated in many Apple products today, Face ID, a facial recognition security feature, is used a lot in the new Apple phones. Face ID was introduced in 2017 with the iPhone X and created quite the commotion among many Apple product users.<br />
<br />
Touch ID works by using a sensor to pass a small current to the user's finger and create a 'fingerprint map'. This map is then stored in a chip in your phone so hackers cannot externally access that information.<br />
<br />
== History ==<br />
<br />
=== History Behind FingerPrints ===<br />
<br />
Fingerprints are tiny patterns on the tip of our fingers that are completely unique to each person. No two people have ever been found to have the same fingerprints, so they are seen as one of the most secure ways to verify people. Another reason fingerprints are considered a highly secure feature is that they don't change with age and are easily collected from people. The use of fingerprints as a security feature has been most commonly utilized by state prisons, police stations, and even the FBI<ref>Watson, Stephanie (2021). [https://science.howstuffworks.com/fingerprinting.htm "How Fingerprinting Works"] ''howstuffworks''.</ref>.<br />
<br />
==== Uses Outside Phones ====<br />
<br />
The FBI and police use fingerprints to identify suspects and solve different crimes where fingerprints can be found at the scene. Often they use fingerprint identification to decide sentences, probation, and paroles. The way they find fingerprints is often through chemical techniques and then find matches through online programs<ref>The Scientific Research Honor Society (2021). [https://www.americanscientist.org/article/crime-scene-chemistry-fingerprint-analysis#:~:text=Law%20enforcement%20has%20relied%20on,%2C%20probation%2C%20and%20parole%20decisions "Crime Scene Chemistry: Fingerprint Analysis"] ''American Scientist''.</ref>.<br />
<br />
[[File:TouchID2nd.png|300px|thumb|right|Touch ID Setup on Mac<ref>"Use Touch ID on Mac" Apple Support. Web. 17 Apr. 2021. https://support.apple.com/guide/mac-help/touch-id-mchl16fbf90a/mac</ref>]]<br />
=== History Behind TouchID ===<br />
<br />
In 2012, Apple bought [https://www.reuters.com/article/us-authentec-acquisition-apple/apple-buys-mobile-security-firm-authentec-for-356-million-idUSBRE86Q0KD20120727 AuthenTec] for $356 million and used their technology to build the Touch ID sensors on the iPhone 5S. Once the Touch ID feature was finished and perfected, it wasn't long before companies like [https://www.motorola.com/us/?ds_rl=1242193&ds_rl=1242196&gclid=CjwKCAjwjuqDBhAGEiwAdX2cj0qTp-UoPkRhZ-8y5qAIgVRZKaE0hsW-lAIckw1vQ9-2GFLGXA9o4RoCn3cQAvD_BwE&gclsrc=aw.ds Motorola] and [https://www.fujitsu.com/us/ Fujitsu] tried to potentially buy out Apple, but Apple eventually won. In 2013, the iPhone 5S came out with a Touch ID protocol for their iPhones which was used only to unlock the phone. Simply resting your finger on the sensor area will automatically read the fingerprint. In certain scenarios, like rebooting the phone, Touch ID is disabled and the user's numerical passcode is required<ref>Apple Inc. (October, 2014). [https://web.archive.org/web/20150319073804/https://www.apple.com/business/docs/iOS_Security_Guide.pdf "IOS Security"] ''IOS Security''.</ref>. A year later, when the iPhone 6 and 6 Plus were released, Touch ID was able to not only unlock the phone, but could be used to make purchases in the App Store, iTunes, and Apple Pay. The Touch ID technology is now on 6S, 6S Plus, 7, 7 Plus, 8, 8 Plus, SE (2nd generation), MacBook Pro, MacBook Air, iPad Pro, and iPad Air. With the more recent Touch ID, you can choose to show details about your notifications only after your fingerprint is read. This way other people who look at your phone can't read your notifications if your iPhone is locked. Now with Facial Recognition rising, it seems that Touch ID's time might be slowly coming to an end. However, its impact on our technological advancements has been revolutionary in the field of technology<ref>Dormehl, Luke. (July 28, 2020). [https://www.cultofmac.com/440033/today-in-apple-history-apple-acquires-the-company-behind-id/ "Today in Apple history: Apple acquires the company behind Touch ID"] ''Cult of Mac''.</ref>.<br />
<br />
==== The Chip ====<br />
<br />
The Fingerprint data was first stored in the Apple A7 chip in the iPhone 5S, but with new phones came new chips. They are now stored inside the Apple A8, A8X, A9, A9X, A10, A10X, A11, A12, A13, and A14 processors in the iPhones and in the T1 and T2 in the MacBook Pro and MacBook Air. Contrary to popular belief, the fingerprints are not stored in iCloud or any place outside the physical iPhone itself.<br />
<br />
[[File:FindPhone.png|300px|thumbnail|left|Image of Find my iPhone<ref>"Locate a Device in Find My on IPhone." Apple Support. Web. 08 Apr. 2021. https://support.apple.com/guide/iphone/locate-a-device-iph09b087eda/ios</ref>]]<br />
==== Apple and Anti-theft technology ====<br />
<br />
As one of the leading technology companies, Apple has invested heavily in anti-theft technology. If an Apple device is lost or stolen, touch ID and [https://www.apple.com/icloud/find-my/ Find My iPhone] work together to offer additional protection against theft<ref>Apple Inc. (2021). [https://support.apple.com/en-us/HT204587 "About Touch ID advanced security technology"] ''Apple Inc''.</ref>. If the iPhone owner realizes their device is missing, there are numerous ways to lock and locate it. Without the iCloud account info, passcode, or touch ID, it is impossible to get into the device unless you have the original box and the iPhone's serial number. If the owner can't locate an iPhone, you can remotely erase your devices to protect their information.<br />
<br />
Essentially, Apple has created a general culture that their products, especially their most popular product, iPhones, can't be stolen effectively. This process has coined the term [https://mpdc.dc.gov/page/stolen-smart-phone-brick-it "brick"] for iPhones that have been stolen and locked. Unless the original owner deactivates the security protocols and unlocks the devices, it has no viable use other than spare parts.<ref>Srinivasan, Avinash, and Wu, Jie. (2012). [https://link.springer.com/chapter/10.1007/978-3-642-35362-8_2 "SafeCode–safeguarding security and privacy of user data on stolen iOS devices"] ''International Symposium on Cyberspace Safety and Security''.</ref><br />
<br />
However, hackers are becoming more advanced by the day, and while it is implausible that a stolen phone would end up in a hacker's hands, it is possible. <br />
<br />
In this case, Apple has set another safeguard called the [https://support.apple.com/en-us/HT204587 Secure Enclave], which Apple developed to protect your passcode and fingerprint data. Meaning touch ID doesn't store any fingerprint images and instead relies only on a mathematical representation. It isn't possible for someone to reverse engineer your actual fingerprint image from this stored data therefore your biometrics are protected.<br />
<br />
===Why Do People Use Touch ID===<br />
<br />
People started using Touch ID because it allows users to quickly unlock their phones. Before Touch ID, in order to unlock a locked phone, users would need to enter a passcode. This passcode was either a combination of numbers (a PIN) or a combination of characters selected from the alphabet and symbols (periods, question marks, etc.)<ref>Cherapau, Ivan, and Muslukhov, Ildar, and Asanka, Nalin, and Beznosov, Konstantin. (2015).[https://www.usenix.org/conference/soups2015/proceedings/presentation/cherapau "On the Impact of Touch ID on iPhone Passcodes"] ''Symposium on Usable Privacy and Security''.</ref>. It was found that users spend a significant amount of their overall device time entering in their passcode<ref>De Luca, Alexander, and Hang, Alina, and Von Zezschwitz, Emanuel, and Hussmann, Heinrich. (2015). [https://dl.acm.org/doi/10.1145/2702123.2702141 "I Feel Like I'm Taking Selfies All Day!"] ''Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems''.</ref>. So, by utilizing Touch ID, iPhones could be more efficient to users and all they need is their fingerprint. And Touch ID can unlock a user's phone in seconds. Additionally, multiple fingerprints can be stored with Touch ID<ref>Bud, Andrew. (2018). [https://www.sciencedirect.com/science/article/abs/pii/S0969476518300109 "Facing the Future: The Impact of Apple FaceID"] ''Biometric Technology Today''.</ref>. This makes Touch ID easier to use in that if a user can’t use the original finger that Touch ID was set up with (maybe they broke a finger or it’s dirty) they can use another one of their fingers/fingerprints they set up<ref name="Ahmad">Ahmad, Diana Al, and Al, Hadeel, and Hamad, Nada. (2015). [https://thesai.org/Publications/ViewPaper?Volume=6&Issue=1&Code=IJACSA&SerialNo=22 "Effectiveness of Iphone’s Touch ID: KSA Case Study"] ''International Journal of Advanced Computer Science and Applications''.</ref>. In addition, when a user purchases something from the App Store, instead of having to re-enter their passcode as was previously required, users can simply place their finger on the scanner and use Touch ID<ref name="Ahmad"></ref>. And, finally, using Touch ID gives users peace of mind that hackers will have a more difficult time getting into their phones and accessing their information<ref name="Ahmad"></ref>. Because a person’s fingerprint is unique to them, it will be hard, if not impossible, for someone to recreate it. So, essentially, Touch ID is providing users with a stronger passcode completely unique to them, that doesn’t change over time.<br />
===Various Usage of Touch ID===<br />
The most commons usage is to unlock your iPhone, iPad, or MacBook devices. However, this function is banned when the user hasn't been using his or her device for 8 hours. In this situation, the user must self-enter the password. Apart from that, Touch ID can also be applied to various scenes. According to Apple, Touch ID can be used to make purchases in App Store and set for Apple Pay. Additionally, if the individual app supports Touch ID, it can also be used to unlock or make purchases on that app. <ref> Apple [https://support.apple.com/en-us/HT201371 Use Touch ID on iPhone and iPad] </ref> In Apple's Autofill function, which auto-fills the account and password for users, the user needs to first verify their identity using Touch ID. <br />
===Touch ID or Face ID===<br />
When Apple launched iPhone X, Apple first introduces Face ID. In the following generations of iPhone or iPad Pro, Apple gradually replace Touch ID with Face ID. However, Touch ID is still widely used in Apple's product line. Currently, the newest generation of iPad Air, MacBook Pro and MacBook Air are still using Touch ID. According to Apple, the probability that a random person in the population could look at your iPhone or iPad Pro and unlock it using Face ID is approximately 1 in 1,000,000. <ref> Apple [https://support.apple.com/en-us/HT208108 "About Face ID Advanced Technology"] </ref> In comparison, the probability for Touch ID is 1 in 50,000. Apple says Face ID is a huge improvement in security. However, the actual experience differs in different situation. For example, when a person is wearing gloves, Touch ID would not work because no distortion is generated in the button's electrostatic field. <ref> William Judd [https://www.mobilefun.co.uk/blog/2016/09/psa-the-iphone-home-button-wont-work-with-gloves/ "The iPhone home button won’t work with gloves"] </ref> However, under the COVID-19 global pandemic where everyone has to wear masks, Touch ID is easier because one does not need to put his mask off. However, according to BBC, Apple will make Face ID work with masks in the newest update iOS 14.5. <ref> [https://www.bbc.com/news/technology-55904562 "Apple Face ID to work for mask wearers] BBC News</ref><br />
<br />
== Ethical Dilemmas ==<br />
<br />
=== Access To Our Information ===<br />
<br />
One of the ethical issues that arise with biometric fingerprinting is the right to privacy. For instance, “Biometric data are personally identifying information. Thus biometric systems have the potential to collect not only pattern recognition information captured by sensors, but also other information that can be associated with the biometric data themselves or with data records already contained within the system.”<ref>National Research Council. (2010). [www.nap.edu/read/12720/chapter/6#111 “Read ‘Biometric Recognition: Challenges and Opportunities’ at NAP.edu.”] ''National Academies Press: OpenBook''.</ref> As a result, the problem arises with what data should be stored and for what purposes. This dilemma gets even more complicated when private companies are allowed to collect your information. For instance, “The GPS Act permits service providers to collect geolocation information in the normal course of business”<ref>U.S. Senator Ron Wyden of Oregon. [www.wyden.senate.gov/priorities/gps-act “GPS Act”] ''Ron Wyden United States Senator for Oregon''.</ref>. Hence, it has become ever more important to know what information is being sent and collected about the user while accessing laptops, phones, smartwatches, etc.<br />
<br />
As a follow-up to the concerns mentioned above, the issue arises here regarding informed consent of the user in terms of what they are signing up for because understanding what you are signing up for before giving away sensitive information is an important aspect of a person’s privacy right. “In general, adults are considered to have sufficient ability to understand information. The problem is mainly the child’s informed consent when using biometrics (24). Similar informed consent issues also come from vulnerable populations such as the elderly, mentally ill, and poorly understood people”<ref>Cooper, Isaac. (September 2019). [www.researchgate.net/publication/335768067_Ethical_Issues_in_Biometrics “(PDF) Ethical Issues in Biometrics”] ''ResearchGate''.</ref>. Therefore, understanding the terms and conditions before signing up has become important in today’s world.<br />
<br />
One of the steps that Apple has taken recently to address some of the issues regarding the storage and retrieval of sensitive information is the use of tokens. For instance, “With Apple Pay, your exact credit card information is never sent over the internet. Instead, a token or random string of numbers representing the card is sent. Biometric tokenization is similar, but it's your biometric data, rather than credit card info, that is obfuscated and transmitted.”<ref>Simic, Bojan. (25 Sept. 2017). [www.forbes.com/sites/forbestechcouncil/2016/12/22/the-promise-and-challenges-of-biometrics/?sh=73359d7c7e6b “Council Post: The Promise And Challenges Of Biometrics”] ''Forbes Magazine''.</ref><br />
<br />
=== How Secure Is Touch ID? ===<br />
<br />
Touch ID is more secure than Face ID but less secure than person password entering. The question is how much less secure is this more convenient option than typing in your password every time you need to unlock your phone or sign in to an account? Apply claims the uniqueness of an individual's fingerprint makes this system extremely secure but researchers have recently discovered a new way to break this security barrier. Researchers at Michigan State University and New York University have discovered that because the fingerprint scanners on phones are so small, they only read partial fingerprints--making the images easier to duplicate. Touch ID works by taking about ten different images creating ten partial images of your fingerprint from different angles, never creating one full unique fingerprint image. Therefore, a hacker only needs to match one of these ten partial fingerprint images to unlock the phone. Through the study, using computer simulations, researchers "were able to develop a set of artificial “MasterPrints” that could match real prints similar to those used by phones as much as 65 percent of the time.” <ref>Goel, Vindu (April 10, 2017). [http://www.nytimes.com/2017/04/10/technology/fingerprint-security-smartphones-apple-google-samsung.html%20www.nytimes.com/2017/04/10/technology/fingerprint-security-smartphones-apple-google-samsung.html "That Fingerprint Sensor on Your Phone Is Not as Safe as You Think"] ''The New York Times''. </ref> Although this is a concerningly high number, these tests were not done with phones. Instead, they were tested on Touch ID systems not connected to phones, making the realistic percentage of replicated prints much smaller. There is concern about the idea that hackers only need to match one of the ten partial prints to unlock your phone but realistically, this is still a very unlikely and difficult thing to do. Although Touch ID is a very secure system, this study highlights some minor weaknesses it presents that could easily be fixed. Most of the researchers were quoted saying they still use Touch ID to secure their phones, but might suggest users use personal password insertion for more confidential log-ins like bank accounts.<br />
<br />
=== User Accessibility Concerns ===<br />
<br />
Apple has made massive efforts in improving accessibility in recent years. This includes adding categories such as “Vision,” Interaction,” “Hearing,” “Media,” and “Learning” to their “Accessibility” section in their phone settings. However, the release of the iPhone X prompted some concern among the blind/low-vision community <ref> Thompson, Terrill. (2018). [www.washington.edu/accesscomputing/resources/accesscomputing-news-february-2018/iphone-x-and-accessibility “iPhone X and Accessibility | AccessComputing”] ''AccessComputing''. </ref>. The removal of the home button with the additional Touch ID feature posed some complications with those who relied on the physical feeling of the home button to navigate unlocking their phone. <br />
<br />
Luckily, the new Face ID feature has proven to outdo Touch ID at every level in regards to accessibility. First, the set-up process of Face ID is much faster and requires less precision which can be a hindrance to many with limited fine-motor skills. Beyond set-up, Face ID has allowed Apple to make a virtually hands-free experience. The VoiceOver feature has been a vital tool to the blind/low-vision community and this coupled with the Face ID unlocking feature make iPhone products all the more accessible. You still have to occasionally swipe up from the bottom of the screen to the top, but this requires less precision than the former home button/Touch ID as mentioned previously <ref> Aquino, Steven. (21 Nov. 2017). [www.stevensblog.co/blogs/what-face-id-means-for-accessibility “What Face ID Means for Accessibility”] ''Steven’s Blog''.</ref>.<br />
<br />
Although Face ID is generally more accessible, there was previous concern with the “look-to-unlock” feature that requires an active gaze would create a barrier. People with visual impairments or blindness find this task difficult or impossible to do. They also don’t naturally hold the phone up to their face when using them. However, Apple thought this through and allows users to disable this feature by going to Settings > Face ID and Passcodes > Required Attention for Face ID <ref> RightPoint. (6 Dec. 2017). [www.rightpoint.com/thought/articles/2017/12/06/what-does-x-face-mean “The iPhone X: What Does Face ID Mean for Accessibility?”] ''Rightpoint''.</ref>. Apple does say, “Requiring Attention makes Face ID more secure,” but unlike Touch ID which allows multiple fingerprints to be added, only one face can be entered for Face ID <ref> Ingber, Janet. (Feb. 2018). [www.afb.org/aw/19/2/15124 “The iPhone X for People with Visual Impairments: Face ID, New Gestures, and Useful Commands | AccessWorld | American Foundation for the Blind”] ''American Foundation for the Blind''.</ref>. Touch ID is not made with accessibility in mind. Apple went a more inclusive route by creating and implementing Face ID instead. <br />
<br />
<br />
==See also==<br />
{{resource|<br />
*[[Face recognition]]<br />
*[[Face recognition in law enforcement]]<br />
}}<br />
<br />
== References ==<br />
<references/><br />
[[Category:Services]]<br />
[[Category:Software]]</div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Touch_ID&diff=102763Touch ID2021-04-19T09:02:40Z<p>Timsun: /* History */</p>
<hr />
<div>[[File:Touch.jpeg|400px|thumb|right|Touch ID Usage <ref>“How to Set up Touch ID on Your IPhone or IPad - Apple Support.” YouTube, YouTube, 5 Mar. 2018, www.youtube.com/watch?v=xTZ2LALWZlg.</ref>]] <br />
{{Nav-Bar|Topics##}}<br><br />
<br />
'''Touch ID''' was first made by [https://www.apple.com/sitemap/. Apple Inc.] as a fingerprint recognition security feature on iPhones. It was used to unlock iPhones, make purchases on the Apple Store, and use Apple Pay. Touch ID was first introduced in 2013 with the iPhone 5S, and over time, Touch ID was improved and added to even more Apple products. Although the Touch ID is still used and incorporated in many Apple products today, Face ID, a facial recognition security feature, is used a lot in the new Apple phones. Face ID was introduced in 2017 with the iPhone X and created quite the commotion among many Apple product users.<br />
<br />
Touch ID works by using a sensor to pass a small current to the user's finger and create a 'fingerprint map'. This map is then stored in a chip in your phone so hackers cannot externally access that information.<br />
<br />
== History ==<br />
<br />
=== History Behind FingerPrints ===<br />
<br />
Fingerprints are tiny patterns on the tip of our fingers that are completely unique to each person. No two people have ever been found to have the same fingerprints, so they are seen as one of the most secure ways to verify people. Another reason fingerprints are considered a highly secure feature is that they don't change with age and are easily collected from people. The use of fingerprints as a security feature has been most commonly utilized by state prisons, police stations, and even the FBI<ref>Watson, Stephanie (2021). [https://science.howstuffworks.com/fingerprinting.htm "How Fingerprinting Works"] ''howstuffworks''.</ref>.<br />
<br />
==== Uses Outside Phones ====<br />
<br />
The FBI and police use fingerprints to identify suspects and solve different crimes where fingerprints can be found at the scene. Often they use fingerprint identification to decide sentences, probation, and paroles. The way they find fingerprints is often through chemical techniques and then find matches through online programs<ref>The Scientific Research Honor Society (2021). [https://www.americanscientist.org/article/crime-scene-chemistry-fingerprint-analysis#:~:text=Law%20enforcement%20has%20relied%20on,%2C%20probation%2C%20and%20parole%20decisions "Crime Scene Chemistry: Fingerprint Analysis"] ''American Scientist''.</ref>.<br />
<br />
[[File:TouchID2nd.png|300px|thumb|right|Touch ID Setup on Mac<ref>"Use Touch ID on Mac" Apple Support. Web. 17 Apr. 2021. https://support.apple.com/guide/mac-help/touch-id-mchl16fbf90a/mac</ref>]]<br />
=== History Behind TouchID ===<br />
<br />
In 2012, Apple bought [https://www.reuters.com/article/us-authentec-acquisition-apple/apple-buys-mobile-security-firm-authentec-for-356-million-idUSBRE86Q0KD20120727 AuthenTec] for $356 million and used their technology to build the Touch ID sensors on the iPhone 5S. Once the Touch ID feature was finished and perfected, it wasn't long before companies like [https://www.motorola.com/us/?ds_rl=1242193&ds_rl=1242196&gclid=CjwKCAjwjuqDBhAGEiwAdX2cj0qTp-UoPkRhZ-8y5qAIgVRZKaE0hsW-lAIckw1vQ9-2GFLGXA9o4RoCn3cQAvD_BwE&gclsrc=aw.ds Motorola] and [https://www.fujitsu.com/us/ Fujitsu] tried to potentially buy out Apple, but Apple eventually won. In 2013, the iPhone 5S came out with a Touch ID protocol for their iPhones which was used only to unlock the phone. Simply resting your finger on the sensor area will automatically read the fingerprint. In certain scenarios, like rebooting the phone, Touch ID is disabled and the user's numerical passcode is required<ref>Apple Inc. (October, 2014). [https://web.archive.org/web/20150319073804/https://www.apple.com/business/docs/iOS_Security_Guide.pdf "IOS Security"] ''IOS Security''.</ref>. A year later, when the iPhone 6 and 6 Plus were released, Touch ID was able to not only unlock the phone, but could be used to make purchases in the App Store, iTunes, and Apple Pay. The Touch ID technology is now on 6S, 6S Plus, 7, 7 Plus, 8, 8 Plus, SE (2nd generation), MacBook Pro, MacBook Air, iPad Pro, and iPad Air. With the more recent Touch ID, you can choose to show details about your notifications only after your fingerprint is read. This way other people who look at your phone can't read your notifications if your iPhone is locked. Now with Facial Recognition rising, it seems that Touch ID's time might be slowly coming to an end. However, its impact on our technological advancements has been revolutionary in the field of technology<ref>Dormehl, Luke. (July 28, 2020). [https://www.cultofmac.com/440033/today-in-apple-history-apple-acquires-the-company-behind-id/ "Today in Apple history: Apple acquires the company behind Touch ID"] ''Cult of Mac''.</ref>.<br />
<br />
==== The Chip ====<br />
<br />
The Fingerprint data was first stored in the Apple A7 chip in the iPhone 5S, but with new phones came new chips. They are now stored inside the Apple A8, A8X, A9, A9X, A10, A10X, A11, A12, A13, and A14 processors in the iPhones and in the T1 and T2 in the MacBook Pro and MacBook Air. Contrary to popular belief, the fingerprints are not stored in iCloud or any place outside the physical iPhone itself.<br />
<br />
[[File:FindPhone.png|300px|thumbnail|left|Image of Find my iPhone<ref>"Locate a Device in Find My on IPhone." Apple Support. Web. 08 Apr. 2021. https://support.apple.com/guide/iphone/locate-a-device-iph09b087eda/ios</ref>]]<br />
==== Apple and Anti-theft technology ====<br />
<br />
As one of the leading technology companies, Apple has invested heavily in anti-theft technology. If an Apple device is lost or stolen, touch ID and [https://www.apple.com/icloud/find-my/ Find My iPhone] work together to offer additional protection against theft<ref>Apple Inc. (2021). [https://support.apple.com/en-us/HT204587 "About Touch ID advanced security technology"] ''Apple Inc''.</ref>. If the iPhone owner realizes their device is missing, there are numerous ways to lock and locate it. Without the iCloud account info, passcode, or touch ID, it is impossible to get into the device unless you have the original box and the iPhone's serial number. If the owner can't locate an iPhone, you can remotely erase your devices to protect their information.<br />
<br />
Essentially, Apple has created a general culture that their products, especially their most popular product, iPhones, can't be stolen effectively. This process has coined the term [https://mpdc.dc.gov/page/stolen-smart-phone-brick-it "brick"] for iPhones that have been stolen and locked. Unless the original owner deactivates the security protocols and unlocks the devices, it has no viable use other than spare parts.<ref>Srinivasan, Avinash, and Wu, Jie. (2012). [https://link.springer.com/chapter/10.1007/978-3-642-35362-8_2 "SafeCode–safeguarding security and privacy of user data on stolen iOS devices"] ''International Symposium on Cyberspace Safety and Security''.</ref><br />
<br />
However, hackers are becoming more advanced by the day, and while it is implausible that a stolen phone would end up in a hacker's hands, it is possible. <br />
<br />
In this case, Apple has set another safeguard called the [https://support.apple.com/en-us/HT204587 Secure Enclave], which Apple developed to protect your passcode and fingerprint data. Meaning touch ID doesn't store any fingerprint images and instead relies only on a mathematical representation. It isn't possible for someone to reverse engineer your actual fingerprint image from this stored data therefore your biometrics are protected.<br />
<br />
===Why Do People Use Touch ID===<br />
<br />
People started using Touch ID because it allows users to quickly unlock their phones. Before Touch ID, in order to unlock a locked phone, users would need to enter a passcode. This passcode was either a combination of numbers (a PIN) or a combination of characters selected from the alphabet and symbols (periods, question marks, etc.)<ref>Cherapau, Ivan, and Muslukhov, Ildar, and Asanka, Nalin, and Beznosov, Konstantin. (2015).[https://www.usenix.org/conference/soups2015/proceedings/presentation/cherapau "On the Impact of Touch ID on iPhone Passcodes"] ''Symposium on Usable Privacy and Security''.</ref>. It was found that users spend a significant amount of their overall device time entering in their passcode<ref>De Luca, Alexander, and Hang, Alina, and Von Zezschwitz, Emanuel, and Hussmann, Heinrich. (2015). [https://dl.acm.org/doi/10.1145/2702123.2702141 "I Feel Like I'm Taking Selfies All Day!"] ''Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems''.</ref>. So, by utilizing Touch ID, iPhones could be more efficient to users and all they need is their fingerprint. And Touch ID can unlock a user's phone in seconds. Additionally, multiple fingerprints can be stored with Touch ID<ref>Bud, Andrew. (2018). [https://www.sciencedirect.com/science/article/abs/pii/S0969476518300109 "Facing the Future: The Impact of Apple FaceID"] ''Biometric Technology Today''.</ref>. This makes Touch ID easier to use in that if a user can’t use the original finger that Touch ID was set up with (maybe they broke a finger or it’s dirty) they can use another one of their fingers/fingerprints they set up<ref name="Ahmad">Ahmad, Diana Al, and Al, Hadeel, and Hamad, Nada. (2015). [https://thesai.org/Publications/ViewPaper?Volume=6&Issue=1&Code=IJACSA&SerialNo=22 "Effectiveness of Iphone’s Touch ID: KSA Case Study"] ''International Journal of Advanced Computer Science and Applications''.</ref>. In addition, when a user purchases something from the App Store, instead of having to re-enter their passcode as was previously required, users can simply place their finger on the scanner and use Touch ID<ref name="Ahmad"></ref>. And, finally, using Touch ID gives users peace of mind that hackers will have a more difficult time getting into their phones and accessing their information<ref name="Ahmad"></ref>. Because a person’s fingerprint is unique to them, it will be hard, if not impossible, for someone to recreate it. So, essentially, Touch ID is providing users with a stronger passcode completely unique to them, that doesn’t change over time.<br />
===Various Usage of Touch ID===<br />
The most commons usage is to unlock your iPhone, iPad, or MacBook devices. However, this function is banned when the user hasn't been using his or her device for 8 hours. In this situation, the user must self-enter the password. Apart from that, Touch ID can also be applied to various scenes. According to Apple, Touch ID can be used to make purchases in App Store and set for Apple Pay. Additionally, if the individual app supports Touch ID, it can also be used to unlock or make purchases on that app. <ref> Apple [https://support.apple.com/en-us/HT201371 Use Touch ID on iPhone and iPad] </ref> In Apple's Autofill function, which auto-fills the account and password for users, the user needs to first verify their identity using Touch ID. <br />
===Touch ID or Face ID===<br />
When Apple launched iPhone X, Apple first introduces Face ID. In the following generations of iPhone or iPad Pro, Apple gradually replace Touch ID with Face ID. However, Touch ID is still widely used in Apple's product line. Currently, the newest generation of iPad Air, MacBook Pro and MacBook Air are still using Touch ID. According to Apple, the probability that a random person in the population could look at your iPhone or iPad Pro and unlock it using Face ID is approximately 1 in 1,000,000. <ref> Apple [https://support.apple.com/en-us/HT208108 "About Face ID Advanced Technology"] </ref> In comparison, the probability for Touch ID is 1 in 50,000. Apple says Face ID is a huge improvement in security. However, the actual experience differs in different situation. For example, when a person is wearing gloves, Touch ID would not work because no distortion is generated in the button's electrostatic field. <ref> William Judd [https://www.mobilefun.co.uk/blog/2016/09/psa-the-iphone-home-button-wont-work-with-gloves/ "The iPhone home button won’t work with gloves"] </ref> However, under the COVID-19 global pandemic where everyone has to wear masks, Touch ID is easier because one does not need to put his mask off. However, according to BBC, Apple will make Face ID work with masks in the newest update iOS 14.5. <ref> BBC News [https://www.bbc.com/news/technology-55904562 "Apple Face ID to work for mask wearers] </ref><br />
<br />
== Ethical Dilemmas ==<br />
<br />
=== Access To Our Information ===<br />
<br />
One of the ethical issues that arise with biometric fingerprinting is the right to privacy. For instance, “Biometric data are personally identifying information. Thus biometric systems have the potential to collect not only pattern recognition information captured by sensors, but also other information that can be associated with the biometric data themselves or with data records already contained within the system.”<ref>National Research Council. (2010). [www.nap.edu/read/12720/chapter/6#111 “Read ‘Biometric Recognition: Challenges and Opportunities’ at NAP.edu.”] ''National Academies Press: OpenBook''.</ref> As a result, the problem arises with what data should be stored and for what purposes. This dilemma gets even more complicated when private companies are allowed to collect your information. For instance, “The GPS Act permits service providers to collect geolocation information in the normal course of business”<ref>U.S. Senator Ron Wyden of Oregon. [www.wyden.senate.gov/priorities/gps-act “GPS Act”] ''Ron Wyden United States Senator for Oregon''.</ref>. Hence, it has become ever more important to know what information is being sent and collected about the user while accessing laptops, phones, smartwatches, etc.<br />
<br />
As a follow-up to the concerns mentioned above, the issue arises here regarding informed consent of the user in terms of what they are signing up for because understanding what you are signing up for before giving away sensitive information is an important aspect of a person’s privacy right. “In general, adults are considered to have sufficient ability to understand information. The problem is mainly the child’s informed consent when using biometrics (24). Similar informed consent issues also come from vulnerable populations such as the elderly, mentally ill, and poorly understood people”<ref>Cooper, Isaac. (September 2019). [www.researchgate.net/publication/335768067_Ethical_Issues_in_Biometrics “(PDF) Ethical Issues in Biometrics”] ''ResearchGate''.</ref>. Therefore, understanding the terms and conditions before signing up has become important in today’s world.<br />
<br />
One of the steps that Apple has taken recently to address some of the issues regarding the storage and retrieval of sensitive information is the use of tokens. For instance, “With Apple Pay, your exact credit card information is never sent over the internet. Instead, a token or random string of numbers representing the card is sent. Biometric tokenization is similar, but it's your biometric data, rather than credit card info, that is obfuscated and transmitted.”<ref>Simic, Bojan. (25 Sept. 2017). [www.forbes.com/sites/forbestechcouncil/2016/12/22/the-promise-and-challenges-of-biometrics/?sh=73359d7c7e6b “Council Post: The Promise And Challenges Of Biometrics”] ''Forbes Magazine''.</ref><br />
<br />
=== How Secure Is Touch ID? ===<br />
<br />
Touch ID is more secure than Face ID but less secure than person password entering. The question is how much less secure is this more convenient option than typing in your password every time you need to unlock your phone or sign in to an account? Apply claims the uniqueness of an individual's fingerprint makes this system extremely secure but researchers have recently discovered a new way to break this security barrier. Researchers at Michigan State University and New York University have discovered that because the fingerprint scanners on phones are so small, they only read partial fingerprints--making the images easier to duplicate. Touch ID works by taking about ten different images creating ten partial images of your fingerprint from different angles, never creating one full unique fingerprint image. Therefore, a hacker only needs to match one of these ten partial fingerprint images to unlock the phone. Through the study, using computer simulations, researchers "were able to develop a set of artificial “MasterPrints” that could match real prints similar to those used by phones as much as 65 percent of the time.” <ref>Goel, Vindu (April 10, 2017). [http://www.nytimes.com/2017/04/10/technology/fingerprint-security-smartphones-apple-google-samsung.html%20www.nytimes.com/2017/04/10/technology/fingerprint-security-smartphones-apple-google-samsung.html "That Fingerprint Sensor on Your Phone Is Not as Safe as You Think"] ''The New York Times''. </ref> Although this is a concerningly high number, these tests were not done with phones. Instead, they were tested on Touch ID systems not connected to phones, making the realistic percentage of replicated prints much smaller. There is concern about the idea that hackers only need to match one of the ten partial prints to unlock your phone but realistically, this is still a very unlikely and difficult thing to do. Although Touch ID is a very secure system, this study highlights some minor weaknesses it presents that could easily be fixed. Most of the researchers were quoted saying they still use Touch ID to secure their phones, but might suggest users use personal password insertion for more confidential log-ins like bank accounts.<br />
<br />
=== User Accessibility Concerns ===<br />
<br />
Apple has made massive efforts in improving accessibility in recent years. This includes adding categories such as “Vision,” Interaction,” “Hearing,” “Media,” and “Learning” to their “Accessibility” section in their phone settings. However, the release of the iPhone X prompted some concern among the blind/low-vision community <ref> Thompson, Terrill. (2018). [www.washington.edu/accesscomputing/resources/accesscomputing-news-february-2018/iphone-x-and-accessibility “iPhone X and Accessibility | AccessComputing”] ''AccessComputing''. </ref>. The removal of the home button with the additional Touch ID feature posed some complications with those who relied on the physical feeling of the home button to navigate unlocking their phone. <br />
<br />
Luckily, the new Face ID feature has proven to outdo Touch ID at every level in regards to accessibility. First, the set-up process of Face ID is much faster and requires less precision which can be a hindrance to many with limited fine-motor skills. Beyond set-up, Face ID has allowed Apple to make a virtually hands-free experience. The VoiceOver feature has been a vital tool to the blind/low-vision community and this coupled with the Face ID unlocking feature make iPhone products all the more accessible. You still have to occasionally swipe up from the bottom of the screen to the top, but this requires less precision than the former home button/Touch ID as mentioned previously <ref> Aquino, Steven. (21 Nov. 2017). [www.stevensblog.co/blogs/what-face-id-means-for-accessibility “What Face ID Means for Accessibility”] ''Steven’s Blog''.</ref>.<br />
<br />
Although Face ID is generally more accessible, there was previous concern with the “look-to-unlock” feature that requires an active gaze would create a barrier. People with visual impairments or blindness find this task difficult or impossible to do. They also don’t naturally hold the phone up to their face when using them. However, Apple thought this through and allows users to disable this feature by going to Settings > Face ID and Passcodes > Required Attention for Face ID <ref> RightPoint. (6 Dec. 2017). [www.rightpoint.com/thought/articles/2017/12/06/what-does-x-face-mean “The iPhone X: What Does Face ID Mean for Accessibility?”] ''Rightpoint''.</ref>. Apple does say, “Requiring Attention makes Face ID more secure,” but unlike Touch ID which allows multiple fingerprints to be added, only one face can be entered for Face ID <ref> Ingber, Janet. (Feb. 2018). [www.afb.org/aw/19/2/15124 “The iPhone X for People with Visual Impairments: Face ID, New Gestures, and Useful Commands | AccessWorld | American Foundation for the Blind”] ''American Foundation for the Blind''.</ref>. Touch ID is not made with accessibility in mind. Apple went a more inclusive route by creating and implementing Face ID instead. <br />
<br />
<br />
==See also==<br />
{{resource|<br />
*[[Face recognition]]<br />
*[[Face recognition in law enforcement]]<br />
}}<br />
<br />
== References ==<br />
<references/><br />
[[Category:Services]]<br />
[[Category:Software]]</div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Baidu&diff=102762Baidu2021-04-19T08:08:35Z<p>Timsun: </p>
<hr />
<div>{{Nav-Bar|Topics#B}}<br />
{{SoftwareInfoBox<br />
|HEIGHT=580<br />
|NAME=Baidu<br />
|LOGO=Baidulogo.jpg<br />
|SCREENIMAGE=Baidu1.jpg<br />
|CAPTION="Baidu"<br />
|IMAGEURL=http://baidu.com<br />
|TEXT=Site<br />
|PLATFORM=Cloud Service<br />
|PRODUCT=Search Engine<br>Encyclopedia<br>Discussion forum<br />
|TYPE=E-Commerce<br>Cloud Based Storage<br>Artificial Intelligence<br />
|SITEURL=http://baidu.com<br />
|URLTEXT=www.baidu.com<br />
|STATUS=Active<br />
|LAUNCH=January 1, 2000<br />
}}<br />
<br />
'''Baidu''' (NASDAQ: BIDU) is a Chinese technology and Internet-integrated services company whose flagship product is Baidu.com, the largest Chinese search engine.<ref>''Baidu'' [http://home.baidu.com/ "About Baidu"]</ref> Its name was originated from the poem Qinyuan by Qiji Xin in Song dynasty. <ref> Qiji Xin [https://zh.wikisource.org/wiki/青玉案_(辛棄疾) Qinyuan] </ref> Baidu employs thousands of research engineers to work on advanced search engine Hyperlink technology, which gives Baidu access to cutting-edge science and core technology. In part due to Baidu, China has joined the United States, Russia, and South Korea as one of the few countries with domestically-developed search engine core technology. In recent years, Baidu has faced criticism for their data mining and targeted advertising practices, which were catalysts for an increased amount of debate surrounding the ethical implications of online advertising and privacy.<ref>http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=5,920,859.PN.&OS=PN/5,920,859&RS=PN/5,920,859</ref><br />
<br />
==History==<br />
[[File:Robin.li .jpg|200px|thumb|right|Robin Li at NASDAQ. Sourced from Seeking Alpha<ref name="seeking_alpha"></ref>]]<br />
<br />
In 1994, [[Wikipedia: Robin Li|Robin Li]] (Yanhong Li, 李彦宏) joined IDD Information Services, a New Jersey division of Dow Jones and Company, where he helped develop software for the online edition of The Wall Street Journal.<ref>[http://www.taipeitimes.com/News/bizfocus/archives/2006/09/17/2003328060 Robin Li's vision powers Baidu's Internet search dominance Archived February 3, 2011, at the Wayback Machine], ''Taipei Times'', September 17, 2006.</ref> Li also worked on developing better algorithms for search engines and remained at IDD Information Services from May 1994 to June 1997.<br />
<br />
[[File:zhongguancun.jpg | 200px|thumb|left|Zhongguancun at night. Sourced from Global Times.<ref name="global_times">Büchenbacher, K. (2018, June 28). How China’s economic reforms made way for Zhongguancun – China’s Silicon Valley - to become a transnational innovation hub. Global Times. https://www.globaltimes.cn/content/1108701.shtml</ref>]]<br />
At the end of 1999, Li saw the great potential of China's emerging Internet sector. Li resigned from his job, brought patented search engine technology, and founded Baidu Inc in [[Wikipedia: Zhongguancun| Zhongguancun]], often referred to as "China's Silicon Valley", on January 1, 2000. Within one year of its founding, Baidu launched its flagship independent search portal baidu.com. Li's original intention was to create a product to "provide the best and most equitable way for people to find what they are looking for".<ref>''Baidu'' https://baike.baidu.com/reference/427116/74a23gpaBp1id7YOJTojsNSLYPiEFfKSdcxZ0sklG0MySaqCIrIVDI7sfDGNypGBR5cWQCy5R8-1HuQnhQDoSt7thhMetJlF ''BaiKe.''</ref> This feat was accomplished as a result of Baidu's [[Wikipedia: Hyperlink|link analysis]] technology, which sorts search results based on how many connections they have with other pages. This algorithm was based on the assumption that the more times a page is linked from another site, the more credible it is.<br />
<br />
[[File:wangpan.jpg|200px|thumb|right|Baidu Wangpan. Sourced from TechInAsia.<ref name="tia">Millward, S. (2012, March 23). Baidu Takes Aim at Dropbox, Microsoft’s SkyDrive, With New Cloud Storage Service. TechInAsia. https://www.techinasia.com/baidu-cloud-storage-service</ref>]]<br />
In 2003, Baidu surpassed Google and became the largest search engine for Chinese netizens. According to data from Analysis International, Baidu currently holds a respectable market share of 58%, well above Google's 33%. <ref>[https://www.technologyreview.com/2018/12/19/138307/how-google-took-on-china-and-lost/ How Google took on China—and lost]. ''MIT technology review'', 19 December, 2018.</ref> Building on its early success, Baidu rapidly expanded by producing new suites of products and acquiring new companies in many different markets. These products include [[Wikipedia: Baidu Baike|Baidu Baike]] (an online encyclopedia), [[Wikipedia: Baidu Wangpan: Baidu Wangpan]] (a cloud storage service), and [[Wikipedia: Baidu Tieba| Baidu Tieba]] (a keyword-based discussion forum), among others.<br />
<br />
[[File:baidu_nasdaq.jpg|200px|thumb|left|Baidu's NASDAQ launch. Sourced from the New York Times.<ref name="nyt_nasdaq">Barboza, D. (2006, September 17). The Rise of Baidu (That’s Chinese for Google). The New York Times. https://www.nytimes.com/2006/09/17/business/yourmoney/17baidu.html</ref>]]<br />
Baidu's initial public offering occurred on August 5, 2005. At its IPO price of $27 a share, the company raised $109 million. On the first day of trading, Baidu's stock price rose by 354%, the 18th highest gain in history and the highest gain by an overseas company.<ref name="seeking_alpha">[https://seekingalpha.com/article/157809-the-untold-story-of-the-baidu-ipo The Untold Story of the Baidu IPO] ''Seeking Alpha''. Archived from the original on October 24, 2016. Retrieved September 8, 2019.</ref> In December 2007, Baidu became the first Chinese company to be included in the NASDAQ-100 index. As of May 2018, Baidu's market cap has risen to US$99 billion.<ref>[https://www.latimes.com/archives/la-xpm-2007-dec-10-fi-baidu10-story.html Search site moves at the speed of China]. ''Los Angeles Times''. Archived from the original on January 22, 2012. Retrieved November 26, 2011.</ref><br />
<br />
==Name, Mission, and Vision==<br />
The word "Baidu" comes from Xin Qiji, a Southern Song Dynasty-era poet who lived and wrote eight hundred years ago. <ref>''Baidu'' https://ir.baidu.com/company-overview/ "Company Overview" </ref> In a famous poem, Xin Qiji wrote: "Having searched hundreds of times in the crowd, suddenly turning back, he is there in the dimmest candlelight." The meaning of "Baidu" is "searching for hundreds of times", which matches the enterprise's position as a search engine company and its resolution to make their search engine the top in the world.<br />
Baidu's mission is to "make the complicated world simpler through technology" and its vision is "to be a top global technology company which best understands users' needs and enables their growth".<br />
<br />
==Baidu Brain==<br />
Baidu Brain is Baidu's AI core technology engine, including vision, speech, natural language processing, knowledge graphs, deep learning, and other AI core technologies and AI open platforms. Baidu Brain supports all Baidu's businesses internally and is open to the outside world to help partners and developers accelerate the application of AI technology, and empower industry customers through DuerOS, Apollo, and Baidu Smart Cloud.<ref>''Baidu Baike'' [https://baike.baidu.com/item/%E7%99%BE%E5%BA%A6%E5%A4%A7%E8%84%91/13333434?fr=aladdin "Baidu Brain"] Retrieved March 19, 2021</ref> <ref>''Baidu Research''. Jan 13, 2021. [http://research.baidu.com/Blog/index-view?id=149 "2020 Retrospective: Baidu's AI Innovations"] Retrieved March 19, 2021</ref><br />
[[File:Baidu Brain.png|300px|thumb|right|Overview of Baidu Open AI Strategy <ref> ''Baidu Inc.'' Feb 6, 2018. [https://twitter.com/baidu_inc/status/960936477348843522 "Baidu Open AI Strategy"] Retrieved March 19, 2021 </ref>]]<br />
<br />
===DuerOS===<br />
DuerOS is a cross-platform voice assistant service with an installed base of over 400 million and monthly voice queries reaching 3.2 billion in June 2019. With a network of over 300 partners, DuerOS is installed on smart devices, smartphones, children's watches, and story machines. Baidu released four DuerOS-powered Xiaodu Branded smart devices in 2018, including Xiaodu smart speaker and Xiaodu smart display, the first smart speaker in China with a display. Equipped with over 1,000 skills in genres such as education, cooking, gaming, and entertainment, the DuerOS skills store has been released for test trials. <ref name='AI business'>''Baidu''. [https://ir.baidu.com/index.php/Baidu-Core "Baidu Core: Search and feed"] Retrieved March 19, 2021</ref><br />
<br />
===Apollo===<br />
Apollo is Baidu's open-source autonomous driving platform. It supports the commercial production of autonomous driving vehicles and incorporates autonomous driving capabilities. It helps to provide AI solutions in areas such as traffic flow, air pollution, and road hazards. <ref name='AI business'></ref><br />
<br />
===Baidu Cloud===<br />
Baidu Cloud provides AI solutions, cloud infrastructure, and other services to enterprises and individuals. Its primary goal is to offer a comprehensive set of products, services, and tools to enable enterprises to improve productivity and operational efficiency through the use of Baidu AI and cloud infrastructure. Baidu Cloud offers general and industry-specific AI solutions, serving industries, including financial services, media, gaming, and telecommunications, while supporting internal usage. <ref name='AI business'></ref><br />
<br />
==Baidu Products==<br />
<br />
===International===<br />
*''[[Wikipedia:Baidu Translate | Baidu Translate]]'', an online translation service originated in February 2013.<ref>https://www.apkhere.com/app/com.baidu.baidutranslate </ref> As of April 2020, it supports 200 languages, the most out of any online translation service, to help fight against COVID-19.<ref>https://twitter.com/baiduresearch/status/1248316242689019904</ref><br />
<br />
===Online Video Platform===<br />
*''[[Wikipedia: iQIYI | iQIYI]]'' is a leading internet video streaming service owned by Baidu. The video service platform provides its users a comprehensive library of professionally produced content, as well as user-generated content. <ref>''iQIYI''. [https://ir.iqiyi.com/corporate-profile "Company Overview"] Retrieved March 19, 2021</ref><br />
<br />
*''Haokan'' is a short video app, offering a wide variety of user-generated and professionally produced content often in coordination with multiple platform networks. Haokan allows video content creators to distribute their content freely to build a fan base and receive revenue shares for their content contribution. <ref name="AI business"></ref><br />
<br />
===Baidu Input Method Editor===<br />
Baidu IME is a Chinese-language mobile keyboard that uses Baidu AI to improve input accuracy, remember corrections, and provides a personalized dictionary of new or uncommon words. The input editor includes advanced features like extended voice input, voice message translation & modification, smart punctuation recommendation, and contextual speech detection. Users can create personalized emojis with Baidu IME's augmented VR function. <ref> ''Baidu Inc.'' (2018). [https://www.sec.gov/Archives/edgar/data/1329099/000119312519076779/d657854d20f.htm "United States SEC Form 20-F"] Retrieved April 16 2021 </ref><br />
<br />
===Baidu Maps===<br />
Baidu Maps is a desktop and mobile map service provided by China's online search giant Baidu Inc. <ref>Zhu, W.Q. (Nov 29, 2016). [http://www.chinadaily.com.cn/business/tech/2016-11/29/content_27510421.htm "Baidu maps out global expansion"] ''ChinaDaily.'' Retrieved April 16, 2016 </ref> It provides location information, intelligent routing, and navigation by collecting available travel options and route timings. Baidu Maps also provides accessibility services such as voice assistance, which allows for voice activation, multi-round conversations, and complex commands. <ref>Lee, M. (Jul 06, 2012). [https://www.bloomberg.com/news/articles/2012-07-05/apple-shares-google-china-map-partner-in-win-for-autonavi "Apple Shares Google China Map Partner in Win for AutoNavi: Tech"] ''Bloomberg.'' Retrieved April 16 2021 </ref><br />
<br />
==Advertisements==<br />
Baidu provides online marketing services to a diverse customer base that consists of small and medium-sized enterprises(SMEs), large domestic businesses, and multinational corporations. The defined industries include retail, personal care, medical and healthcare, franchising, financial services, education, online game services, auto/logistics, real estate, and home furnishing, and business services. <ref name='AI business'> </ref><br />
<br />
[[File:Baidu business model.png|200px|thumb|right|Bar chart showing Chinese search market share <ref>Cuofano, G. (n.d.) [https://fourweekmba.com/baidu-business-model/ "The Google of China: Baidu Business Model In A Nutshell"] ''FourWeekMBA'' Retrieved Apruk 16 2021</ref> ]]<br />
===Pay for placement (P4P)===<br />
Baidu's P4P services allow customers to bid for priority placement of paid sponsored links and reach users who search for information related to their products or services. <ref name='AI business'> </ref> Customers may use Baidu's automated online tools to create text-based descriptions of their web pages and bid on keywords that trigger the display of their links and web page information. <ref> ''Baidu'' (Nov 18, 2008). [https://ir.baidu.com/news-releases/news-release-details/baidu-takes-immediate-measures-response-recent-cctv-reports "Baidu Takes Immediate Measures in Response to Recent CCTV Reports"] Retrieved April 16 2021 </ref><br />
<br />
Customers are primarily served through Baidu's proprietary online marketing system Phoenix Nest, which improves monetization efficiency by improving relevance in paid search and optimizing value. <ref name='AI business'> </ref> The following are the ad monetization options available on Phoenix Nest:<br />
<br />
*Dynamic Ads: Delivers highly personalized search-based and feed-based online marketing by incorporating customers' product catalogs and user insights through Baidu AI. Dynamic Ads has been adopted by our online marketing customers in ecommerce/retail, travel, auto, and real estate sectors. <ref name='AI business'> </ref><br />
<br />
*oCPX: Enables customers to bid for online marketing services based on pre-defined results, including optimized cost per click, impression, and view. oCPX provides marketing customers with more options to optimize lead generation. <ref name='AI business'> </ref><br />
<br />
*Action ads: Comes in a wide range of ad formats, including click-to-call, click-to-chat, click-to-download, and click-to-buy, to help marketing customers achieve better conversion. <ref name='AI business'> </ref><br />
<br />
*Moonrise: Employs reinforcement learning to improve customers' online marketing with recommendations of better keywords, photos, or videos from Baidu's huge content library, to increase conversion and overall marketing effectiveness. Feed-based marketing services usually comprise image-based or video-based online marketing services, appearing between the feed headlines, or within the feed content. It is powered by Baidu AI to better match online marketing customers with their targeted audience while optimizing user experience. <ref name='AI business'> </ref><br />
<br />
==Ethical Issues==<br />
<br />
===Search Engine===<br />
====Disclaimer====<br />
In view of the fact that Baidu automatically generates links to third-party web pages according to the keywords you type by non-manual search, in addition to the terms of service specified by Baidu, Baidu is not responsible for any accidents, negligence, infringement, and losses caused by using Baidu (including computer virus infection caused by downloading the content of the third-party website to which the search link is linked). Any third-party webpages linked to by Baidu searches are created or provided by others, and Baidu does not endorse the content or position of the third-party webpages linked to by the search. <ref name=b_disclaimer> ''Baidu'' [https://www.baidu.com/duty/wise/wise_index.html "Disclaimer"] </ref><br />
<br />
Baidu respects and protects the personal privacy rights of all Baidu users. Your registered user name, email address, and other personal information will not be disclosed to third parties without your explicit permission or in accordance with the mandatory provisions of applicable laws and regulations. Baidu reminds you that the keyword you enter into a search engine will not be considered personal privacy information. <ref name=b_disclaimer> </ref><br />
<br />
====Death of Wei Zexi====<br />
[[File:Wei zexi.jpg|200px|thumb|right|Death of Wei Zexi]]<br />
Baidu responded to the "weizexi incident" starting from a Q&A community. Weizexi, a computer student at Xi'an University of electronic technology, learned that he had a synovial sarcoma after a physical examination two years ago. According to WeiZeXi's pre-life description, the disease is "a very terrible soft tissue tumor, and there is no effective treatment except for the latest research and development and the technology in clinical experiments." After learning about "the second hospital of the armed police Beijing corps" through Baidu search and [[Wikipedia:China Central Television|CCTV]], Wei Zexi's parents went to the hospital for investigation and was told by the doctor surnamed Li that it could be treated. So Wei Zexi began to work in the armed police Beijing Corps The second hospital has four times of treatment.<ref>[https://finance.yahoo.com/news/ceo-chinas-baidu-summoned-over-student-death-060004416.html?guce_referrer=aHR0cHM6Ly9lbi53aWtpcGVkaWEub3JnLw&guce_referrer_sig=AQAAADhZabRuW-MuEQqoqYAwAbwLoejx-Cq3YVvCDYtX60X-ZNnFyMoOKq9bSMYyt8j56QPAJYpJjVZAMCN2jWE8vVTlZ2S6kUaWuNO0nmElNsNYT0niOq-ueRI2T0Vv25Uzvudm-dX_v6PftI7j8YZtj13CZFMJdvxv5JeJiDAK4Myd CEO of China's Baidu summoned over student death]. ''Yahoo Finance'', May 3, 2016.</ref> but the treatments proved unsuccessful, and Wei died on April 12, 2016. Before his death, Wei accused Baidu of promoting false medical information, and he denounced the hospital for claiming high success rates for the treatment.<ref name="xinhua">[http://news.xinhuanet.com/fortune/2016-05/03/c_128953402.htm China to investigate Baidu over student's death, shares dive]. ''Xinhua.'' May 3, 2016.</ref><br />
<br />
From an economic standpoint, Baidu has transitioned from an "emerging" internet enterprise to an "oligarch", as a direct result of the ban on Google.<ref>[http://news.bbc.co.uk/2/hi/asia-pacific/8582233.stm China condemns decision by Google to lift censorship]. ''BBC News'', 23 March 2010.</ref> This kind of phenomenon can be defined as eliminating competition through the issuance of decrees that violate the objective laws of the economy, resulting in market imbalance. In the lack of supervision, it is not surprising that a search engine company can expand its business to the medical consulting industry and produce adverse consequences.<br />
<br />
===Online Community===<br />
====Commercialization of Tieba====<br />
[[File:Tieba.jpg|300px|thumb|right|Tieba]]<br />
Baidu sold the hemophilia online community to unqualified hospitals. This community was founded by a user with the nickname "Mayicai". "Mayicai" said about 5,000 netizens use this online community to discuss and share effective treatments for hemophilia on Tieba.<ref>[http://www.chinadaily.com.cn/business/2016-01/12/content_23052646.htm Baidu to halt commercialization of Tieba health forums]. ChinaDaily. 1 Jan, 2016.</ref> The new owner of this community with the nickname “hemophilia expert” posted that he had formed a consulting team with "a number of experts related to hemophilia to accurately answer the questions of patients". He explained his previous behavior of deleting posts of other people and claimed that he was entrusted by Baidu company to manage the community. Most of the medical staff in the consultant team of "hemophilia experts" come from a medical institution in Xi'an. One of them is “Professor” Shanxi Liu, the president of the hemophilia Research Institute of Shaanxi Medical University, who was reported by hemophilia bar netizens many times in April 2014. “Professor” Liu was later proved to be a liar.<ref>[http://www.sixthtone.com/news/1124/baidu-gives-up-on-commercializing-tieba-forums/ Baidu Gives Up on Commercializing Tieba Forums]. ''Sixth Tone''. Jul 28, 2016.</ref><br />
<br />
Tieba is Baidu's product, the real economy market does not have the law to stipulate that Baidu cannot sell its own products. However, the volume of the Tieba is large with hundreds of millions of users. When such a large product appears, it will produce uneconomic behavior. It is called internal [[Wikipedia: Diseconomies of scale|diseconomy]] in economics. Internal uneconomic refers to the asymmetry of information caused by the strength of one party during the transaction. The cost outside the contract caused is borne by the party without information, which is not in line with the principle of equality of market economy. During the commercialization of Tieba, Baidu is the seller, because it controls the management right of the Tieba, and the users of Tieba do not have this right. This difference forms information asymmetry, such as the actual controller of the post-bar (Baidu knows that who is the controller, while the users do not). This information asymmetry makes the users of this community bear additional costs, such as medical risks.<br />
<br />
On July 7, 2016, Baidu officially confirmed that it will no longer sell forum moderation rights for its online discussion platform, Tieba, in response to this whole event.<ref>[https://www.globaltimes.cn/content/998212.shtml Agent talks at impasse as Baidu moves to end Tieba commercialization as part of its search overhaul]. ''Global Times''. Aug 3, 2016.</ref><br />
<br />
===Mobile Apps===<br />
====DO Global====<br />
[[File:do_global.jpg|200px|thumb|right|Two of the DO Global apps removed from the Play Store. Sourced from BuzzFeed News.<ref name="bfn">Silverman, C. (2019, April 26). Exclusive: Google Is Banning A Play Store Developer With More Than Half A Billion App Installs. BuzzFeed News. https://www.buzzfeednews.com/article/craigsilverman/google-ban-play-store-do-global-baidu</ref>]]<br />
DO Global, formerly Baidu Mobile is a mobile app development company that was a former subsidiary of Baidu. In 2018, DO Global was spun off as its own company, though Baidu continued to retain a 34% stake.<ref name="bfn"></ref> DO Global developed and released hundreds of mobile apps for the Google Play Store and the Android platform, and accumulated more than 250 million active monthly users by early 2019. DO Global’s revenues primarily come from advertising targeted at the users of its various apps. In April 2019, BuzzFeed News said that many apps released by DO Global included code that caused ads to be clicked even when users were not using those apps. In addition, BuzzFeed News also said that many of the apps produced by DO Global were released under fake names such as “Applecheer Studio” and “Pic Tools Group” without disclosing their connection to DO Global.<ref name="bfn"></ref> Both of these actions violated Google’s Play Store policies, which led Google to mass-remove 46 DO Global apps from the Play Store and issue a temporary ban to DO Global.<ref name="bfn"></ref><ref name="tv">Liao, S. (2019, April 26). Google bans app developer with 600 million downloads for being a fake click factory. The Verge. https://www.theverge.com/2019/4/26/18518439/google-app-developer-ban-downloads-fake-click-factory-do-global-baidu</ref><br />
<br />
====Baidu App and Baidu Maps====<br />
[[File:baidu_app.jpg|200px|thumb|right|Image of the Baidu App. Sourced from KrAsia.<ref name="kra">Chen, W. (2020, April 17). Police arrest suspect in case involving hack of premium Baidu cloud storage services. KrAsia. https://kr-asia.com/police-arrest-suspect-in-case-involving-hack-of-premium-baidu-cloud-storage-services</ref>]]<br />
In November 2020, the cybersecurity firm Palo Alto Networks published a report saying that two of the apps developed by Baidu, the Baidu App and Baidu Maps, contained code that collected and leaked sensitive user data.<ref name="forbes">Brewster, T. (2020, November 24). Warning: Banned Baidu Apps Exposed ‘Sensitive’ Data On Millions Of Android Phones. Forbes. https://www.forbes.com/sites/thomasbrewster/2020/11/24/warning-banned-baidu-apps-exposed-sensitive-data-on-up-to-14-billion-android-phones/?sh=5f41b09c1357<br />
</ref><ref name="zdnet">Cimpanu, C. (2020, November 24). Baidu's Android apps caught collecting sensitive user details. ZDNet. https://www.zdnet.com/article/baidus-android-apps-caught-collecting-sensitive-user-details/</ref> According to the authors of the report, cybersecurity researchers Stefan Achleitner and Chengcheng Xu, both apps collected data such as a user’s International Mobile Subscriber Identity that could be used to track a specific user even if they switch to a different phone or mobile device. At the time the report was published, the Baidu App and the Baidu Maps App had a total of more than 6 million downloads. Furthermore, the code in question was used in over 37,500 apps since it was part of the Baidu Push Software Development Kit, which many independent app developers used to ease the process of integrating mobile push notifications into their own apps.<ref name="forbes"></ref><ref name="zdnet"></ref> Google removed the Baidu App and Baidu Maps App from the Play Store after the report was published, but later re-added both once the code in question was removed.<ref name="forbes"></ref><ref name="zdnet"></ref><br />
<br />
==See Also==<br />
{{resource<br />
|<br />
*[[Google]]<br />
*[[Censorship]]<br />
*[[Cloud Computing]]<br />
*[[Data Aggregation Online]]<br />
*[[Data Mining]]<br />
*[[Information Transparency]]<br />
*[[Social Networking]]<br />
*[[Social Networking Services]]<br />
}}<br />
<br />
==External Links==<br />
{{resource<br />
|<br />
*[http://www.baidu.com Baidu]<br />
*[http://en.wikipedia.org/wiki/Baidu Baidu - Wikipedia]<br />
}}<br />
<br />
==References==<br />
{{resource<br />
|<br />
<references/><br />
}}<br />
<br />
<br />
<br />
[[Category:Corporations]]<br />
[[Category:Services]]<br />
[[Category:Websites]]<br />
[[Category: Information Ethics]]<br />
<br />
([[Topics|back to index]])</div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Technology_censorship_in_China&diff=102636Technology censorship in China2021-04-18T13:09:19Z<p>Timsun: </p>
<hr />
<div>Censored technology companies in China is a concept that talks about how Chinese government censor the Chinese technology companies and restrict the content they publish on their platforms. Chinese government . Typically, censorship is defined as the suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable or a threat to security.<ref name=dictionary> Oxford Dictionary [en.oxforddictionaries.com/definition/censorship " Definition of Censorship in English by Oxford Dictionaries"], Retrieved on 15 April 2021 </ref> As the rapid development of Internet technology, Chinese government has started to censor more massively and aggressively. The type of censorship varies from companies to companies but they are all done in order to prohibiting Chinese citizens from knowing and spreading information including but not limited to controversial events, reactionary speech, government actions, and violent and pornographic contents. For those companies that do not enter Chinese market or reject the censorship from Chinese government, they were blocked from Chinese Internet. The most notable blocking mechanism is known as “the Great Firewall”, with its name inspired by the historical architecture “the Great Wall”. In recent years, Chinese government is not satisfied with government censorship but requires individual technology companies to establish self-censorship mechanisms. <ref> Information Control and Self-Censorship in the PRC and the Spread of SARS [https://www.cecc.gov/publications/issue-papers/information-control-and-self-censorship-in-the-prc-and-the-spread-of-sars] </ref><br />
<br />
==Response of Censored tech companies==<br />
===Google:exit===<br />
In the face of China's strict Internet regulations, Google adopted a strong attitude of resistance, and finally exit Chinese market to resist the censorship from the Chinese government.<br />
On January 12, 2010, Google made a statement titled 'A new approach to China' on its official blog, stating that the company will consider canceling content censorship on Google.cn. <ref> Google. [https://googleblog.blogspot.com/2010/01/new-approach-to-china.html "A new approach to China"] 13 January 2010. Retrived from 15 April 2021 </ref> Google claimed that its Gmail service was hacked by a "well-planned and targeted" attack from China in mid-December 2009, which resulted in the theft of intellectual property. The hackers focused on the e-mails of Chinese human rights activists <ref> Yuan Li [https://life.mingpao.com/general/article?issue=20100115&nodeid=1507899296560, "Gmails of social activists are invaded"], Ming News, 15 January 2010</ref>. Mercury News reported that, although Google did not specify that the Chinese mainland government was responsible for the attack on the account, according to a person close to Google, Google engineers did trace the hackers to the Chinese government or its agents.<ref>John Boudreau and Mike Swift [https://www.mercurynews.com/2010/01/12/google-cyberattack-from-china-reverberates-around-the-world/2010-01-13, "Google cyberattack from China reverberates around the world"] Archived from the original on 14 January 2012. Retrived from 16 April 2021 </ref><br />
On March 23 of the same year, Google China announced that it decided to withdraw from the Chinese market due to "being attacked by Chinese hackers" and "network censorship".<ref> [https://googleblog.blogspot.com/2010/01/new-approach-to-china.html "Google's Statement about Google China"] Archived from the original on 29 March 2010. Retrieved from 16 April 2021.</ref> Google has redirected its search services from two existing Google China domains (google.cn and g.cn) to Google Hong Kong (google.com.hk). Its servers in Hong Kong offer a search engine that has not been censored by mainland China.<ref> Wikipedia [https://zh.wikipedia.org/wiki/谷歌退出中国大陆事件#cite_note-28 "Google exit China"] </ref><br />
===Apple: Compromise===<br />
Under the Chinese government's strict regulation of the Internet, Apple has taken many big compromises to stay in the Chinese market. <br />
(1)APPs<br />
Apple has made many adjustments to follow Chinese internet regulations. One of these adjustments is removing some apps from its “App Store” in the Chinese version.<br />
In 2009, Apple removed apps mentioning the 14th Dalai Lama and Rebiya Kadeer from its App Store in mainland China.<ref> Mozur, Paul. [https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html "Apple Removes Apps From China Store That Help Internet Users Evade Censorship."] The New York Times. Archived from the original 29 June 2017. Retrieved from 16 April 2021 </ref> Sunshine Weekly, an independent current affairs magazine in Hong Kong, had an existing iPad app in mainland China in the past. Users in the mainland could download and purchase this app free to get some news about Hong Kong. However, in 2013, after Chinese authorities contacted with Apple, asking it to take this app off the “App Store”, the company did subsequently <ref> Guoxin Cao [https://www.rfi.fr/cn/中国/20130330-中国官方媒体轮番敲打苹果公司或与加强苹果app应用监管有关 "Chinese media criticizing Apple might have something to do with Apple enhancing App regulation"] Archived from the original on 30 March 2013. Retrived from 16 April 2021 </ref> In April 2013, the Daily Telegraph and the financial times reports that in order to "please" the mainland government, the Apple inc. removed an app Bookstore ("经典书城“)from its application market (“App Store”) in China. This app allows and the reader to see 10 books that has been banned by Chinese mainland government. <ref> Lance Whitney [https://www.cnet.com/news/apple-bans-chinese-bookstore-app-over-illegal-content/ "Apple bans Chinese bookstore app over 'illegal content'"] Archived from original on 07 April 2013. Retrieved from 16 April 2021 </ref><br />
In 2016, Apple removed the New York Times app. The New York Times had been working on several stories about the Chinese government in the weeks leading up to the removal of the app. One, published on Dec. 29, revealed that the Chinese government has given the world's largest iPhone factory billions of dollars in the form of covert special treatment and subsidies. In another article, published on Dec. 22, the Times described an anti-Western Internet video that had been widely promoted by China's public security authorities. <ref> [https://cn.nytimes.com/china/20170105/new-york-times-apps-apple-china/] </ref><br />
(2) VPNs<br />
Since 2002, mainland China has used the Great Firewall to strictly censor a large number of websites. In order to get some international news and contact with foreign friends, many netizens use VPNs to circumvent censorship. ( Mozur, Paul. [https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html "Apple Removes Apps From China Store That Help Internet Users Evade Censorship"]. The New York Times. Archived from the original on 16 November 2019. Retrieved from 16 April 2021 </ref> In the fall of 2017, the Communist Party of China (CPC) held its 19th National Congress. In order to strengthen cybersecurity and guarantee the smooth progress of the congress, the Chinese government had undertaken a series of measures. In January 2017, the Ministry of Industry and Information Technology issued the Notice on Clearing up and Regulating the Internet Access Service Market, which stated that without the approval of the competent telecommunications authorities, it is prohibited to create or rent private lines (including VPNs) and other channels to conduct cross-border business activities.( 工信部:清理规范网络接入服务市场 查处无证经营等行为-新华网. [2017-08-01]. (原始内容存档于2017-08-01) According to BBC News, the Chinese government has asked Apple to remove all VPN apps from the Chinese version of its App Store. In order not to be kicked out of China's huge market, Apple complied with the government's demands.(https://www.bbc.com/zhongwen/simp/chinese-news-41634026)<br />
===Baidu===<br />
As a technology company that was founded, developed and prospered in China, Baidu has always been strictly regulated by the internet laws and following the management requirements. On April 7, 2020, Internet information office of Beijing officials pointed out that Baidu APP violated state laws and regulations on Internet and management requirements. Baidu was accused of widely disseminating vulgar pornographic information, intensively releasing "title party" articles, and laxly managing public account registration and content, which had caused serious social problems. In response to these problems, the director of Baidu company said they will temporarily stop updating Baidu APP recommendation channel, picture channel, video channel, financial channel, technology channel since April 8, and shut down illegal accounts to strictly implement the regulations.<br />
==Ethical Concerns==<br />
===Human Rights===<br />
Chinese strict regulations of tech companies in China could involve human rights restrictions on Chinese Internet users. There's been a lot of criticism to the Chinese government for forcing Apple to take VPNs off the App Store. On August 4, 2017, David Kaye, the United Nations Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, sent a letter to Apple CEO Tim Cook about this removal. In the letter he said that, in recent years, China's censorship tools and scope of action have been expanded, and individual freedom of expression, access to information, freedom of association and other basic human rights have been restricted. <ref> [https://www.zdnet.com/article/un-special-rapporteur-apple-letter-china-vpn-demands/ "UN human rights watchdog sends Apple letter over China VPN demands."] ZDNet. 2017-08-07 [2017-08-08]. (原始内容存档于2020-10-25).) The Chinese government puts pressure on technology companies, which will undermine Chinese Internet users’ rights to access foreign information and speech freely through the tight regulations on tech companies. Star VPN, one of the VPN providers that were taken down, said such a precedent was dangerous and would lead to a situation where the government has complete control over people's access to the Internet, as in Saudi Arabia. Another app that was taken down, Express VPN, said that it was disappointed by Apple's action and strongly condemned the measures that threaten free speech and civil liberties. ( 苹果中国大陸公司Apple Store开始下架VPN应用. 法广. 2017-07-30 [2017-08-01]. (原始内容存档于2019-06-28) (中文(中国大陆)).)<br />
==Influence==<br />
===Influence on Chinese economic development===<br />
Strict restriction on tech companies may affect the economic development of the mainland China. <br />
On one hand, these Internet regulations may hurt the economic development in China. Since the removal of some VPNs from the Chinese market, many Chinese netizens have begun to question and oppose Internet censorship. The Los Angeles Times reported that, Mindy Zhang, an editor in chief of a travel agency in Beijing, said she usually uses a free VPN app to go over the “firewall” because of work, but it is no longer available. She thinks it would be a desperate disaster if the government shut down VPN apps entirely.<ref> Pierson, David. [https://www.latimes.com/business/la-fi-tn-apple-china-vpn-20170731-story.html "Apple removes VPN services from App Store in China, making it harder to circumvent online censors"] Los Angeles Times. Archived from the original on 11 November 2020. Retrieved from 16 April 2021 </ref> ISSN 0458-3035. Strict regulations impede the exchange of information between China and foreign countries. Thus, these regulations may reduce Chinese people’s efficiency of getting the latest industry information from the world, which is important for economic development.<br />
On the other hand, strict restriction on tech companies may encourage the Chinese economic development to some extent. According to a report in the Financial Times, China's crackdown on VPN portals has brought business to state-approved telecom companies. (China's VPN crackdown is about money as much as censorship. ft.com. 22 January 2018.) The censorship business has opened up new markets for the development of China's economy, and made the old companies glow with new vitality and ushered in the development opportunity. Reuters reports that China's state-owned newspapers have expanded their online censorship operations. The company's net revenue rose 140 percent in 2018, and its Shanghai-listed shares are up 166 percent in 2018.( Censorship pays: China's state newspaper expands lucrative online scrubbing business. Reuters. 28 March 2019.)<br />
===Influence on Chinese domestic technology companies===<br />
Strict restriction on tech companies may also affect the development of Chinese domestic technology companies. <br />
Local Chinese companies such as Baidu, Tencent and Alibaba, have benefited from the way China has kept international rivals out of the market and encouraged domestic competition, the BBC reported. (Carrie Gracie. Alibaba IPO: Chairman Ma's China 互联网档案馆的存档,存档日期2 July 2019.. BBC. 8 September 2014.) Under the pressure of strict Internet regulations from Chinese government, many world’s biggest tech companies had to leave the Chinese market. The exit of these international tech giants has provided more space and less competition for Chinese tech companies to develop. Baidu is a big beneficiary after Google’s exit from the Chinese market. According to China Business News, a Baidu employee in charge of advertising sales said the company had arranged to contact each Google advertiser one by one and that it had "internally joked that this is a money-picking scheme". Catherine Liang, an analyst at Citigroup Securities, also said in a research note that Baidu could grab most of the market share left behind by Google. ( 股价大涨13% 百度称“幸福来得太快”. 第一财经日报. (原始内容存档于2019-02-04).) On January 13, after Google announced it might pull out of China, its rival, Baidu's shares jumped 13.71 percent on the day, while Google's shares fell about 0.6 percent, MarketWatch reported.( 谷歌考虑退出中国股价微跌 百度大涨13.71%. 网易科技报道. 2010-01-14 [2010-01-14]. (原始内容存档于2010-01-19)) And on March 23, according to the statistics of DoNews, Baidu's share price rose 1.77% on that day, and Google's share price fell 0.45%. Since January 2010, when Google announced it was considering leaving China, Baidu shares have risen 44.5%, while Google shares have fallen nearly 6.5%.( 百度股价大涨 谷歌股价微跌. DoNews. 2010-03-23 [2010-03-23]. (原始内容存档于2010-03-26).)</div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Technology_censorship_in_China&diff=102635Technology censorship in China2021-04-18T12:55:58Z<p>Timsun: </p>
<hr />
<div>Censored technology companies in China is a concept that talks about how Chinese government censor the Chinese technology companies and restrict the content they publish on their platforms. Chinese government . Typically, censorship is defined as the suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable or a threat to security.<ref name=dictionary> Oxford Dictionary [en.oxforddictionaries.com/definition/censorship " Definition of Censorship in English by Oxford Dictionaries"], Retrieved on 15 April 2021 </ref> As the rapid development of Internet technology, Chinese government has started to censor more massively and aggressively. The type of censorship varies from companies to companies but they are all done in order to prohibiting Chinese citizens from knowing and spreading information including but not limited to controversial events, reactionary speech, government actions, and violent and pornographic contents. For those companies that do not enter Chinese market or reject the censorship from Chinese government, they were blocked from Chinese Internet. The most notable blocking mechanism is known as “the Great Firewall”, with its name inspired by the historical architecture “the Great Wall”. In recent years, Chinese government is not satisfied with government censorship but requires individual technology companies to establish self-censorship mechanisms. <ref> Information Control and Self-Censorship in the PRC and the Spread of SARS [https://www.cecc.gov/publications/issue-papers/information-control-and-self-censorship-in-the-prc-and-the-spread-of-sars] </ref><br />
<br />
==Response of Censored tech companies==<br />
===Google:exit===<br />
In the face of China's strict Internet regulations, Google adopted a strong attitude of resistance, and finally exit Chinese market to resist the censorship from the Chinese government.<br />
On January 12, 2010, Google made a statement titled 'A new approach to China' on its official blog, stating that the company will consider canceling content censorship on Google.cn. <ref> Google. [https://googleblog.blogspot.com/2010/01/new-approach-to-china.html "A new approach to China"] 13 January 2010. Retrived from 15 April 2021 </ref> Google claimed that its Gmail service was hacked by a "well-planned and targeted" attack from China in mid-December 2009, which resulted in the theft of intellectual property. The hackers focused on the e-mails of Chinese human rights activists <ref> Yuan Li [https://life.mingpao.com/general/article?issue=20100115&nodeid=1507899296560, "Gmails of social activists are invaded"], Ming News, 15 January 2010</ref>. Mercury News reported that, although Google did not specify that the Chinese mainland government was responsible for the attack on the account, according to a person close to Google, Google engineers did trace the hackers to the Chinese government or its agents.<ref>John Boudreau and Mike Swift [https://www.mercurynews.com/2010/01/12/google-cyberattack-from-china-reverberates-around-the-world/2010-01-13, "Google cyberattack from China reverberates around the world"] Archived from the original on 14 January 2012. Retrived from 16 April 2021 </ref><br />
On March 23 of the same year, Google China announced that it decided to withdraw from the Chinese market due to "being attacked by Chinese hackers" and "network censorship".<ref> [https://www.google.com/press/new-approach-to-china/update.html "Google's Statement about Google China"] Archived from the original on 29 March 2010. Retrived from 16 April 2021.</ref> Google has redirected its search services from two existing Google China domains (google.cn and g.cn) to Google Hong Kong (google.com.hk). Its servers in Hong Kong offer a search engine that has not been censored by mainland China.( https://zh.wikipedia.org/wiki/谷歌退出中国大陆事件#cite_note-28,注:是个wiki词条)<br />
===Apple: Compromise===<br />
Under the Chinese government's strict regulation of the Internet, Apple has taken many big compromises to stay in the Chinese market. <br />
(1)APPs<br />
Apple has made many adjustments to follow Chinese internet regulations. One of these adjustments is removing some apps from its “App Store” in the Chinese version.<br />
In 2009, Apple removed apps mentioning the 14th Dalai Lama and Rebiya Kadeer from its App Store in mainland China.<ref> Mozur, Paul. [https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html "Apple Removes Apps From China Store That Help Internet Users Evade Censorship."] The New York Times. Archived from the original 29 June 2017. Retrieved from 16 April 2021 </ref> Sunshine Weekly, an independent current affairs magazine in Hong Kong, had an existing iPad app in mainland China in the past. Users in the mainland could download and purchase this app free to get some news about Hong Kong. However, in 2013, after Chinese authorities contacted with Apple, asking it to take this app off the “App Store”, the company did subsequently <ref> Guoxin Cao [https://www.rfi.fr/cn/中国/20130330-中国官方媒体轮番敲打苹果公司或与加强苹果app应用监管有关 "Chinese media criticizing Apple might have something to do with Apple enhancing App regulation"] Archived from the original on 30 March 2013. Retrived from 16 April 2021 </ref> In April 2013, the Daily Telegraph and the financial times reports that in order to "please" the mainland government, the Apple inc. removed an app Bookstore ("经典书城“)from its application market (“App Store”) in China. This app allows and the reader to see 10 books that has been banned by Chinese mainland government. <ref> Lance Whitney [https://www.cnet.com/news/apple-bans-chinese-bookstore-app-over-illegal-content/ "Apple bans Chinese bookstore app over 'illegal content'"] Archived from original on 07 April 2013. Retrieved from 16 April 2021 </ref><br />
In 2016, Apple removed the New York Times app. The New York Times had been working on several stories about the Chinese government in the weeks leading up to the removal of the app. One, published on Dec. 29, revealed that the Chinese government has given the world's largest iPhone factory billions of dollars in the form of covert special treatment and subsidies. In another article, published on Dec. 22, the Times described an anti-Western Internet video that had been widely promoted by China's public security authorities. <ref> [https://cn.nytimes.com/china/20170105/new-york-times-apps-apple-china/] </ref><br />
(2) VPNs<br />
Since 2002, mainland China has used the Great Firewall to strictly censor a large number of websites. In order to get some international news and contact with foreign friends, many netizens use VPNs to circumvent censorship. ( Mozur, Paul. [https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html "Apple Removes Apps From China Store That Help Internet Users Evade Censorship"]. The New York Times. Archived from the original on 16 November 2019. Retrieved from 16 April 2021 </ref> In the fall of 2017, the Communist Party of China (CPC) held its 19th National Congress. In order to strengthen cybersecurity and guarantee the smooth progress of the congress, the Chinese government had undertaken a series of measures. In January 2017, the Ministry of Industry and Information Technology issued the Notice on Clearing up and Regulating the Internet Access Service Market, which stated that without the approval of the competent telecommunications authorities, it is prohibited to create or rent private lines (including VPNs) and other channels to conduct cross-border business activities.( 工信部:清理规范网络接入服务市场 查处无证经营等行为-新华网. [2017-08-01]. (原始内容存档于2017-08-01) According to BBC News, the Chinese government has asked Apple to remove all VPN apps from the Chinese version of its App Store. In order not to be kicked out of China's huge market, Apple complied with the government's demands.(https://www.bbc.com/zhongwen/simp/chinese-news-41634026)<br />
===Baidu===<br />
As a technology company that was founded, developed and prospered in China, Baidu has always been strictly regulated by the internet laws and following the management requirements. On April 7, 2020, Internet information office of Beijing officials pointed out that Baidu APP violated state laws and regulations on Internet and management requirements. Baidu was accused of widely disseminating vulgar pornographic information, intensively releasing "title party" articles, and laxly managing public account registration and content, which had caused serious social problems. In response to these problems, the director of Baidu company said they will temporarily stop updating Baidu APP recommendation channel, picture channel, video channel, financial channel, technology channel since April 8, and shut down illegal accounts to strictly implement the regulations.<br />
==Ethical Concerns==<br />
===Human Rights===<br />
Chinese strict regulations of tech companies in China could involve human rights restrictions on Chinese Internet users. There's been a lot of criticism to the Chinese government for forcing Apple to take VPNs off the App Store. On August 4, 2017, David Kaye, the United Nations Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, sent a letter to Apple CEO Tim Cook about this removal. In the letter he said that, in recent years, China's censorship tools and scope of action have been expanded, and individual freedom of expression, access to information, freedom of association and other basic human rights have been restricted. (UN human rights watchdog sends Apple letter over China VPN demands. ZDNet. 2017-08-07 [2017-08-08]. (原始内容存档于2020-10-25).) The Chinese government puts pressure on technology companies, which will undermine Chinese Internet users’ rights to access foreign information and speech freely through the tight regulations on tech companies. Star VPN, one of the VPN providers that were taken down, said such a precedent was dangerous and would lead to a situation where the government has complete control over people's access to the Internet, as in Saudi Arabia. Another app that was taken down, Express VPN, said that it was disappointed by Apple's action and strongly condemned the measures that threaten free speech and civil liberties. ( 苹果中国大陸公司Apple Store开始下架VPN应用. 法广. 2017-07-30 [2017-08-01]. (原始内容存档于2019-06-28) (中文(中国大陆)).)<br />
==Influence==<br />
===Influence on Chinese economic development===<br />
Strict restriction on tech companies may affect the economic development of the mainland China. <br />
On one hand, these Internet regulations may hurt the economic development in China. Since the removal of some VPNs from the Chinese market, many Chinese netizens have begun to question and oppose Internet censorship. The Los Angeles Times reported that, Mindy Zhang, an editor in chief of a travel agency in Beijing, said she usually uses a free VPN app to go over the “firewall” because of work, but it is no longer available. She thinks it would be a desperate disaster if the government shut down VPN apps entirely.( Pierson, David. Apple removes VPN services from App Store in China, making it harder to circumvent online censors. Los Angeles Times. 2017-07-31 [2017-08-01]. ISSN 0458-3035. (原始内容存档于2020-11-11) (美国英语).) Strict regulations impede the exchange of information between China and foreign countries. Thus, these regulations may reduce Chinese people’s efficiency of getting the latest industry information from the world, which is important for economic development.<br />
On the other hand, strict restriction on tech companies may encourage the Chinese economic development to some extent. According to a report in the Financial Times, China's crackdown on VPN portals has brought business to state-approved telecom companies. (China's VPN crackdown is about money as much as censorship. ft.com. 22 January 2018.) The censorship business has opened up new markets for the development of China's economy, and made the old companies glow with new vitality and ushered in the development opportunity. Reuters reports that China's state-owned newspapers have expanded their online censorship operations. The company's net revenue rose 140 percent in 2018, and its Shanghai-listed shares are up 166 percent in 2018.( Censorship pays: China's state newspaper expands lucrative online scrubbing business. Reuters. 28 March 2019.)<br />
===Influence on Chinese domestic technology companies===<br />
Strict restriction on tech companies may also affect the development of Chinese domestic technology companies. <br />
Local Chinese companies such as Baidu, Tencent and Alibaba, have benefited from the way China has kept international rivals out of the market and encouraged domestic competition, the BBC reported. (Carrie Gracie. Alibaba IPO: Chairman Ma's China 互联网档案馆的存档,存档日期2 July 2019.. BBC. 8 September 2014.) Under the pressure of strict Internet regulations from Chinese government, many world’s biggest tech companies had to leave the Chinese market. The exit of these international tech giants has provided more space and less competition for Chinese tech companies to develop. Baidu is a big beneficiary after Google’s exit from the Chinese market. According to China Business News, a Baidu employee in charge of advertising sales said the company had arranged to contact each Google advertiser one by one and that it had "internally joked that this is a money-picking scheme". Catherine Liang, an analyst at Citigroup Securities, also said in a research note that Baidu could grab most of the market share left behind by Google. ( 股价大涨13% 百度称“幸福来得太快”. 第一财经日报. (原始内容存档于2019-02-04).) On January 13, after Google announced it might pull out of China, its rival, Baidu's shares jumped 13.71 percent on the day, while Google's shares fell about 0.6 percent, MarketWatch reported.( 谷歌考虑退出中国股价微跌 百度大涨13.71%. 网易科技报道. 2010-01-14 [2010-01-14]. (原始内容存档于2010-01-19)) And on March 23, according to the statistics of DoNews, Baidu's share price rose 1.77% on that day, and Google's share price fell 0.45%. Since January 2010, when Google announced it was considering leaving China, Baidu shares have risen 44.5%, while Google shares have fallen nearly 6.5%.( 百度股价大涨 谷歌股价微跌. DoNews. 2010-03-23 [2010-03-23]. (原始内容存档于2010-03-26).)</div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Technology_censorship_in_China&diff=102634Technology censorship in China2021-04-18T12:05:06Z<p>Timsun: /* Apple: Compromise */</p>
<hr />
<div>Censored technology companies in China is a concept that talks about how Chinese government censor the Chinese technology companies and restrict the content they publish on their platforms. Chinese government . Typically, censorship is defined as the suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable or a threat to security.<ref name=dictionary> Oxford Dictionary [en.oxforddictionaries.com/definition/censorship " Definition of Censorship in English by Oxford Dictionaries"], Retrieved on 15 April 2021 </ref> As the rapid development of Internet technology, Chinese government has started to censor more massively and aggressively. The type of censorship varies from companies to companies but they are all done in order to prohibiting Chinese citizens from knowing and spreading information including but not limited to controversial events, reactionary speech, government actions, and violent and pornographic contents. For those companies that do not enter Chinese market or reject the censorship from Chinese government, they were blocked from Chinese Internet. The most notable blocking mechanism is known as “the Great Firewall”, with its name inspired by the historical architecture “the Great Wall”. In recent years, Chinese government is not satisfied with government censorship but requires individual technology companies to establish self-censorship mechanisms. <ref> Information Control and Self-Censorship in the PRC and the Spread of SARS [https://www.cecc.gov/publications/issue-papers/information-control-and-self-censorship-in-the-prc-and-the-spread-of-sars] </ref><br />
<br />
==Response of Censored tech companies==<br />
===Google:exit===<br />
In the face of China's strict Internet regulations, Google adopted a strong attitude of resistance, and finally exit Chinese market to resist the censorship from the Chinese government.<br />
On January 12, 2010, Google made a statement titled 'A new approach to China' on its official blog, stating that the company will consider canceling content censorship on Google.cn. <ref> Google. [https://googleblog.blogspot.com/2010/01/new-approach-to-china.html "A new approach to China"] 13 January 2010. Retrived from 15 April 2021 </ref> Google claimed that its Gmail service was hacked by a "well-planned and targeted" attack from China in mid-December 2009, which resulted in the theft of intellectual property. The hackers focused on the e-mails of Chinese human rights activists <ref> Yuan Li [https://life.mingpao.com/general/article?issue=20100115&nodeid=1507899296560, "Gmails of social activists are invaded"], Ming News, 15 January 2010</ref>. Mercury News reported that, although Google did not specify that the Chinese mainland government was responsible for the attack on the account, according to a person close to Google, Google engineers did trace the hackers to the Chinese government or its agents.<ref>John Boudreau and Mike Swift [https://www.mercurynews.com/2010/01/12/google-cyberattack-from-china-reverberates-around-the-world/2010-01-13, "Google cyberattack from China reverberates around the world"] Archived from the original on 14 January 2012. Retrived from 16 April 2021 </ref><br />
On March 23 of the same year, Google China announced that it decided to withdraw from the Chinese market due to "being attacked by Chinese hackers" and "network censorship".<ref> [https://www.google.com/press/new-approach-to-china/update.html "Google's Statement about Google China"] Archived from the original on 29 March 2010. Retrived from 16 April 2021.</ref> Google has redirected its search services from two existing Google China domains (google.cn and g.cn) to Google Hong Kong (google.com.hk). Its servers in Hong Kong offer a search engine that has not been censored by mainland China.( https://zh.wikipedia.org/wiki/谷歌退出中国大陆事件#cite_note-28,注:是个wiki词条)<br />
===Apple: Compromise===<br />
Under the Chinese government's strict regulation of the Internet, Apple has taken many big compromises to stay in the Chinese market. <br />
(1)APPs<br />
Apple has made many adjustments to follow Chinese internet regulations. One of these adjustments is removing some apps from its “App Store” in the Chinese version.<br />
In 2009, Apple removed apps mentioning the 14th Dalai Lama and Rebiya Kadeer from its App Store in mainland China.<ref> Mozur, Paul. [https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html "Apple Removes Apps From China Store That Help Internet Users Evade Censorship."] The New York Times. Archived from the original 29 June 2017. Retrieved from 16 April 2021 </ref> Sunshine Weekly, an independent current affairs magazine in Hong Kong, had an existing iPad app in mainland China in the past. Users in the mainland could download and purchase this app free to get some news about Hong Kong. However, in 2013, after Chinese authorities contacted with Apple, asking it to take this app off the “App Store”, the company did subsequently <ref> Guoxin Cao [https://www.rfi.fr/cn/中国/20130330-中国官方媒体轮番敲打苹果公司或与加强苹果app应用监管有关 "Chinese media criticizing Apple might have something to do with Apple enhancing App regulation"] Archived from the original on 30 March 2013. Retrived from 16 April 2021 </ref> In April 2013, the Daily Telegraph and the financial times reports that in order to "please" the mainland government, the Apple inc. removed an app Bookstore ("经典书城“)from its application market (“App Store”) in China. This app allows and the reader to see 10 books that has been banned by Chinese mainland government. <ref> Lance Whitney [https://www.cnet.com/news/apple-bans-chinese-bookstore-app-over-illegal-content/ "Apple bans Chinese bookstore app over 'illegal content'"] Archived from original on 07 April 2013. Retrieved from 16 April 2021 </ref><br />
In 2016, Apple removed the New York Times app. The New York Times had been working on several stories about the Chinese government in the weeks leading up to the removal of the app. One, published on Dec. 29, revealed that the Chinese government has given the world's largest iPhone factory billions of dollars in the form of covert special treatment and subsidies. In another article, published on Dec. 22, the Times described an anti-Western Internet video that had been widely promoted by China's public security authorities. <ref> [https://cn.nytimes.com/china/20170105/new-york-times-apps-apple-china/] </ref><br />
(2) VPNs<br />
Since 2002, mainland China has used the Great Firewall to strictly censor a large number of websites. In order to get some international news and contact with foreign friends, many netizens use VPNs to circumvent censorship. ( Mozur, Paul. [https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html "Apple Removes Apps From China Store That Help Internet Users Evade Censorship"]. The New York Times. Archived from the original on 16 November 2019. Retrieved from 16 April 2021 </ref> In the fall of 2017, the Communist Party of China (CPC) held its 19th National Congress. In order to strengthen cybersecurity and guarantee the smooth progress of the congress, the Chinese government had undertaken a series of measures. In January 2017, the Ministry of Industry and Information Technology issued the Notice on Clearing up and Regulating the Internet Access Service Market, which stated that without the approval of the competent telecommunications authorities, it is prohibited to create or rent private lines (including VPNs) and other channels to conduct cross-border business activities.( 工信部:清理规范网络接入服务市场 查处无证经营等行为-新华网. [2017-08-01]. (原始内容存档于2017-08-01) According to BBC News, the Chinese government has asked Apple to remove all VPN apps from the Chinese version of its App Store. In order not to be kicked out of China's huge market, Apple complied with the government's demands.(https://www.bbc.com/zhongwen/simp/chinese-news-41634026)<br />
===Baidu===<br />
As a technology company that was founded, developed and prospered in China, Baidu has always been strictly regulated by the internet laws and following the management requirements. On April 7, 2020, Internet information office of Beijing officials pointed out that Baidu APP violated state laws and regulations on Internet and management requirements. Baidu was accused of widely disseminating vulgar pornographic information, intensively releasing "title party" articles, and laxly managing public account registration and content, which had caused serious social problems. In response to these problems, the director of Baidu company said they will temporarily stop updating Baidu APP recommendation channel, picture channel, video channel, financial channel, technology channel since April 8, and shut down illegal accounts to strictly implement the regulations.</div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Technology_censorship_in_China&diff=102633Technology censorship in China2021-04-18T11:52:46Z<p>Timsun: </p>
<hr />
<div>Censored technology companies in China is a concept that talks about how Chinese government censor the Chinese technology companies and restrict the content they publish on their platforms. Chinese government . Typically, censorship is defined as the suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable or a threat to security.<ref name=dictionary> Oxford Dictionary [en.oxforddictionaries.com/definition/censorship " Definition of Censorship in English by Oxford Dictionaries"], Retrieved on 15 April 2021 </ref> As the rapid development of Internet technology, Chinese government has started to censor more massively and aggressively. The type of censorship varies from companies to companies but they are all done in order to prohibiting Chinese citizens from knowing and spreading information including but not limited to controversial events, reactionary speech, government actions, and violent and pornographic contents. For those companies that do not enter Chinese market or reject the censorship from Chinese government, they were blocked from Chinese Internet. The most notable blocking mechanism is known as “the Great Firewall”, with its name inspired by the historical architecture “the Great Wall”. In recent years, Chinese government is not satisfied with government censorship but requires individual technology companies to establish self-censorship mechanisms. <ref> Information Control and Self-Censorship in the PRC and the Spread of SARS [https://www.cecc.gov/publications/issue-papers/information-control-and-self-censorship-in-the-prc-and-the-spread-of-sars] </ref><br />
<br />
==Response of Censored tech companies==<br />
===Google:exit===<br />
In the face of China's strict Internet regulations, Google adopted a strong attitude of resistance, and finally exit Chinese market to resist the censorship from the Chinese government.<br />
On January 12, 2010, Google made a statement titled 'A new approach to China' on its official blog, stating that the company will consider canceling content censorship on Google.cn. <ref> Google. [https://googleblog.blogspot.com/2010/01/new-approach-to-china.html "A new approach to China"] 13 January 2010. Retrived from 15 April 2021 </ref> Google claimed that its Gmail service was hacked by a "well-planned and targeted" attack from China in mid-December 2009, which resulted in the theft of intellectual property. The hackers focused on the e-mails of Chinese human rights activists <ref> Yuan Li [https://life.mingpao.com/general/article?issue=20100115&nodeid=1507899296560, "Gmails of social activists are invaded"], Ming News, 15 January 2010</ref>. Mercury News reported that, although Google did not specify that the Chinese mainland government was responsible for the attack on the account, according to a person close to Google, Google engineers did trace the hackers to the Chinese government or its agents.<ref>John Boudreau and Mike Swift [https://www.mercurynews.com/2010/01/12/google-cyberattack-from-china-reverberates-around-the-world/2010-01-13, "Google cyberattack from China reverberates around the world"] Archived from the original on 14 January 2012. Retrived from 16 April 2021 </ref><br />
On March 23 of the same year, Google China announced that it decided to withdraw from the Chinese market due to "being attacked by Chinese hackers" and "network censorship".<ref> [https://www.google.com/press/new-approach-to-china/update.html "Google's Statement about Google China"] Archived from the original on 29 March 2010. Retrived from 16 April 2021.</ref> Google has redirected its search services from two existing Google China domains (google.cn and g.cn) to Google Hong Kong (google.com.hk). Its servers in Hong Kong offer a search engine that has not been censored by mainland China.( https://zh.wikipedia.org/wiki/谷歌退出中国大陆事件#cite_note-28,注:是个wiki词条)<br />
===Apple: Compromise===<br />
2. Apple: compromise<br />
Under Chinese government's strict regulation of the Internet, Apple has taken many big compromises to stay at the Chinese market. <br />
(1) APPs<br />
Apple has made many adjustments to follow Chinese internet regulation. One of these adjustments is removing some apps from its “App Store” in Chinese version.<br />
In 2009, Apple removed apps mentioning the 14th Dalai Lama and Rebiya Kadeer from its App Store in mainland China.( Mozur, Paul. [https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html "Apple Removes Apps From China Store That Help Internet Users Evade Censorship."] The New York Times. Archived from the original 29 June 2017. Retrived from 16 April 2021 </ref> Sunshine Weekly, an independent current affairs magazine in Hong Kong, had an existing iPad app in mainland China in the past. Users in mainland could download and purchase this app freely to get some news about Hong Kong. However, in 2013, after Chinese authorities contacted with Apple, asking it to take this app off the “App Store”, the company did subsequently <ref> Guoxin Cao [https://www.rfi.fr/cn/中国/20130330-中国官方媒体轮番敲打苹果公司或与加强苹果app应用监管有关 "Chinese media criticizing Apple might have something to do with Apple enhancing App regulation"] Archived from the original on 30 March 2013. Retrived from 16 April 2021 </ref> In April 2013, the Daily Telegraph and the financial times reports that in order to "please" the mainland government, the Apple inc. removed an app Bookstore ("经典书城“)from its application market (“App Store”) in China. This app allows and the reader to see 10 books that has been banned by Chinese mainland government. <ref> Lance Whitney [https://www.cnet.com/news/apple-bans-chinese-bookstore-app-over-illegal-content/ "Apple bans Chinese bookstore app over 'illegal content'"] Archived from original on 07 April 2013. Retrived from 16 April 2021 </ref><br />
In 2016, Apple removed the New York Times app. The New York Times had been working on several stories about the Chinese government in the weeks leading up to the removal of the app. One, published on Dec. 29, revealed that the Chinese government has given the world's largest iPhone factory billions of dollars in the form of covert special treatment and subsidies. In another article, published on Dec. 22, the Times described an anti-Western Internet video that had been widely promoted by China's public security authorities. ( https://cn.nytimes.com/china/20170105/new-york-times-apps-apple-china/)</div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Technology_censorship_in_China&diff=102630Technology censorship in China2021-04-18T04:08:34Z<p>Timsun: </p>
<hr />
<div>Censored technology companies in China is a concept that talks about how Chinese government censor the Chinese technology companies and restrict the content they publish on their platforms. Chinese government . Typically, censorship is defined as the suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable or a threat to security.<ref name=dictionary> Oxford Dictionary [en.oxforddictionaries.com/definition/censorship " Definition of Censorship in English by Oxford Dictionaries"], Retrieved on 15 April 2021 </ref> As the rapid development of Internet technology, Chinese government has started to censor more massively and aggressively. The type of censorship varies from companies to companies but they are all done in order to prohibiting Chinese citizens from knowing and spreading information including but not limited to controversial events, reactionary speech, government actions, and violent and pornographic contents. For those companies that do not enter Chinese market or reject the censorship from Chinese government, they were blocked from Chinese Internet. The most notable blocking mechanism is known as “the Great Firewall”, with its name inspired by the historical architecture “the Great Wall”. In recent years, Chinese government is not satisfied with government censorship but requires individual technology companies to establish self-censorship mechanisms. <ref> Information Control and Self-Censorship in the PRC and the Spread of SARS [https://www.cecc.gov/publications/issue-papers/information-control-and-self-censorship-in-the-prc-and-the-spread-of-sars] </ref><br />
<br />
==Response of Censored tech companies==<br />
===Google:exit===<br />
In the face of China's strict Internet regulations, Google adopted a strong attitude of resistance, and finally exit Chinese market to resist the censorship from the Chinese government.<br />
On January 12, 2010, Google made a statement titled 'A new approach to China' on its official blog, stating that the company will consider canceling content censorship on Google.cn. <ref> Google. [https://googleblog.blogspot.com/2010/01/new-approach-to-china.html "A new approach to China"] 13 January 2010. Retrived from 15 April 2021 <\ref>Google claimed that its Gmail service was hacked by a "well-planned and targeted" attack from China in mid-December 2009, which resulted in the theft of intellectual property. The hackers focused on the e-mails of Chinese human rights activists(维权人士Gmail纷遭入侵[永久失效链接],明报,2010年1月15日). Mercury News reported that, although Google did not specify that the Chinese mainland government was responsible for the attack on the account, according to a person close to Google, Google engineers did trace the hackers to the Chinese government or its agents.( Google cyberattack from China reverberates around the world. Mercury News. 2010-01-13 [2010-01-14]. (原始内容存档于2012-01-13) (英语).)<br />
On March 23 of the same year, Google China announced that it decided to withdraw from the Chinese market due to "being attacked by Chinese hackers" and "network censorship". (关于谷歌中国的最新声明. Google官方网站. 2010-03-23 [2010-02-23]. (原始内容存档于2010-03-29))Google has redirected its search services from two existing Google China domains (google.cn and g.cn) to Google Hong Kong (google.com.hk). Its servers in Hong Kong offer a search engine that has not been censored by mainland China.( https://zh.wikipedia.org/wiki/谷歌退出中国大陆事件#cite_note-28,注:是个wiki词条)</div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Technology_censorship_in_China&diff=102629Technology censorship in China2021-04-18T03:45:36Z<p>Timsun: </p>
<hr />
<div>Censored technology companies in China is a concept that talks about how Chinese government censor the Chinese technology companies and restrict the content they publish on their platforms. Chinese government . Typically, censorship is defined as the suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable or a threat to security.<ref name=dictionary> Oxford Dictionary [en.oxforddictionaries.com/definition/censorship " Definition of Censorship in English by Oxford Dictionaries"], Retrieved on 15 April 2021</ref> As the rapid development of Internet technology, Chinese government has started to censor more massively and aggressively. The type of censorship varies from companies to companies but they are all done in order to prohibiting Chinese citizens from knowing and spreading information including but not limited to controversial events, reactionary speech, government actions, and violent and pornographic contents. For those companies that do not enter Chinese market or reject the censorship from Chinese government, they were blocked from Chinese Internet. The most notable blocking mechanism is known as “the Great Firewall”, with its name inspired by the historical architecture “the Great Wall”. In recent years, Chinese government is not satisfied with government censorship but requires individual technology companies to establish self-censorship mechanisms. <ref> Information Control and Self-Censorship in the PRC and the Spread of SARS [https://www.cecc.gov/publications/issue-papers/information-control-and-self-censorship-in-the-prc-and-the-spread-of-sars] </ref></div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Technology_censorship_in_China&diff=102628Technology censorship in China2021-04-18T03:44:46Z<p>Timsun: </p>
<hr />
<div>Censored technology companies in China is a concept that talks about how Chinese government censor the Chinese technology companies and restrict the content they publish on their platforms. Chinese government . Typically, censorship is defined as the suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable or a threat to security.<ref name=dictionary> Oxford Dictionary [en.oxforddictionaries.com/definition/censorship " Definition of Censorship in English by Oxford Dictionaries"]</ref> As the rapid development of Internet technology, Chinese government has started to censor more massively and aggressively. The type of censorship varies from companies to companies but they are all done in order to prohibiting Chinese citizens from knowing and spreading information including but not limited to controversial events, reactionary speech, government actions, and violent and pornographic contents. For those companies that do not enter Chinese market or reject the censorship from Chinese government, they were blocked from Chinese Internet. The most notable blocking mechanism is known as “the Great Firewall”, with its name inspired by the historical architecture “the Great Wall”. In recent years, Chinese government is not satisfied with government censorship but requires individual technology companies to establish self-censorship mechanisms. <ref> Information Control and Self-Censorship in the PRC and the Spread of SARS [https://www.cecc.gov/publications/issue-papers/information-control-and-self-censorship-in-the-prc-and-the-spread-of-sars] </ref></div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Technology_censorship_in_China&diff=102627Technology censorship in China2021-04-18T03:43:06Z<p>Timsun: </p>
<hr />
<div>Censored technology companies in China is a concept that talks about how Chinese government censor the Chinese technology companies and restrict the content they publish on their platforms. Chinese government . Typically, censorship is defined as the suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable or a threat to security.<ref> [en.oxforddictionaries.com/definition/censorship " Definition of Censorship in English by Oxford Dictionaries"]</ref> As the rapid development of Internet technology, Chinese government has started to censor more massively and aggressively. The type of censorship varies from companies to companies but they are all done in order to prohibiting Chinese citizens from knowing and spreading information including but not limited to controversial events, reactionary speech, government actions, and violent and pornographic contents. For those companies that do not enter Chinese market or reject the censorship from Chinese government, they were blocked from Chinese Internet. The most notable blocking mechanism is known as “the Great Firewall”, with its name inspired by the historical architecture “the Great Wall”. In recent years, Chinese government is not satisfied with government censorship but requires individual technology companies to establish self-censorship mechanisms. <ref> Information Control and Self-Censorship in the PRC and the Spread of SARS [https://www.cecc.gov/publications/issue-papers/information-control-and-self-censorship-in-the-prc-and-the-spread-of-sars] </ref></div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Technology_censorship_in_China&diff=102626Technology censorship in China2021-04-18T03:38:58Z<p>Timsun: Created page with "Censored technology companies in China is a concept that talks about how Chinese government censor the Chinese technology companies and restrict the content they publish on th..."</p>
<hr />
<div>Censored technology companies in China is a concept that talks about how Chinese government censor the Chinese technology companies and restrict the content they publish on their platforms. Chinese government . Typically, censorship is defined as the suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable or a threat to security.<ref> “Censorship | Definition of Censorship in English by Oxford Dictionaries.” [en.oxforddictionaries.com/definition/censorship]</ref> As the rapid development of Internet technology, Chinese government has started to censor more massively and aggressively. The type of censorship varies from companies to companies but they are all done in order to prohibiting Chinese citizens from knowing and spreading information including but not limited to controversial events, reactionary speech, government actions, and violent and pornographic contents. For those companies that do not enter Chinese market or reject the censorship from Chinese government, they were blocked from Chinese Internet. The most notable blocking mechanism is known as “the Great Firewall”, with its name inspired by the historical architecture “the Great Wall”. In recent years, Chinese government is not satisfied with government censorship but requires individual technology companies to establish self-censorship mechanisms. <ref> Information Control and Self-Censorship in the PRC and the Spread of SARS [https://www.cecc.gov/publications/issue-papers/information-control-and-self-censorship-in-the-prc-and-the-spread-of-sars] </ref></div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Topics&diff=102625Topics2021-04-18T03:27:56Z<p>Timsun: </p>
<hr />
<div>http://si410ethics11.projects.si.umich.edu/images/topics.png<br />
<br />
''Please add your newly created pages to this list in alphabetical order, and remember to surround with the appropriate MediaWiki syntax (i.e.:'' <nowiki>*[[your page]]</nowiki>'').''<br />
<br />
<br />
__NOTOC__<br />
<br />
<br />
== Blue Star Articles ==<br />
<br/><br />
*[[:Category:BlueStar2019|Blue Star Articles (2019)]]<br />
*[[:Category:BlueStar2018|Blue Star Articles (2018)]]<br />
*[[:Category:Blue Star|Blue Star Articles (2017)]]<br />
*[[:Category:GoldStar|Gold Star Articles (2010-2016)]]<br />
<br><br />
<br />
== List of New Articles in 2020 ==<br />
<br><br />
[[:Category:2020New|New Articles 2020]]<br />
*[[:Category:2020Concept|Concept]]<br />
*[[:Category:2020Person|Person]]<br />
*[[:Category:2020Object|Object]]<br />
<br><br />
<br />
== New Articles in 2019 ==<br />
<br><br />
[[:Category:2019New|New Articles 2019]]<br />
<br><br />
<br />
== John Walsh Thesis Revision ==<br />
<br/><br />
*[[John Walsh Thesis Revision]]<br />
<br />
== Portals and Class Writing Exercises ==<br />
<br><br />
*[[:Portal:Life on Digital Worlds|Life on Digital Worlds]]<br />
<br/><br />
<br />
== Categories ==<br />
<br><br />
{| style="width:400px;"<br />
! width="250"|Category<br />
! style="width:150px;text-align:center"|Number of Pages<br />
|-<br />
|[[:Category:Action Needed|Action Needed]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Action Needed}}<br />
|-<br />
|[[:Category:Censorship|Censorship]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Censorship}}<br />
|-<br />
|[[:Category:Citations Needed|Citations Needed]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Citations Needed}}<br />
|-<br />
|[[:Category:Computer Simulation|Computer Simulation]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Computer Simulation}}<br />
|-<br />
|[[:Category:Concepts|Concepts]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Concepts}}<br />
|-<br />
|[[:Category:Corporations|Corporations]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Corporations}}<br />
|-<br />
|[[:Category:Cyberpunk (genre)|Cyberpunk]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Cyberpunk (genre)}}<br />
|-<br />
|[[:Category:Hardware|Hardware]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Hardware}}<br />
|-<br />
|[[:Category:Information Ethics|Information Ethics]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Information Ethics}}<br />
|-<br />
|[[:Category:Internet slang|Internet Slang]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Internet slang}}<br />
|-<br />
|[[:Category:Malware|Malware]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Malware}}<br />
|-<br />
|[[:Category:Media Content|Media Content]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Media Content}}<br />
|-<br />
|[[:Category:Missing Information|Missing Information]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Missing Information}}<br />
|-<br />
|[[:Category:Music|Music]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Music}}<br />
|-<br />
|[[:Category:Open Source Projects|Open Source Projects]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Open Source Projects}}<br />
|-<br />
|[[:Category:Organizations|Organizations]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Organizations}}<br />
|-<br />
|[[:Category:Out of Date|Out of Date]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Out of Date}}<br />
|-<br />
|[[:Category:People|People]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:People}}<br />
|-<br />
|[[:Category:Piracy|Piracy]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Piracy}}<br />
|-<br />
|[[:Category:Politics|Politics]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Politics}}<br />
|-<br />
|[[:Category:Portals|Portals]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Portals}}<br />
|-<br />
|[[:Category:Privacy|Privacy]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Privacy}}<br />
|-<br />
|[[:Category:Services|Services]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Services}}<br />
|-<br />
|[[:Category:Social Networking|Social Networking]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Social Networking}}<br />
|-<br />
|[[:Category:Software|Software]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Software}}<br />
|-<br />
|[[:Category:Sports|Sports]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Sports}}<br />
|-<br />
|[[:Category:Video Games|Video Games]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Video Games}}<br />
|-<br />
|[[:Category:Virtual Environments, Concerns, & Issues|Virtual Environments]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Virtual Environments, Concerns, & Issues}}<br />
|-<br />
|[[:Category:Websites|Websites]]<br />
|style="text-align:center"| {{PAGESINCATEGORY:Websites}}<br />
|}<br />
<br><br />
<br />
== Topics ==<br />
<br><br />
{{Section-Menu}}<br />
{{Section|||1}}<br />
=== # ===<br />
----<br />
*[[3D printing]]<br />
*[[4chan]]<br />
*[[4shared]]<br />
*[[8tracks]]<br />
*[[9GAG]]<br />
<br />
=== A ===<br />
----<br />
*[[Aaron Swartz]]<br />
*[[Accelerationism]]<br />
*[[Adblocking]]<br />
*[[Adobe Inc.]]<br />
*[[AdverGaming]]<br />
*[[Advertising ethics online]]<br />
*[[Aging In Place Technology]]<br />
*[[Airbnb]]<br />
*[[Alex Jones]]<br />
*[[Algorithmic Justice League]]<br />
*[[Algorithmic Audits]]<br />
*[[Algorithms]]<br />
*[[Amazon Alexa (Amazon Echo)]]<br />
*[[Amazon.com]]<br />
*[[Ancestry data]]<br />
*''the'' [[The Amy Boyer Case|Amy Boyer Case]]<br />
*[[Android]]<br />
*[[Angry Birds]]<br />
*''Anonymous''<br />
**[[Anonymous Behavior in Virtual Environments|Behavior in Virtual Environment]]<br />
**[[Anonymous (group)|Group]]<br />
*[[Apex Legends (game)]]<br />
*[[Applicant tracking systems]]<br />
*[[Artificial Agents]]<br />
*[[Artificial Intelligence and Technology]]<br />
*[[Artificial Intelligence in China]]<br />
*[[Artificial Intelligence in the Music Industry]]<br />
*[[Artificial SuperIntelligence]]<br />
*[[Ashley Madison (website)]]<br />
*[[Ask.fm]]<br />
*[[Assassin's Creed (Main Series)]]<br />
*[[Athletes and burner accounts]]<br />
*[[Augmented Reality]]<br />
*[[Automatic gender recognition]]<br />
*[[Automated Decision Making in Child Protection]]<br />
*[[Autonomous Systems]]<br />
*[[Autonomous Vehicles]]<br />
*[[Avatar]]<br />
<br />
=== B ===<br />
----<br />
*[[Baidu]]<br />
*[[Banality of Simulated Evil]]<br />
*[[Bandcamp]]<br />
*[[Bartle Test]]<br />
*[[Battlestar Galactica (2004 TV Series)]]<br />
*[[Behavioral biometrics]]<br />
*[[Bias in Information]]<br />
*[[Biem App]]<br />
*[[Big Data analytics for personalized medicine]]<br />
*[[The Big Four]]<br />
*[[Binge Watching]]<br />
*[[Biobanking]]<br />
*[[BioShock]]<br />
*[[BioWare]]<br />
*[[Bitcoins]]<br />
*[[Bitmoji]]<br />
*[[BitTorrent]]<br />
*[[Black Mirror]]<br />
*[[Black Twitter]]<br />
*[[Bliss]]<br />
*[[Blizzard Entertainment]]<br />
*[[Blockchain]]<br />
*[[Borderlands (video game series)]]<br />
*[[Brain-Machine Interface]]<br />
*[[Brain-to-Brain Interface]]<br />
*[[Brave Browser]]<br />
*[[Brawl Stars]]<br />
*[[Bumble]]<br />
*[[BuzzFeed]]<br />
<br />
=== C ===<br />
----<br />
*[[Call of Duty]]<br />
*[[Cambridge Analytica]]<br />
*[[Cancel Culture]]<br />
*[[Canvas]]<br />
*[[Carrier IQ]]<br />
*[[CD Projekt]]<br />
*[[CEIU Thesis]]<br />
*[[Censorship]]<br />
*[[Censorship in China]]<br />
*[[Censorship in Turkey]]<br />
*[[CGI Influencers]]<br />
*[[Chamath Palihapitiya]]<br />
*[[Chatroulette]]<br />
*[[Cheating]]<br />
*[[Cheating in eSports]]<br />
*[[Cheating Technologies]]<br />
*[[Children's Online Privacy Protection Act (COPPA)]]<br />
*[[Circuit of Culture]]<br />
*[[Circumventing Internet Censorship]]<br />
*[[Citizendium]]<br />
*[[Civilization]]<br />
*[[Clash of Clans]]<br />
*[[Clearview AI]]<br />
*[[Click fraud]]<br />
*[[Clickbait]]<br />
*''Cloud''<br />
**[[Cloud Computing|Computing]]<br />
**[[Cloud Security|Security]]<br />
*[[Clubhouse]]<br />
*[[Clueful Chatting]]<br />
*[[Cookies]]<br />
*[[Complex]]<br />
*[[Computer Vision]]<br />
*[[Confidentiality of Online Data]]<br />
*[[Content moderation]]<br />
*[[Content moderation in Twitter]]<br />
*[[Content moderation in Reddit]]<br />
*[[Counter-Strike: Global Offensive (video game)]]<br />
*[[COVID-19 Data Privacy]]<br />
*[[Craigslist]]<br />
*[[Creative Commons]]<br />
*[[Criminal sentencing software]]<br />
*[[Crowdsourcing]]<br />
*[[Cryptocurrency]]<br />
*''Cyber (overlaps with Online)''{{Relation||Internet|#Internet}} {{Relation||Virtual|#Virtual}}<br />
**[[Cyberbullying|Bullying]] {{Relation|cases of|David Thorne|#D}}<br />
**[[Cybercurrency|Currency]]<br />
**[[Cyberlaw|Law]]<br />
**[[Cyberpunk 2077 (videogame)]]<br />
**[[Cybersex|Sex]]<br />
***''Sex in'' [[Online Dating#Sex|Online Dating]]<br />
**[[Cybersecurity]]<br />
**[[Cyberstalking|Stalking]] {{Relation|use of crowdsourcing|Human Flesh Search|#H}} {{Relation||Tiayna.cn|#T}} {{Relation|cases of|Amy Boyer|#A}}<br />
**[[Cyberwarfare|Warfare]]<br />
*[[Cybersecurity in Banking]]<br />
<br />
=== D ===<br />
----<br />
*[[Daily Fantasy Sports]]<br />
*[[Dark Patterns]]<br />
*[[Dark Web]]<br />
*''Data (overlaps with Information)''<br />
**[[Data Aggregation Online|Aggregation Online]]<br />
**[[Data Mining|Mining]]<br />
*[[Deontology]] <br />
*[[Data brokers]]<br />
*[[Datafication of Children]]<br />
*[[Dating Apps]]<br />
*[[Digital Marketing]]<br />
*[[David Thorne]]<br />
*[[Da Vinci Surgical System]]<br />
*[[Deepfake]]<br />
*[[Deepfake Detectors]]<br />
*[[Defcon (video game)]]<br />
*[[Depop]]<br />
*[[Detroit: Become Human]]<br />
*[[Deus Ex (Series)]]<br />
**[[Deus Ex: Human Revolution]]<br />
*[[Device implant]]<br />
*[[Diablo (Franchise)]]<br />
**[[Diablo II]]<br />
**[[Diablo III]]<br />
*[[Diaspora]]<br />
*''Digital''<br />
**[[Digital Property|Property]]<br />
*[[Digital_divide]]<br />
**[[Digital DJing|DJing]]<br />
**[[Digital Piracy|Piracy]]<br />
**[[Digital Rights Management|Rights Management]]<br />
*[[Disclosive Ethics]]<br />
*[[Disinformation of the COVID-19 Pandemic]]<br />
*[[DoorDash]]<br />
*[[DNA Testing]]<br />
*[[Domain Name System]]<br />
*[[Downloadable Content in Video Games]]<br />
*[[Dragonfly]]<br />
*[[Drones]]<br />
*[[Dropbox]]<br />
*[[Drupal]]<br />
*[[Duke F*** List]]<br />
<br />
=== E ===<br />
----<br />
*[[eBay]]<br />
*[[Echo Chambers]]<br />
*[[Edward Castronova]]<br />
*[[Edward H. Spence]]<br />
*[[Edward Snowden]]<br />
*[[Effective Altruism]]<br />
*[[Elder Scrolls]]<br />
*[[Electronic Arts]]<br />
*[[Electric Sheep]]<br />
*[[Electronic voting systems]]<br />
*''Electronic''<br />
**[[Electronic Health Records|Health Records]]<br />
**[[Electronic Sports|Sports]]<br />
*[[Elizabeth Holmes]]<br />
*[[Elon Musk]]<br />
*[[Empathy in Gaming]]<br />
*[[Emoji]]<br />
*[[Employers and Online Privacy]]<br />
*[[The Entire History of You]]<br />
*''Ethics''<br />
**''and'' [[Data Equity]]<br />
**''in'' [[Ethics in Computer & Video Games|Computer & Video Games]]<br />
**''in'' [[Ethics in Hacking|Hacking]]<br />
**''of'' [[Information Ethics|Information]]<br />
**''of'' [[Ethics of Advertising to Children & Teens|Advertising to Children & Teens]]<br />
**''of'' [[Ethics of Drone Warfare|Drone Warfare]]<br />
<br />
*[[Ethical game design]]<br />
*[[Etsy]]<br />
*[[Ex Machina (2014)]]<br />
*[[Experience Project]]<br />
<br />
=== F ===<br />
----<br />
*''Facebook''<br />
**[[Advertising on Facebook]]<br />
**[[Facebook|Company]]<br />
**[[Facebook Messenger]]<br />
**[[Facebook newsfeed curation]]<br />
**[[Facebook Privacy Policy|Privacy Policy]]<br />
**[[Data Mining and Manipulation]]<br />
**[[Facebook in Africa]]<br />
**[[Political Censorship]]<br />
*[[FaceTime]]<br />
*[[Face recognition]]<br />
*[[Face recognition in law enforcement]]<br />
*[[Fake News]]<br />
*[[Fallout 76]]<br />
*[[Fan fiction]]<br />
*[[Fast Fashion]]<br />
*[[Find My Friends]]<br />
*[[File Sharing]]<br />
*[[Filter Bubble]]<br />
*[[Final Fantasy XIV]]<br />
*[[Fitness Influencers]]<br />
*[[Fitness Game]]<br />
*[[First Person Shooters]]<br />
*[[Flaming]]<br />
*[[Flash]]<br />
*[[Free Basics]]<br />
*[[Freedom of Expression]]<br />
*[[Freemium model]]<br />
<br />
=== G ===<br />
----<br />
*[[Galaxy S3]]<br />
*[[Game Addiction]]<br />
*[[Gamergate]]<br />
*[[Gattaca]]<br />
*[[Gender bias in the Online Job Search]]<br />
*[[Gender bias in Wikipedia]]<br />
*[[Gender in Video Games]]<br />
*[[Genealogy platforms]]<br />
*[[General Data Protection Regulation]]<br />
*[[Generative Media]]<br />
*[[Genetically Modified Food]]<br />
*[[Gene Editing]]<br />
*[[Genomics]]<br />
*[[Genovese Syndrome]]<br />
*[[Genshin Impact]]<br />
*[[Geographic Information Systems]]<br />
*[[George Hotz]]<br />
*[[Ghost Writing Online]]<br />
*[[Girls Around Me]]<br />
*[[GLANSER]]<br />
*[[GoFundMe]]<br />
*''Google''<br />
**[[Google|Company]]<br />
**[[Google Books|Books]]<br />
**[[Google Glass| Google Glass]]<br />
**[[Google Home]]<br />
**[[Google Clips]]<br />
**[[Google Street View|Street View]]<br />
**[[Google Photos]]<br />
*[[Grand Theft Auto IV]]<br />
*[[Grand Theft Auto V]]<br />
*[[Griefing]]<br />
*[[Grindr]]<br />
*[[GroupMe]]<br />
<br />
=== H ===<br />
----<br />
*[[Hackers]]<br />
*[[Hacking the 2016 US Presidential Election]]<br />
*[[Healthcare Data Monetization]]<br />
*[[Health Informatics]]<br />
*[[Her (film) (2013)]]<br />
*[[Her Interactive]]<br />
*[[Herman Tavani]]<br />
*[[High Frequency Trading]]<br />
*[[Hinge]]<br />
*[[HireVue]]<br />
*[[Hulu]]<br />
*[[Human Flesh Search]] {{Relation|related to|Tianya.cn|#T}}<br />
*[[Human Microchipping]]<br />
*[["Human out of the Loop" Military Systems]]<br />
*[[Human Trafficking]]<br />
*[[Humans (British TV Series)]]<br />
<br />
=== I ===<br />
----<br />
*[[iCloud]]<br />
*[[id Software]]<br />
*[[Illegal/Unauthorized Streaming]]<br />
*[[Illegal Sports Streams]]<br />
*[[Imgur]]<br />
*[[In-app purchases]]<br />
*[[Infamous (series)]]<br />
*[[Influencer Marketing]]<br />
*[[Infoglut]]<br />
*[[Informatics]]<br />
*''Information'' {{Relation|overlaps with|Data|#Data}}<br />
**[[Information Ethics|Ethics]]<br />
**[[Information Freedom|Freedom]]<br />
**[[Freedom_of_Information_policies|Freedom of Information Policy]] <br />
**[[Information Overload|Overload]]<br />
**[[Information Reliability|Reliability]]<br />
**[[Information Security|Security]]<br />
**[[Information Transparency|Transparency]]<br />
**[[Information Vandalism|Vandalism]]<br />
*[[Informational Friction]]<br />
*[[Infosphere]]<br />
*[[Instagram]]<br />
*[[Instagram Ads]]<br />
*[[Intellectual Property]]<br />
*[[Internet of things]]<br />
*''Internet'' {{Relation|overlaps with|Cyber|#Cyber}} {{Relation||Online|#Online}} {{Relation||Virtual|#Virtual}}<br />
**[[Internet Archive|Archive]]<br />
**[[Internet Censorship in Hong Kong|Censorship in Hong Kong]]<br />
**[[Internet Censorship in South Korea|Censorship in South Korea]]<br />
**[[Internet Censorship in the United Kingdom|Censorship in the United Kingdom]]<br />
**[[Cybersecurity Law in Vietnam|Censorship in Vietnam]]<br />
**''in'' [[Circumventing Internet Censorship|Circumventing Censorship]]<br />
**[[Internet Control|Control]]<br />
**[[Internet meme|Meme]]<br />
*[[Iris Recognition]]<br />
<br />
=== J ===<br />
----<br />
*[[Jack Dorsey]]<br />
*[[Jailbreaking]]<br />
*[[James H. Moor]]<br />
*[[Jeremy Bentham]]<br />
*[[John Weckert]]<br />
*[[Julian Dibbell]]<br />
*[[Jurassic Park (1993)]]<br />
*[[Just another mediawiki page]]<br />
<br />
=== K ===<br />
----<br />
*[[Kathleen Wallace]]<br />
*[[Kay Mathiesen]]<br />
*[[Kim Dotcom]]<br />
*[[Kickstarter]]<br />
*[[Kind of Bloop]]<br />
*[[Klarna]]<br />
<br />
=== L ===<br />
----<br />
*[[LambdaMOO]]<br />
*[[Larry Ellison]]<br />
*[[Lawrence Lessig]]<br />
*[[League of Legends]]<br />
*[[The League (Dating App)]]<br />
*[[Libraries and Ethical Information Technology]]<br />
*[[LikeALittle]]<br />
*[[Limewire]]<br />
*[[Line (Application)]]<br />
*[[LinkedIn]]<br />
*[[Linus Torvalds]]<br />
*[[Live Video]]<br />
*[[Location targeted advertising]]<br />
*[[Lookbook.nu]]<br />
*[[Loot Box]]<br />
*[[Love Plus]]<br />
*[[Low Orbit Ion Cannon]]<br />
*[[Luciano Floridi]]<br />
*[[Lyft]]<br />
<br />
=== M ===<br />
----<br />
*[[Machine learning in healthcare]]<br />
*[[macOS]]<br />
*[[MagicBands]]<br />
*[[Major League Baseball]]<br />
*[[Manhunt]]<br />
*[[MapleStory]]<br />
*[[Mark Zuckerberg]]<br />
*[[Mashup]]<br />
*[[Mass Effect]]<br />
*''the'' [[The Matrix|Matrix]]<br />
*[[Internet meme|Meme]]<br />
*[[Mechanical Turk]]<br />
*[[Megaupload]]<br />
*[[Metadata]]<br />
*[[Metal Gear Solid]]<br />
*[[Mia Consalvo]]<br />
*[[Michael Kearns]]<br />
*[[Microsoft]]<br />
*[[Microsoft chatbots]]<br />
*[[Microtransactions]]<br />
*[[Miguel Sicart]]<br />
*[[Military Entertainment Complex]]<br />
*[[Minecraft]]<br />
*[[Mirai Botnet]]<br />
*[[Misinformation]]<br />
*[[MMORPGs]]<br />
*[[Mods]]<br />
*[[MOOC (Massive Open Online Courses)]]<br />
*[[Moore's Law]]<br />
*[[Morris Worm]]<br />
*[[Mortal Kombat]]<br />
*[[Mr. Robot]]<br />
*[[Music piracy]]<br />
*[[MuslimPro]]<br />
*[[Myanmar Social Media Blackout]]<br />
*[[Myspace]]<br />
<br />
=== N ===<br />
----<br />
*[[Naughty Dog]]<br />
*[[Napster]]<br />
*[[National Security Agency]]<br />
*[[NBA Top Shot]]<br />
*[[NSA Cryptography]]<br />
*[[NCAA Football (Video Game Series)]]<br />
*[[Need For Speed (Video Game Series)]]<br />
*[[Nest Thermostat]]<br />
*[[Net neutrality]]<br />
*[[Netflix]]<br />
*[[Nextdoor]]<br />
*[[NFT Art]]<br />
*[[Norbert Wiener]]<br />
*[[Nosedive, Black Mirror]]<br />
*[[Nymwars]]<br />
<br />
=== O ===<br />
----<br />
*[[OK The Pirate Bay]]<br />
*[[Omegle]]<br />
*[[One America News Network (OANN)]]<br />
*''Online'' {{Relation|overlaps with|Cyber|#Cyber}} {{Relation||Internet|#Internet}} {{Relation||Virtual|#Virtual}}<br />
**[[Cyberbullying|Bullying]] ''in Cyberspace''<br />
**[[Online Cheating|Cheating]]<br />
**[[Online Dating|Dating]]<br />
***[[Online Dating - Catfishing Edition|Catfishing]]<br />
**[[Online Gambling|Gambling]]<br />
**[[Online Identity|Identity]]<br />
**[[Online Identity Theft|Identity Theft]]<br />
**[[Libel Online|Libel]]<br />
**[[Online Poker]]<br />
**[[Online Reputation Systems|Reputation Systems]]<br />
**''Sex in'' [[Online Dating#Sex|Online Dating]]<br />
**[[Online shopping|Shopping]]<br />
**[[Cyberstalking|Stalking]] ''in CyberSpace''<br />
*[[Old School Runescape]]<br />
*[[The Open Internet|Open Internet]]<br />
*[[Onavo]]<br />
*[[OnlyFans]]<br />
*[[OnStar]]<br />
*[[OpenAi]]<br />
*[[Orwell (Video Game)]]<br />
*[[Overwatch]]<br />
*[[Open Source Software]]<br />
<br />
=== P ===<br />
----<br />
*[[Palantir Technologies]]<br />
*[[Pandora]]<br />
*[[Parasocial Relationship]]<br />
*[[PARO Therapeutic Robot]]<br />
*[[Parody]]<br />
*[[Parler]]<br />
*[[Patents]]<br />
*[[Patent Rights]]<br />
*[[PayDay 2]]<br />
*[[PayPal]]<br />
*[[Periscope]]<br />
*[[Peter Thiel]]<br />
*[[Philip Brey]]<br />
*''Photo'' {{Relation|issues of|Digital Photography|#D}}<br />
**[[Photo Editing|Editing]]<br />
**[[Phototruth|Truth]]<br />
*[[Pinterest]]<br />
*[[The Pirate Bay|Pirate Bay]]<br />
*[[Plagiarism]]<br />
*[[PlayerUnknown's Battlegrounds]]<br />
*[[PlayStation Party Recording]]<br />
*[[Pokémon Go]]<br />
*[[PokerStars]]<br />
*[[Pornography]]<br />
*[[Portal 2]]<br />
*[[Postal 2]]<br />
*[[Prank YouTubers]]<br />
*[[Predictive Analytics]]<br />
*[[Predictive Policing]]<br />
*''Privacy''<br />
**[[Facebook Privacy Policy|Facebook Policy]]<br />
**''in'' [[Privacy in the China|China]]<br />
**''in'' [[Privacy in the Online Environment|Online Enviornment]]<br />
**''in'' [[Privacy in Social Networking|Social Networking]]<br />
**''in'' [[Privacy in public]]<br />
**[[Privacy Policies at Apple Inc.|Apple Policy]]<br />
*[[Privacy in Venmo]]<br />
*[[Privacy in the China]]<br />
*[[Pro-Ana Forums]]<br />
*[[Protect IP Act]]<br />
*[[Proxy Culture]]<br />
*[[Public Morality]]<br />
*[[The Punisher]]<br />
*[[Punishments in Virtual Environments]]<br />
<br />
===Q ===<br />
-----<br />
*[[QR Codes]]<br />
*[[Quora]]<br />
*[[Quantified Self Movement]]<br />
*[[Quantum Computing]]<br />
=== R ===<br />
----<br />
*[[Racial Algorithmic Bias]]<br />
*[[Racism in Video Games]]<br />
*[[Radio-frequency Identification]]<br />
*[[Ransomware]]<br />
*[[Raph Koster]]<br />
*[[Ray Kurzweil]]<br />
*[[Real Fake Page]]<br />
*[[Real Money Trade]]<br />
*[[Recommender Systems]]<br />
*[[Reddit]]<br />
**[[/r/AmITheAsshole]]<br />
**[[/r/wallstreetbets]]<br />
**[[/r/2meirl4meirl]]<br />
*[[Reid Hoffman]]<br />
*[[Remote Access]]<br />
*[[Renren]]<br />
*[[Revenge Porn]]<br />
*[[Richard Stallman]]<br />
*[[Right to be Forgotten]]<br />
*[[RIP Trolling]]<br />
*[[Rockmelt]]<br />
*[[Role of Parents in Internet Censorship]]<br />
*[[Rumble Fighter]]<br />
<br />
=== S ===<br />
------<br />
*[[Sampling (hip hop)]]<br />
*[[Self Driving Cars]]<br />
*[[Sergey Aleynikov]]<br />
*[[Serious Games]]<br />
*[[Senior Citizens]]<br />
*[[Sexting]]<br />
*[[Sharing Subscription Services]]<br />
*''Sims''<br />
**[[The Sims 3|The Sims 3]]<br />
**[[The Sims Online|The Sims Online]]<br />
**[[The Sims 4|The Sims 4]]<br />
*[[SingularityNet]]<br />
*[[Slack (Application)]]<br />
*[[Smart Doorbell]]<br />
*[[Smart Home]]<br />
*[[Smartphones (Location Services)]]<br />
*[[SNAP and Other Federal Nutrition Programs]]<br />
*[[Soccer & FIFA]]<br />
*[[Social Credit System]]<br />
*''Social''<br />
**[[Social Media in Sports|Media in Sports]]<br />
**[[Social media in national elections (2016)]]<br />
**[[Social Networking|Networking]]<br />
**[[Social Networking Services|Networking Services]] {{Relation|for sites|Facebook|Facebook}} {{Relation||Tianya.cn|Tianya.cn}} {{Relation||Twitter|Twitter}} {{Relation||Tumblr|Tumblr}}<br />
**[[Social Media (Meta)|Media (Meta)]]<br />
*[[Social Media and Depression]]<br />
*[[Social media and the 2020 US presidential election]]<br />
*[[Social Media Websites in Investigations]]<br />
*[[Solar Winds Hack]]<br />
* [[Sousveillance]]<br />
*[[Snapchat]]<br />
*[[Spam]]<br />
*[[Spoof]]<br />
*[[Spotify]]<br />
*[[Spycams in South Korea]]<br />
*[[Starcraft II]]<br />
*[[Statistical Modeling]]<br />
*[[Steam]]<br />
*[[Steve Jobs]]<br />
*[[Stop Online Piracy Act]]<br />
*[[Student-Athlete Social Media Monitoring]]<br />
*[[StumbleUpon]]<br />
*[[Stuxnet Trojan]] {{Relation|type of|Worm|#W}} {{Relation|utilizes|Rootkit|#R}}<br />
*[[Suits]]<br />
*[[Super Smash Bros. Ultimate]]<br />
*[[Surveillance Capitalism]]<br />
*[[Surveillance in China]]<br />
*[[Surveillance Technologies]]<br />
*[[Sword Art Online]]<br />
<br />
=== T ===<br />
------<br />
*[[Targeted Advertising (Online)]]<br />
*[[Team Fortress 2]]<br />
*[[Technological Determinism]]<br />
*[[Technological Singularity]]<br />
*[[Technology in Baseball]]<br />
*[[Technology censorship in China]]<br />
*[[Telepresence]]<br />
*[[Tencent]]<br />
*[[Tesla, Inc.]]<br />
*[[Testimonials]]<br />
*[[The Truman Show]]<br />
*[[The Internet's Footprint]]<br />
*[[Thomas M. Powers]]<br />
*[[Tianya.cn]]<br />
*[[TikTok]]<br />
*[[TikTok Subcultures]]<br />
*[[Tim Berners-Lee]]<br />
*[[Tinder]]<br />
*[[Tor]]<br />
*[[Touch ID]]<br />
*[[Transhumanism]]<br />
*[[Transparency in software development]]<br />
*[[Tristan Harris]]<br />
*[[Trustworthiness of information]]<br />
*[[Troll]]<br />
*[[Tumblr]]<br />
*[[Twitter]]<br />
*[[Twitch.tv]]<br />
<br />
=== U ===<br />
----<br />
*[[Uber]]<br />
*[[Ubiquitous Computing]]<br />
*[[Unabomber Manifesto]]<br />
*[[Uniqueness Debate]]<br />
*[[Undertale]]<br />
*[[Utilitarian Philosophy]]<br />
<br />
=== V ===<br />
----<br />
*[[Valorant]]<br />
*[[Valve]]<br />
*[[Value Sensitive Design]]<br />
*[[Venmo]]<br />
*''Virtual'' {{Relation|overlaps with|Cyber|#Cyber}} {{Relation||Internet|#Internet}} {{Relation||Online|#Online}}<br />
**[[Virtual Assistants]]<br />
**''Bullying in'' [[Cyberbullying|Cyberspace]]<br />
**[[Virtual Child Pornography|Child Pornography]]<br />
**[[Virtual Community|Community]]<br />
**[[Virtual Crimes and Punishments|Crimes and Punishments]]<br />
** ''Dating ''[[Online Dating#Virtual_Dating|Online]]<br />
**[[Virtual Dating Simulations|Dating Simulations]]<br />
**[[Virtual Environment|Environment]]<br />
**[[Punishments in Virtual Environments|Punishment]]<br />
**[[Virtual Private Network|Private Network]]<br />
**[[Virtual Rape|Rape]]<br />
**''Sex in'' [[Cybersex|Cyberspace]]<br />
**''Stalking in'' [[Cyberstalking|Cyberspace]]<br />
*[[Virtual sweatshops]]<br />
*[[Violence and video games]]<br />
*[[Violence in Video Games]]<br />
*[[Virtual Magic Kingdom]]<br />
*[[Virtual Private Network (VPN)]]<br />
*[[Virtual Reality and Computer Simulations]]<br />
*[[Virtual Reality in Prison]]<br />
*[[Video Surveillance]]<br />
*[[Voice imitation algorithms]]<br />
*[[Vlogging]]<br />
*[[Vuze]]<br />
<br />
=== W ===<br />
----<br />
*[[Warcraft III]]<br />
*[[Watch Dogs]]<br />
*[[Watson (computer)]]<br />
*[[Wattpad]]<br />
*[[Waze]]<br />
*[[Wearable health tech]]<br />
*[[Web 2.0]]<br />
*[[Web Applications]]<br />
*[[Webcams]]<br />
*[[Webtoon App]]<br />
*[[WeChat]]<br />
**[[Misinformation on WeChat]]<br />
*[[Weibo]]<br />
*[[Westworld and AI]]<br />
*[[WhatsApp]]<br />
*[[Whisper]]<br />
*[[Wii U]]<br />
*[[WikiLeaks]]<br />
*[[Wikipedia]]<br />
**[[Wikipedia Bots|Bots]]<br />
**[[Gender bias in Wikipedia]]<br />
*[[Witcher 3: Wild Hunt]]<br />
*[[Women in Gaming]]<br />
*[[World of Warcraft]]<br />
<br />
=== X ===<br />
----<br />
*[[The X-Files]]<br />
*[[Xkcd]]<br />
<br />
<br />
=== Y ===<br />
----<br />
*[[Yelp Reviewing]]<br />
*[[Yik Yak]]<br />
*''YouTube''<br />
**[[YouTube|YouTube (Website)]]<br />
**[[YouTube Beauty Community|Beauty Community]]<br />
**[[YouTube recommendation algorithm]]<br />
<br />
=== Z ===<br />
----<br />
*[[Zoom]]<br />
*[[Zynga]]</div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Zhiyuan_Sun&diff=97379Zhiyuan Sun2021-03-13T14:24:33Z<p>Timsun: </p>
<hr />
<div>Zhiyuan Sun<br />
<br />
These days, thanks to the fast development of Information and Communication Technology (ICT), we get easier access to more extensive and timely information and are able to communicate with each other more conveniently and efficiently. Media like Facebook and Twitter become hot platforms where people can share their daily fun and express their emotions freely, while apps like Instant Checkmate gains lots of fans due to their high efficiency of information searching. However, when we are immersed in this fascinating world created by high-level technology, we should also pay attention to the potential risks that the ICT has. In the following paragraphs, I will take the experience of searching myself on the internet as an example, to illustrate my concern about this booming technology.<br />
<br />
==Name searching in Engines==<br />
[[File:Zhiyuan_Sun.png|thumbnail|right|Search results of Zhiyuan Sun]]<br />
My name is '孙志远', and I tried to search my name in several different search engines including Google and Baidu (a popular search engine in China). Both of these engines are widely used and famous for their enormous information bases. I expected to find some interesting and special information about myself, but none of the search results were very satisfactory. The information that search engines gave me is mainly about a patriotic hero who shares the same name as me. There are also many lawyers, businessmen who are named ‘孙志远’, but none of them are related to me. <br />
After adding constraints like the name of the high school I attended, the result became more accurate. One of the results presented the information of my high school admission with detailed time and accurate middle and high schools’ names. I felt surprised about it because I had completely forgotten the date that I received the high school offers. This surprising result encouraged me to change other constraints like the Twitter account. Sadly, the result turned back into inaccurate again. <br />
<br />
===Reflections on search results===<br />
After deeply looking into this name searching period, I find the search result is reasonable. <br />
To begin with, the common appearance of the name ‘孙志远’ in China contributes to the high probability of my sharing name with those famous people. My family name '孙' ranks third in the Book of Family Names, which is one of the most important Chinese Classics recording some common family names in Chinese history. Obviously, ‘孙’ is not a rare family name. What’s more, my second name ‘志远’ means having lofty ambition in Chinese. Parents always attach high expectations on children’s future development, so ‘志远’ is also a common second name expressing parents’ best wishes for their children. All these factors make the rate of people named ‘孙志远’ very high. <br />
Secondly, search engines always list results of the same information by their searched time. Most results about ‘孙志远’ are information of people with a huge contribution to society or successful careers. On the other hand, my life experience seems to be mediocre. When I was a child, I was too busy with my studying to spare time to do some extracurricular activities with broad influence. At the same time, I seldom participated in competitions, so I also lost some chances to become famous by winning prizes. Therefore, search results are information about those ‘孙志远’ with a high level of social focus instead of me.<br />
Moreover, different relevancies of different constraints are because those constraints have distinguishing importance. After reflecting on my past life, I recall that I was admitted through a special examination other than the centralization examination to high school (a.k.a. Zhongkao). This special examination benefits some students well because it will reduce their pressure to a large extend. Many students attended this examination and it gained a high level of focus. Thus, my high school should conduct this examination fairly and post the final result to the public. These constraints are important because it’s a special experience for me which also has attracted a lot of attention. However, the constraints like Twitter account are almost meaningless. Although I have accounted for many mainstream social media both in China and internationally, and also enjoy using or even deeply immersing into social media to stay in touch and socializing with others, I seldom post my own life on it. As a result, I haven’t gained some uniqueness on those social media which may set me apart from others. <br />
<br />
==Instant Checkmate==<br />
To get more information about myself through the Internet, I try to look for some efficient apps. I noticed that almost all examples from previous years mentioned an app called Instant Checkmate, an online personal information search website. <br />
===potential risk in legitimacy===<br />
I tried to search myself on the Instant Check, but it failed because it only works for people in the United States. When I first heard about such a website that gives you all personal information with just one click, I was both curious and scared. I was scared because I was worried about its legitimacy and ethicality. Unfortunately, such a website is indeed legitimate because it only gathers information from another website. However, along with the convenience it brings to us, there is also serious potential risk. The information can be accessed too easily, with merely several clicks and a simple consent of not using information for illegal activities, which has no binding on one's behavior and no penalty for illegal use. You will never know how the viewer of your information uses it, and it may hurt your privacy security. <br />
===illegitimacy and inequality===<br />
Although I did not find myself on the website, my curiosity drives me to search several celebrities on it. The results of some celebrities’ information are very accurate, while for some celebrities, I cannot find anything of them on this app. This makes me think of two things. <br />
First, is the privacy of the celebrities with lots of information on this app being threatened? Although the website is just an aggregation of information, it does lower the threshold for people to attain the information. Much information normally hidden deeply in a corner of the Internet before is now exposed into people's eyes straightforwardly. For example, if a celebrity's personal number is shown on the website, will he or she be continuously harassed by his fans or haters? <br />
Second, is there any unfairness when treating celebrities and ordinary people like you and me? The reason for failing to find some celebrities is probably because the website either creates a block list for certain people or the celebrities hire their legal teams to deal with such issues. Is there unfairness behind this? When it comes to private security, should celebrities be treated differently just because of their identities? <br />
===Such websites are not allowed in China===<br />
I also tried to find the counterpart applications in China to see if things work out, but I only find apps that have limited access to criminal and credit records. This phenomenon reflects that the Chinese government has attached many importances to the protection of privacy and security. Such apps that reveal full personal information have been prohibited since 2013. According to BBC News, several violent flesh search events have given rise to this prohibition. In early 2013, a shopkeeper posted a security camera screenshot, claiming the girl in the screenshot to be a thief and asking others to conduct a flesh search. Soon, the girl's name, school, and address were exposed to the public. Through these pieces of information, many people criticize this girl directly, even abuse her severely with rude words. Finally, this girl suicided under huge pressure while later proved to be innocent. The Chinese government took action to prohibit flesh search and also the information search apps that accelerate this process. I know China has long been criticized for its abuse of private information and lack of action in privacy protection, which I do not deny, but at least in this issue, China has done a laudable and fruitful job. At least, when I was in China, I never received a spam call in the mid of the night claiming that I was involved in criminal activity and had to transfer all my money into a certain account for protection. <br />
<br />
==Social Media Use==<br />
After knowing the importance of personal information security, I try to think deeply about the potential risk of my privacy security. <br />
===Risk on Facebook, Twitter, Instagram’ accounts===<br />
For international social media, I use Facebook, Twitter, Instagram, and LinkedIn. However, except for LinkedIn, I only view others' content on other international social media. After hearing many tragedies caused by personal information security problems, I learned to protect myself by not using my real name on them. Therefore, unless I append my social media account after my name, I cannot search for any result about myself. The goodness is that it is very hard for others to associate these accounts with me directly. However, if they can trace back to the email address used when I registered these accounts, it would be easy for them to identify my identity, since I used the same email address that contains my real name. This is also a common problem that existing in many of my friends. They either use a school email account or the same personal email address to register other accounts. This behavior will make their accounts easily linked together.<br />
===Risk on accumulation personal information on LinkedIn===<br />
[[File:Zhiyuan_Sun_LinkedIn.png|thumbnail|right|My LinkedIn Page]]<br />
I registered my LinkedIn account one year ago in order to stay prepared for future job search. I put my previous experiences and my contact information on it and keep updating it once in a while. I also added many alumni and relatives. Only by doing so will LinkedIn push more job positions to me. At the same time, more personal information and relationships are exposed to LinkedIn. Therefore, my LinkedIn account might be my biggest weakness if one wants to peek at my personal information. <br />
<br />
==My feelings about my data identity==<br />
After searching myself thoroughly using different methods, I genuinely feel fortunate and reassured for not revealing much personal information online, because it is quite hard to not leave traces on the Internet given such frequent use of the Internet. Up to now, the searching results of myself on the Internet cannot reflect the real and detailed me. As a matter of fact, there is some true and highly-related information about me on the Internet but it is good that such information is not collected and associated together to form my data identity or at least the data identity is not easy to find. <br />
<br />
Meanwhile, I also feel a little disappointed that the digital me looks so boring and dull. While in the real life I am a unique and attractive soul as other Zhiyuan Suns on the Internet. I have a persistent love for mathematics, a unique taste of cuisines, and great enthusiasm for bodybuilding. All these characteristics make me stand out from my peers. While my personal information is well-protected, I lose the opportunity to showcase my vivid and lively personality. And therefore blocking other kindred spirits <br />
making friends with me.<br />
<br />
==Conclusion==<br />
According to Floridi, "Digital evolution must no longer be offered to a customer in the trade-off between privacy and security. Privacy is not for sale, it's a valuable asset to protect". As a participant in the global infosphere, we should attach more importance to our information security. As the beneficiary of the extensive source of information, we must also respect others' right of privacy while enjoying the convenience of ICT. <br />
<br />
== References ==<br />
<br />
“Self-Understanding.” ''The Fourth Revolution: How the Infosphere Is Reshaping Human Reality'', by Luciano Floridi, Oxford University Press, 2014.<br />
https://www.spp.gov.cn/spp/llyj/201803/t20180324_372129.shtml<br />
https://www.bbc.com/zhongwen/simp/china_watch/2013/12/131218_flesh_search_crackdown</div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Zhiyuan_Sun&diff=97377Zhiyuan Sun2021-03-13T13:07:57Z<p>Timsun: </p>
<hr />
<div>Zhiyuan Sun<br />
<br />
These days, thanks to the fast development of Information and Communication Technology (ICT), we get an easier access to more extensive and timely information, and are able to communicate with each other more conveniently and efficiently. Media like Facebook and Twitter become hot platforms where people can share their daily fun and express their emotions freely, while apps like Instant Checkmate gains lots of fans due to its high efficiency of information searching. However, when we are immersed in this fascinating world created by the high-level technology, we should also pay attention to potential risk that the ICT has. In the following paragraphs, I will take the experience of searching myself on the internet as an example, to illustrate my concern about the this booming technology.<br />
<br />
==Name searching in Engines==<br />
[[File:Zhiyuan_Sun.png|thumbnail|right|Search results of Zhiyuan Sun]]<br />
My name is '孙志远', and I tried to search my name in several different search engines including Google and Baidu (a popular search engine in China). Both of these engines are widely used and famous for their enormous information bases. I expected to find some interesting and special information about myself, but none of the search results were very satisfactory. The information that search engines gave me is mainly about a patriotic hero who shares the same name as me. There are also many lawyers, businessmen who are named ‘孙志远’, but none of them are related to me. <br />
After adding constraints like the name of the high school I attended, the result became more accurate. One of the results presented the information of my high school admission with detailed time and accurate middle and high schools’ names. I felt surprised about it because I had completely forgotten the date that I received the high school offers. This surprising result encouraged me to change other constraints like the Twitter account. Sadly, the result turned back into inaccurate again. <br />
<br />
===Reflections on search results===<br />
After deeply looking into this name searching period, I find the search result is reasonable. <br />
To begin with, the common appearance of the name ‘孙志远’ in China contributes to the high probability of my sharing name with those famous people. My family name '孙' ranks third in the Book of Family Names, which is one of the most important Chinese Classics recording some common family names in Chinese history. Obviously, ‘孙’ is not a rare family name. What’s more, my second name ‘志远’ means having lofty ambition in Chinese. Parents always attach high expectations on children’s future development, so ‘志远’ is also a common second name expressing parents’ best wishes for their children. All these factors make the rate of people named ‘孙志远’ very high. <br />
Secondly, search engines always list results of the same information by their searched time. Most results about ‘孙志远’ are information of people with a huge contribution to society or successful careers. On the other hand, my life experience seems to be mediocre. When I was a child, I was too busy with my studying to spare time to do some extracurricular activities with broad influence. At the same time, I seldom participated in competitions, so I also lost some chances to become famous by winning prizes. Therefore, search results are information about those ‘孙志远’ with a high level of social focus instead of me.<br />
Moreover, different relevancies of different constraints are because those constraints have distinguishing importance. After reflecting on my past life, I recall that I was admitted through a special examination other than the centralization examination to high school (a.k.a. Zhongkao). This special examination benefits some students well because it will reduce their pressure to a large extend. Many students attended this examination and it gained a high level of focus. Thus, my high school should conduct this examination fairly and post the final result to the public. These constraints are important because it’s a special experience for me which also has attracted a lot of attention. However, the constraints like Twitter account are almost meaningless. Although I have accounted for many mainstream social media both in China and internationally, and also enjoy using or even deeply immersing into social media to stay in touch and socializing with others, I seldom post my own life on it. As a result, I haven’t gained some uniqueness on those social media which may set me apart from others. <br />
<br />
<br />
<br />
<br />
<br />
==Instant Checkmate==<br />
To get more information about myself through the Internet, I try to look for some efficient apps. I noticed that almost all examples from previous years mentioned an app called Instant Checkmate, an online personal information search website. <br />
===potential risk in legitimacy===<br />
I tried to search myself on the Instant Check, but it failed because it only works for people in the United States. When I first heard about such a website that gives you all personal information with just one click, I was both curious and scared. I was scared because I was worried about its legitimacy and ethicality. Unfortunately, such a website is indeed legitimate because it only gathers information from another website. However, along with the convenience it brings to us, there is also serious potential risk. The information can be accessed too easily, with merely several clicks and a simple consent of not using information for illegal activities, which has no binding on one's behavior and no penalty for illegal use. You will never know how the viewer of your information uses it, and it may hurt your privacy security. <br />
===illegitimacy and inequality===<br />
Although I did not find myself on the website, my curiosity drives me to search several celebrities on it. The results of some celebrities’ information are very accurate, while for some celebrities, I cannot find anything of them on this app. This makes me think of two things. <br />
First, is the privacy of the celebrities with lots of information on this app being threatened? Although the website is just an aggregation of information, it does lower the threshold for people to attain the information. Much information normally hidden deeply in a corner of the Internet before is now exposed into people's eyes straightforwardly. For example, if a celebrity's personal number is shown on the website, will he or she be continuously harassed by his fans or haters? <br />
Second, is there any unfairness when treating celebrities and ordinary people like you and me? The reason for failing to find some celebrities is probably because the website either creates a block list for certain people or the celebrities hire their legal teams to deal with such issues. Is there unfairness behind this? When it comes to private security, should celebrities be treated differently just because of their identities? <br />
===Such websites are not allowed in China===<br />
I also tried to find the counterpart applications in China to see if things work out, but I only find apps that have limited access to criminal and credit records. This phenomenon reflects that the Chinese government has attached many importances to the protection of privacy and security. Such apps that reveal full personal information have been prohibited since 2013. According to BBC News, several violent flesh search events have given rise to this prohibition. In early 2013, a shopkeeper posted a security camera screenshot, claiming the girl in the screenshot to be a thief and asking others to conduct a flesh search. Soon, the girl's name, school, and address were exposed to the public. Through these pieces of information, many people criticize this girl directly, even abuse her severely with rude words. Finally, this girl suicided under huge pressure while later proved to be innocent. The Chinese government took action to prohibit flesh search and also the information search apps that accelerate this process. I know China has long been criticized for its abuse of private information and lack of action in privacy protection, which I do not deny, but at least in this issue, China has done a laudable and fruitful job. At least, when I was in China, I never received a spam call in the mid of the night claiming that I was involved in criminal activity and had to transfer all my money into a certain account for protection. <br />
<br />
==Social Media Use==<br />
After knowing the importance of personal information security, I try to think deeply about the potential risk of my privacy security. <br />
===Risk on Facebook, Twitter, Instagram’ accounts===<br />
For international social media, I use Facebook, Twitter, Instagram, and LinkedIn. However, except for LinkedIn, I only view others' content on other international social media. After hearing many tragedies caused by personal information security problems, I learned to protect myself by not using my real name on them. Therefore, unless I append my social media account after my name, I cannot search for any result about myself. The goodness is that it is very hard for others to associate these accounts with me directly. However, if they can trace back to the email address used when I registered these accounts, it would be easy for them to identify my identity, since I used the same email address that contains my real name. This is also a common problem that existing in many of my friends. They either use a school email account or the same personal email address to register other accounts. This behavior will make their accounts easily linked together.<br />
===Risk on accumulation personal information on LinkedIn===<br />
[[File:Zhiyuan_Sun_LinkedIn.png|thumbnail|right|My LinkedIn Page]]<br />
I registered my LinkedIn account one year ago in order to stay prepared for future job search. I put my previous experiences and my contact information on it and keep updating it once in a while. I also added many alumni and relatives. Only by doing so will LinkedIn push more job positions to me. At the same time, more personal information and relationships are exposed to LinkedIn. Therefore, my LinkedIn account might be my biggest weakness if one wants to peek at my personal information. <br />
<br />
==My feelings about my data identity==<br />
After searching myself thoroughly using different methods, I genuinely feel fortunate and reassured for not revealing much personal information online, because it is quite hard to not leave traces on the Internet given such frequent use of the Internet. Up to now, the searching results of myself on the Internet cannot reflect the real and detailed me. As a matter of fact, there is some true and highly-related information about me on the Internet but it is good that that such information is not collected and associated together to form my data identity or at least the data identity is not easy to find. <br />
<br />
== References ==<br />
<br />
“Self-Understanding.” ''The Fourth Revolution: How the Infosphere Is Reshaping Human Reality'', by Luciano Floridi, Oxford University Press, 2014.<br />
https://www.spp.gov.cn/spp/llyj/201803/t20180324_372129.shtml<br />
https://www.bbc.com/zhongwen/simp/china_watch/2013/12/131218_flesh_search_crackdown</div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Talk:Rahil_Patel&diff=94245Talk:Rahil Patel2021-02-25T15:50:50Z<p>Timsun: </p>
<hr />
<div>==== Morgan Tucker Comment ====<br />
Hey Rahil! I enjoyed reading your insightful reflections on your searches and who the internet portrays you to be. I like how the reader can see you changing your mindset from "don't believe everything you see online" and you can believe it but understand there are missing pieces. You also made a good point that, though your Linkedin can tell someone about your work experience and interests, it is simply what you want people to know about you "on paper". On one hand, it is nice that you can curate what people know about you, but to truly know someone, one must meet face to face. Something that may be beneficial would be considering the order you discuss your search results. You could have your piece on social media first because that is more general, and then get into your specific searches. Just some things to consider, but not crucial changes. Overall, great investigations and reflections. - Morgan Tucker<br />
<br />
==== Zhiyuan Sun Comment ====<br />
Hi Rahil! You did a good job on writing your personal data identity statement. I can see your time and effort in doing research about yourself. It is good that you tried different methods and it is interesting that you noticed some differences between your three matches. Your information about the University of Michigan is not shown well but the LinkedIn profile appears in the search result. It is good to protect privacy. If I had to point out some improvements, I would say that you can talk more about the deep reason that is behind the phenomenon. It would be great if you add more content about your own thoughts and feelings and also analyze why the results are like that and try to generalize your idea to a broader concept. I would also suggest you to use a website called CheckMate, which allows you to find your identity more thoroughly.</div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Talk:Tianshuo_Yan&diff=94233Talk:Tianshuo Yan2021-02-25T15:24:40Z<p>Timsun: </p>
<hr />
<div>=Comments from [[Brant Verlinde]]=<br />
Hi Tianshuo! I found it very interesting to hear about the discrepancies between Google and Baidu as I have only ever been exposed to Google. You bring up a great point about how the algorithms behind each of these platforms could influence which information appears first, like good or bad news about a celebrity. I really like the organization and structure of your article as well, the headers and subheadings made it very clear what was being discussed, and the flow between them was easy to follow. If I had to suggest an improvement, I think adding a little more to the “Google” and “Present Usage” sections would be useful. In your current draft they only include a sentence or two, and I think they would be great additions if they had a little more in them. Great job!<br />
<br />
=Comments from [[Sam Rechner]]=<br />
你好 Tianshuo,<br />
<br />
Great job on this piece. I really enjoyed reading about how your digital footprint has developed. I thought your introduction was solid and presented your background information in a simple, effective, and anecdotal way. I also really appreciated the way you structured the statement. Transitions from paragraph to paragraph were very clean and the topic sentences made your discussion points more organized. I also thought your comparison between search engines was a great way to observe/discuss data collection. It was a nice way to broaden the topics and discuss larger implications of data collection. I thought your concluding thoughts section was also extremely well done. Your mentioning of Floridi and his quote on our generation possibly being the last to notice distinctions between offline and online states is so relevant to the data/online privacy conversation. One suggestion I have is to reorganize your paragraphs so your social media usage section follows your introduction. This way you'll be able to transition nicely from "reasons behind the change" to discussing the search engine implications. All in all, your piece was awesome though!<br />
<br />
=Comments from [[Zhiyuan Sun]]=<br />
Hi Tianshuo Yan! It is nice to read your statement about yourself! You did a good job on your search job and writing statement. Unlike others who are from the US., you wrote your uniquess as being a Chinese. It might be hard to find information gather website in China but you used WeChat and QQ space instead, which is good. I have the same feeling for you in many aspects! For example, I was also forced to learn many hobbies and take classes as a child. Also, I sent what I would perceive as stupid to QQ space too! As for improvement, I think that you can probably add more pages talking about your own feelings and thoughts. Besides, it would be great if you can spend more time talking about the result from Google.</div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Talk:Zhiyuan_Sun&diff=94165Talk:Zhiyuan Sun2021-02-25T12:43:04Z<p>Timsun: Created blank page</p>
<hr />
<div></div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Zhiyuan_Sun&diff=94161Zhiyuan Sun2021-02-25T12:35:03Z<p>Timsun: </p>
<hr />
<div>Zhiyuan Sun<br />
<br />
==Name searching in Engines==<br />
[[File:Zhiyuan_Sun.png|thumbnail|right|Search results of Zhiyuan Sun]]<br />
My name is '孙志远', and I tried to search my name in several different search engines including Google and Baidu (a popular search engine in China). Both of these engines are widely used and famous for their enormous information bases. I expected to find some interesting and special information about myself, but none of the search results were very satisfactory. The information that search engines gave me is mainly about a patriotic hero who shares the same name as me. There are also many lawyers, businessmen who are named ‘孙志远’, but none of them are related to me. <br />
After adding constraints like the name of the high school I attended, the result became more accurate. One of the results presented the information of my high school admission with detailed time and accurate middle and high schools’ names. I felt surprised about it because I had completely forgotten the date that I received the high school offers. This surprising result encouraged me to change other constraints like the Twitter account. Sadly, the result turned back into inaccurate again. <br />
<br />
===Reflections on search results===<br />
After deeply looking into this name searching period, I find the search result is reasonable. <br />
To begin with, the common appearance of the name ‘孙志远’ in China contributes to the high probability of my sharing name with those famous people. My family name '孙' ranks third in the Book of Family Names, which is one of the most important Chinese Classics recording some common family names in Chinese history. Obviously, ‘孙’ is not a rare family name. What’s more, my second name ‘志远’ means having lofty ambition in Chinese. Parents always attach high expectations on children’s future development, so ‘志远’ is also a common second name expressing parents’ best wishes for their children. All these factors make the rate of people named ‘孙志远’ very high. <br />
Secondly, search engines always list results of the same information by their searched time. Most results about ‘孙志远’ are information of people with a huge contribution to society or successful careers. On the other hand, my life experience seems to be mediocre. When I was a child, I was too busy with my studying to spare time to do some extracurricular activities with broad influence. At the same time, I seldom participated in competitions, so I also lost some chances to become famous by winning prizes. Therefore, search results are information about those ‘孙志远’ with a high level of social focus instead of me.<br />
Moreover, different relevancies of different constraints are because those constraints have distinguishing importance. After reflecting on my past life, I recall that I was admitted through a special examination other than the centralization examination to high school (a.k.a. Zhongkao). This special examination benefits some students well because it will reduce their pressure to a large extend. Many students attended this examination and it gained a high level of focus. Thus, my high school should conduct this examination fairly and post the final result to the public. These constraints are important because it’s a special experience for me which also has attracted a lot of attention. However, the constraints like Twitter account are almost meaningless. Although I have accounted for many mainstream social media both in China and internationally, and also enjoy using or even deeply immersing into social media to stay in touch and socializing with others, I seldom post my own life on it. As a result, I haven’t gained some uniqueness on those social media which may set me apart from others. <br />
<br />
<br />
<br />
<br />
<br />
==Instant Checkmate==<br />
To get more information about myself through the Internet, I try to look for some efficient apps. I noticed that almost all examples from previous years mentioned an app called Instant Checkmate, an online personal information search website. <br />
===potential risk in legitimacy===<br />
I tried to search myself on the Instant Check, but it failed because it only works for people in the United States. When I first heard about such a website that gives you all personal information with just one click, I was both curious and scared. I was scared because I was worried about its legitimacy and ethicality. Unfortunately, such a website is indeed legitimate because it only gathers information from another website. However, along with the convenience it brings to us, there is also serious potential risk. The information can be accessed too easily, with merely several clicks and a simple consent of not using information for illegal activities, which has no binding on one's behavior and no penalty for illegal use. You will never know how the viewer of your information uses it, and it may hurt your privacy security. <br />
===illegitimacy and inequality===<br />
Although I did not find myself on the website, my curiosity drives me to search several celebrities on it. The results of some celebrities’ information are very accurate, while for some celebrities, I cannot find anything of them on this app. This makes me think of two things. <br />
First, is the privacy of the celebrities with lots of information on this app being threatened? Although the website is just an aggregation of information, it does lower the threshold for people to attain the information. Much information normally hidden deeply in a corner of the Internet before is now exposed into people's eyes straightforwardly. For example, if a celebrity's personal number is shown on the website, will he or she be continuously harassed by his fans or haters? <br />
Second, is there any unfairness when treating celebrities and ordinary people like you and me? The reason for failing to find some celebrities is probably because the website either creates a block list for certain people or the celebrities hire their legal teams to deal with such issues. Is there unfairness behind this? When it comes to private security, should celebrities be treated differently just because of their identities? <br />
===Such websites are not allowed in China===<br />
I also tried to find the counterpart applications in China to see if things work out, but I only find apps that have limited access to criminal and credit records. This phenomenon reflects that the Chinese government has attached many importances to the protection of privacy and security. Such apps that reveal full personal information have been prohibited since 2013. According to BBC News, several violent flesh search events have given rise to this prohibition. In early 2013, a shopkeeper posted a security camera screenshot, claiming the girl in the screenshot to be a thief and asking others to conduct a flesh search. Soon, the girl's name, school, and address were exposed to the public. Through these pieces of information, many people criticize this girl directly, even abuse her severely with rude words. Finally, this girl suicided under huge pressure while later proved to be innocent. The Chinese government took action to prohibit flesh search and also the information search apps that accelerate this process. I know China has long been criticized for its abuse of private information and lack of action in privacy protection, which I do not deny, but at least in this issue, China has done a laudable and fruitful job. At least, when I was in China, I never received a spam call in the mid of the night claiming that I was involved in criminal activity and had to transfer all my money into a certain account for protection. <br />
<br />
==Social Media Use==<br />
After knowing the importance of personal information security, I try to think deeply about the potential risk of my privacy security. <br />
===Risk on Facebook, Twitter, Instagram’ accounts===<br />
For international social media, I use Facebook, Twitter, Instagram, and LinkedIn. However, except for LinkedIn, I only view others' content on other international social media. After hearing many tragedies caused by personal information security problems, I learned to protect myself by not using my real name on them. Therefore, unless I append my social media account after my name, I cannot search for any result about myself. The goodness is that it is very hard for others to associate these accounts with me directly. However, if they can trace back to the email address used when I registered these accounts, it would be easy for them to identify my identity, since I used the same email address that contains my real name. This is also a common problem that existing in many of my friends. They either use a school email account or the same personal email address to register other accounts. This behavior will make their accounts easily linked together.<br />
===Risk on accumulation personal information on LinkedIn===<br />
[[File:Zhiyuan_Sun_LinkedIn.png|thumbnail|right|My LinkedIn Page]]<br />
I registered my LinkedIn account one year ago in order to stay prepared for future job search. I put my previous experiences and my contact information on it and keep updating it once in a while. I also added many alumni and relatives. Only by doing so will LinkedIn push more job positions to me. At the same time, more personal information and relationships are exposed to LinkedIn. Therefore, my LinkedIn account might be my biggest weakness if one wants to peek at my personal information. <br />
<br />
==My feelings about my data identity==<br />
After searching myself thoroughly using different methods, I genuinely feel fortunate and reassured for not revealing much personal information online, because it is quite hard to not leave traces on the Internet given such frequent use of the Internet. Up to now, the searching results of myself on the Internet cannot reflect the real and detailed me. As a matter of fact, there is some true and highly-related information about me on the Internet but it is good that that such information is not collected and associated together to form my data identity or at least the data identity is not easy to find. <br />
<br />
== References ==<br />
<br />
“Self-Understanding.” ''The Fourth Revolution: How the Infosphere Is Reshaping Human Reality'', by Luciano Floridi, Oxford University Press, 2014.<br />
https://www.spp.gov.cn/spp/llyj/201803/t20180324_372129.shtml<br />
https://www.bbc.com/zhongwen/simp/china_watch/2013/12/131218_flesh_search_crackdown</div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Zhiyuan_Sun&diff=94121Zhiyuan Sun2021-02-25T09:13:58Z<p>Timsun: </p>
<hr />
<div>Zhiyuan Sun<br />
<br />
==Name searching in Engines==<br />
[[File:Zhiyuan_Sun.png|thumbnail|right|Search results of Zhiyuan Sun]]<br />
My name is '孙志远', and I tried to search my name in several different search engines including Google and Baidu (a popular search engine in China). Both of these engines are widely used and famous for their enormous information bases. I expected to find some interesting and special information about myself, but none of the search results were very satisfactory. The information that search engines gave me is mainly about a patriotic hero who shares the same name as me. There are also many lawyers, businessmen who are named ‘孙志远’, but none of them are related to me. <br />
After adding constraints like the name of the high school I attended, the result became more accurate. One of the results presented the information of my high school admission with detailed time and accurate middle and high schools’ names. I felt surprised about it because I had completely forgotten the date that I received the high school offers. This surprising result encouraged me to change other constraints like the Twitter account. Sadly, the result turned back into inaccurate again. <br />
<br />
===Reflections on search results===<br />
After deeply looking into this name searching period, I find the search result is reasonable. <br />
To begin with, the common appearance of the name ‘孙志远’ in China contributes to the high probability of my sharing name with those famous people. My family name '孙' ranks third in the Book of Family Names, which is one of the most important Chinese Classics recording some common family names in Chinese history. Obviously, ‘孙’ is not a rare family name. What’s more, my second name ‘志远’ means having lofty ambition in Chinese. Parents always attach high expectations on children’s future development, so ‘志远’ is also a common second name expressing parents’ best wishes for their children. All these factors make the rate of people named ‘孙志远’ very high. <br />
Secondly, search engines always list results of the same information by their searched time. Most results about ‘孙志远’ are information of people with a huge contribution to society or successful careers. On the other hand, my life experience seems to be mediocre. When I was a child, I was too busy with my studying to spare time to do some extracurricular activities with broad influence. At the same time, I seldom participated in competitions, so I also lost some chances to become famous by winning prizes. Therefore, search results are information about those ‘孙志远’ with a high level of social focus instead of me.<br />
Moreover, different relevancies of different constraints are because those constraints have distinguishing importance. After reflecting on my past life, I recall that I was admitted through a special examination other than the centralization examination to high school (a.k.a. Zhongkao). This special examination benefits some students well because it will reduce their pressure to a large extend. Many students attended this examination and it gained a high level of focus. Thus, my high school should conduct this examination fairly and post the final result to the public. These constraints are important because it’s a special experience for me which also has attracted a lot of attention. However, the constraints like Twitter account are almost meaningless. Although I have accounted for many mainstream social media both in China and internationally, and also enjoy using or even deeply immersing into social media to stay in touch and socializing with others, I seldom post my own life on it. As a result, I haven’t gained some uniqueness on those social media which may set me apart from others. <br />
<br />
<br />
<br />
<br />
<br />
==Instant Checkmate==<br />
To get more information about myself through the Internet, I try to look for some efficient apps. I noticed that almost all examples from previous years mentioned an app called Instant Checkmate, an online personal information search website. <br />
===potential risk in legitimacy===<br />
I tried to search myself on the Instant Check, but it failed because it only works for people in the United States. When I first heard about such a website that gives you all personal information with just one click, I was both curious and scared. I was scared because I was worried about its legitimacy and ethicality. Unfortunately, such a website is indeed legitimate because it only gathers information from another website. However, along with the convenience it brings to us, there is also serious potential risk. The information can be accessed too easily, with merely several clicks and a simple consent of not using information for illegal activities, which has no binding on one's behavior and no penalty for illegal use. You will never know how the viewer of your information uses it, and it may hurt your privacy security. <br />
===illegitimacy and inequality===<br />
Although I did not find myself on the website, my curiosity drives me to search several celebrities on it. The results of some celebrities’ information are very accurate, while for some celebrities, I cannot find anything of them on this app. This makes me think of two things. <br />
First, is the privacy of the celebrities with lots of information on this app being threatened? Although the website is just an aggregation of information, it does lower the threshold for people to attain the information. Much information normally hidden deeply in a corner of the Internet before is now exposed into people's eyes straightforwardly. For example, if a celebrity's personal number is shown on the website, will he or she be continuously harassed by his fans or haters? <br />
Second, is there any unfairness when treating celebrities and ordinary people like you and me? The reason for failing to find some celebrities is probably because the website either creates a block list for certain people or the celebrities hire their legal teams to deal with such issues. Is there unfairness behind this? When it comes to private security, should celebrities be treated differently just because of their identities? <br />
===Such websites are not allowed in China===<br />
I also tried to find the counterpart applications in China to see if things work out, but I only find apps that have limited access to criminal and credit records. This phenomenon reflects that the Chinese government has attached many importances to the protection of privacy and security. Such apps that reveal full personal information have been prohibited since 2013. According to BBC News, several violent flesh search events have given rise to this prohibition. In early 2013, a shopkeeper posted a security camera screenshot, claiming the girl in the screenshot to be a thief and asking others to conduct a flesh search. Soon, the girl's name, school, and address were exposed to the public. Through these pieces of information, many people criticize this girl directly, even abuse her severely with rude words. Finally, this girl suicided under huge pressure while later proved to be innocent. The Chinese government took action to prohibit flesh search and also the information search apps that accelerate this process. I know China has long been criticized for its abuse of private information and lack of action in privacy protection, which I do not deny, but at least in this issue, China has done a laudable and fruitful job. At least, when I was in China, I never received a spam call in the mid of the night claiming that I was involved in criminal activity and had to transfer all my money into a certain account for protection. <br />
<br />
==Social Media Use==<br />
After knowing the importance of personal information security, I try to think deeply about the potential risk of my privacy security. <br />
===Risk on Facebook, Twitter, Instagram’ accounts===<br />
For international social media, I use Facebook, Twitter, Instagram, and LinkedIn. However, except for LinkedIn, I only view others' content on other international social media. After hearing many tragedies caused by personal information security problems, I learned to protect myself by not using my real name on them. Therefore, unless I append my social media account after my name, I cannot search for any result about myself. The goodness is that it is very hard for others to associate these accounts with me directly. However, if they can trace back to the email address used when I registered these accounts, it would be easy for them to identify my identity, since I used the same email address that contains my real name. This is also a common problem that existing in many of my friends. They either use a school email account or the same personal email address to register other accounts. This behavior will make their accounts easily linked together.<br />
===Risk on accumulation personal information on LinkedIn===<br />
[[File:Zhiyuan_Sun_LinkedIn.png|thumbnail|right|Search results of Zhiyuan Sun]]<br />
I registered my LinkedIn account one year ago in order to stay prepared for future job search. I put my previous experiences and my contact information on it and keep updating it once in a while. I also added many alumni and relatives. Only by doing so will LinkedIn push more job positions to me. At the same time, more personal information and relationships are exposed to LinkedIn. Therefore, my LinkedIn account might be my biggest weakness if one wants to peek at my personal information. <br />
<br />
==My feelings about my data identity==<br />
After searching myself thoroughly using different methods, I genuinely feel fortunate and reassured for not revealing much personal information online, because it is quite hard to not leave traces on the Internet given such frequent use of the Internet. Up to now, the searching results of myself on the Internet cannot reflect the real and detailed me. As a matter of fact, there is some true and highly-related information about me on the Internet but it is good that that such information is not collected and associated together to form my data identity or at least the data identity is not easy to find. <br />
<br />
== References ==<br />
<br />
“Self-Understanding.” ''The Fourth Revolution: How the Infosphere Is Reshaping Human Reality'', by Luciano Floridi, Oxford University Press, 2014.<br />
https://www.spp.gov.cn/spp/llyj/201803/t20180324_372129.shtml<br />
https://www.bbc.com/zhongwen/simp/china_watch/2013/12/131218_flesh_search_crackdown</div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=File:Zhiyuan_Sun.png&diff=94119File:Zhiyuan Sun.png2021-02-25T09:10:22Z<p>Timsun: </p>
<hr />
<div></div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=File:Zhiyuan_Sun_LinkedIn.png&diff=94116File:Zhiyuan Sun LinkedIn.png2021-02-25T09:09:01Z<p>Timsun: </p>
<hr />
<div></div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Zhiyuan_Sun&diff=94109Zhiyuan Sun2021-02-25T08:51:46Z<p>Timsun: </p>
<hr />
<div>Zhiyuan Sun<br />
<br />
==Name searching in Engines==<br />
[[File:Zhiyuan_Sun.png|thumbnail|right|Search results of Zhiyuan Sun]]<br />
My name is '孙志远', and I tried to search my name in several different search engines including Google and Baidu (a popular search engine in China). Both of these engines are widely used and famous for their enormous information bases. I expected to find some interesting and special information about myself, but none of the search results were very satisfactory. The information that search engines gave me is mainly about a patriotic hero who shares the same name as me. There are also many lawyers, businessmen who are named ‘孙志远’, but none of them are related to me. <br />
After adding constraints like the name of the high school I attended, the result became more accurate. One of the results presented the information of my high school admission with detailed time and accurate middle and high schools’ names. I felt surprised about it because I had completely forgotten the date that I received the high school offers. This surprising result encouraged me to change other constraints like the Twitter account. Sadly, the result turned back into inaccurate again. <br />
<br />
===Reflections on search results===<br />
After deeply looking into this name searching period, I find the search result is reasonable. <br />
To begin with, the common appearance of the name ‘孙志远’ in China contributes to the high probability of my sharing name with those famous people. My family name '孙' ranks third in the Book of Family Names, which is one of the most important Chinese Classics recording some common family names in Chinese history. Obviously, ‘孙’ is not a rare family name. What’s more, my second name ‘志远’ means having lofty ambition in Chinese. Parents always attach high expectations on children’s future development, so ‘志远’ is also a common second name expressing parents’ best wishes for their children. All these factors make the rate of people named ‘孙志远’ very high. <br />
Secondly, search engines always list results of the same information by their searched time. Most results about ‘孙志远’ are information of people with a huge contribution to society or successful careers. On the other hand, my life experience seems to be mediocre. When I was a child, I was too busy with my studying to spare time to do some extracurricular activities with broad influence. At the same time, I seldom participated in competitions, so I also lost some chances to become famous by winning prizes. Therefore, search results are information about those ‘孙志远’ with a high level of social focus instead of me.<br />
Moreover, different relevancies of different constraints are because those constraints have distinguishing importance. After reflecting on my past life, I recall that I was admitted through a special examination other than the centralization examination to high school (a.k.a. Zhongkao). This special examination benefits some students well because it will reduce their pressure to a large extend. Many students attended this examination and it gained a high level of focus. Thus, my high school should conduct this examination fairly and post the final result to the public. These constraints are important because it’s a special experience for me which also has attracted a lot of attention. However, the constraints like Twitter account are almost meaningless. Although I have accounted for many mainstream social media both in China and internationally, and also enjoy using or even deeply immersing into social media to stay in touch and socializing with others, I seldom post my own life on it. As a result, I haven’t gained some uniqueness on those social media which may set me apart from others. <br />
<br />
<br />
<br />
<br />
<br />
==Instant Checkmate==<br />
To get more information about myself through the Internet, I try to look for some efficient apps. I noticed that almost all examples from previous years mentioned an app called Instant Checkmate, an online personal information search website. <br />
===potential risk in legitimacy===<br />
I tried to search myself on the Instant Check, but it failed because it only works for people in the United States. When I first heard about such a website that gives you all personal information with just one click, I was both curious and scared. I was scared because I was worried about its legitimacy and ethicality. Unfortunately, such a website is indeed legitimate because it only gathers information from another website. However, along with the convenience it brings to us, there is also serious potential risk. The information can be accessed too easily, with merely several clicks and a simple consent of not using information for illegal activities, which has no binding on one's behavior and no penalty for illegal use. You will never know how the viewer of your information uses it, and it may hurt your privacy security. <br />
===illegitimacy and inequality===<br />
Although I did not find myself on the website, my curiosity drives me to search several celebrities on it. The results of some celebrities’ information are very accurate, while for some celebrities, I cannot find anything of them on this app. This makes me think of two things. <br />
First, is the privacy of the celebrities with lots of information on this app being threatened? Although the website is just an aggregation of information, it does lower the threshold for people to attain the information. Much information normally hidden deeply in a corner of the Internet before is now exposed into people's eyes straightforwardly. For example, if a celebrity's personal number is shown on the website, will he or she be continuously harassed by his fans or haters? <br />
Second, is there any unfairness when treating celebrities and ordinary people like you and me? The reason for failing to find some celebrities is probably because the website either creates a block list for certain people or the celebrities hire their legal teams to deal with such issues. Is there unfairness behind this? When it comes to private security, should celebrities be treated differently just because of their identities? <br />
===Such websites are not allowed in China===<br />
I also tried to find the counterpart applications in China to see if things work out, but I only find apps that have limited access to criminal and credit records. This phenomenon reflects that the Chinese government has attached many importances to the protection of privacy and security. Such apps that reveal full personal information have been prohibited since 2013. According to BBC News, several violent flesh search events have given rise to this prohibition. In early 2013, a shopkeeper posted a security camera screenshot, claiming the girl in the screenshot to be a thief and asking others to conduct a flesh search. Soon, the girl's name, school, and address were exposed to the public. Through these pieces of information, many people criticize this girl directly, even abuse her severely with rude words. Finally, this girl suicided under huge pressure while later proved to be innocent. The Chinese government took action to prohibit flesh search and also the information search apps that accelerate this process. I know China has long been criticized for its abuse of private information and lack of action in privacy protection, which I do not deny, but at least in this issue, China has done a laudable and fruitful job. At least, when I was in China, I never received a spam call in the mid of the night claiming that I was involved in criminal activity and had to transfer all my money into a certain account for protection. <br />
<br />
==Social Media Use==<br />
After knowing the importance of personal information security, I try to think deeply about the potential risk of my privacy security. <br />
===Risk on Facebook, Twitter, Instagram’ accounts===<br />
For international social media, I use Facebook, Twitter, Instagram, and LinkedIn. However, except for LinkedIn, I only view others' content on other international social media. After hearing many tragedies caused by personal information security problems, I learned to protect myself by not using my real name on them. Therefore, unless I append my social media account after my name, I cannot search for any result about myself. The goodness is that it is very hard for others to associate these accounts with me directly. However, if they can trace back to the email address used when I registered these accounts, it would be easy for them to identify my identity, since I used the same email address that contains my real name. This is also a common problem that existing in many of my friends. They either use a school email account or the same personal email address to register other accounts. This behavior will make their accounts easily linked together.<br />
===Risk on accumulation personal information on LinkedIn===<br />
I registered my LinkedIn account one year ago in order to stay prepared for future job search. I put my previous experiences and my contact information on it and keep updating it once in a while. I also added many alumni and relatives. Only by doing so will LinkedIn push more job positions to me. At the same time, more personal information and relationships are exposed to LinkedIn. Therefore, my LinkedIn account might be my biggest weakness if one wants to peek at my personal information. <br />
<br />
==My feelings about my data identity==<br />
After searching myself thoroughly using different methods, I genuinely feel fortunate and reassured for not revealing much personal information online, because it is quite hard to not leave traces on the Internet given such frequent use of the Internet. Up to now, the searching results of myself on the Internet cannot reflect the real and detailed me. As a matter of fact, there is some true and highly-related information about me on the Internet but it is good that that such information is not collected and associated together to form my data identity or at least the data identity is not easy to find. <br />
<br />
== References ==<br />
<br />
“Self-Understanding.” ''The Fourth Revolution: How the Infosphere Is Reshaping Human Reality'', by Luciano Floridi, Oxford University Press, 2014.<br />
https://www.spp.gov.cn/spp/llyj/201803/t20180324_372129.shtml<br />
https://www.bbc.com/zhongwen/simp/china_watch/2013/12/131218_flesh_search_crackdown</div>Timsunhttp://si410wiki.sites.uofmhosting.net/index.php?title=Zhiyuan_Sun&diff=92977Zhiyuan Sun2021-02-19T14:05:10Z<p>Timsun: Created page with "Zhiyuan Sun"</p>
<hr />
<div>Zhiyuan Sun</div>Timsun