Difference between revisions of "Metadata Privacy"

From SI410
Jump to: navigation, search
Line 24: Line 24:
 
===Social Networks===
 
===Social Networks===
  
User activity on social networking sites can generate metadata that includes your username, name, profile information, location, device, and user activity. Social media corporations may use metadata in order to authenticate the content that users share. The corporation, Meta, utilizes an Open Graph protocol <ref>[https://ogp.me The Open Graph protocol]</ref> which allows account holders to customize how content is displayed in their news feed.
+
User activity on social networking sites can generate metadata that includes your username, name, profile information, location, device, and user activity. Social media corporations may use metadata in order to authenticate the content that users share. The corporation, Meta, utilizes the Open Graph protocol <ref>[https://ogp.me The Open Graph protocol]</ref> which allows account holders to customize how content is displayed in their news feed.
  
 
===Phone Calls===
 
===Phone Calls===

Revision as of 21:00, 27 January 2023

Metadata is defined as data that describes other data. It can contain information regarding the manner of collection, the time of collection, as well as information about how the file was accessed and used in relation to other files. The usage of metadata is critical in order to provide information about a variety of digital resources, including images, videos, audio recordings, and digital resources. [1]

Types of Metadata

There are three main categories of metadata as defined by the Library of Congress Digital Repository Development. The categories include structural metadata, descriptive metadata, and administrative metadata. [2]

Structural Metadata

Structural metadata contains information about the organization or structure of a digital resource. This can include information about the outline of a document, such as chapters, paragraphs, and sections, or information about the organization of a digital collection, such as the arrangement of items in a database or the relationships between files in a file system. Structural metadata can help users navigate, search, and understand the content of a digital resource. [3]

Descriptive Metadata

Descriptive metadata is used in order to identify, describe, and locate a digital resource in order to simplify the process of discovering the digital content. Descriptive metadata can contain information including the format of the digital resource, the date it was modified or created, the tile, and a description of the resource.


Administrative Metadata

A text, image, or video resource may contain administrative metadata that describes the administration, organization, and technical specifications of a digital resource. Information about the resource's developer, the file format, and any copyright or access limitations can all be found in administrative metadata. The management, preservation, and accessibility of the resource are facilitated with the use of this type of metadata.

Metadata Produced in the Scope of Communication

Metadata is generated through every exchange of information. [4] Physical interactions between parties as well as online activities contain metadata and servers or platforms an individual uses to communicate have access to and store metadata.

Social Networks

User activity on social networking sites can generate metadata that includes your username, name, profile information, location, device, and user activity. Social media corporations may use metadata in order to authenticate the content that users share. The corporation, Meta, utilizes the Open Graph protocol [5] which allows account holders to customize how content is displayed in their news feed.

Phone Calls

The metadata generated during the process of a phone call can include the phone numbers of the individuals in the call, the time of the call, the length of the call, the location of the members of the call, and the serial numbers of the telephones.

Browsing on the Internet

Browsing on the internet can produce metadata containing the URLs of websites you visited, user login details through auto-fill, your device operating system and hardware details, as well as your IP address.

Ethical Concerns Regarding the Usage of Metadata

Metadata has raised ethical implications regarding privacy and surveillance. Metadata stores a large amount of information about an individual which can be used to gain insight into details about their life including their location, communication methods, and interests. Businesses can use these customer insights to tailor their advertising strategies, however this information can also be used for surveillance purposes.

Keyword Stuffing

The usage of metadata can also be used to control how certain information is accessed. Certain resources can be restricted which in turn can suppress the freedom of expression as well as the accessibility of information. Service providers or other third party organizations may utilize metadata in order to block certain webpages or social media platforms in order to silence opposing viewpoints and suppress information. [6] In the same manner metadata can be used to restrict access to certain information, it can also be used to promote misinformation. Metadata can be manipulated to promote misleading facts or information at the top of search engines through a practice called keyword stuffing. [7] Irrelevant keywords are tagged in the metadata of a digital resource to increase engagement and create the illusion of relevance in order to appear at the top of search results.

Interception of Metadata

It is also critical to note that metadata must be encrypted and stored on a secure server in order to ensure that only the authorized parties are allowed access to it. A hacker may be able to gain access to it through techniques such as hacking, phishing, or social engineering. Additionally, if metadata is not encrypted or protected properly, a hacker may be able to access it by simply intercepting the data as it is transmitted over a network. [8] Some systems possess different access controls and monitoring mechanisms to detect and prevent unauthorized access to the metadata. Organizations that have incident response plans in place to detect and respond to data breaches can further aid in preventing hackers from accessing metadata.

Surveillance

Third party surveillance is when organizations, other than the parties involved in the original communication or transaction, collect, analyze and use metadata. This can be done for different reasons such as for national security, law enforcement and targeted advertising by government agencies, private companies or other organizations. Some of this data can be phone numbers involved in a call, the time and duration of the call, and the location of the device making the call. This type of surveillance raises privacy concerns as it can reveal sensitive information about individuals without their knowledge or consent. Laws and regulations have been put in place to govern the collection and use of metadata by third parties, but their effectiveness and impact on civil liberties is still a topic of ongoing discussion. [9]

References

  1. Metadata for Data Management: A Tutorial: Definition
  2. Core Metadata Elements
  3. [Structural Metadata - an overview | ScienceDirect Topicshttps://www.sciencedirect.com › topics › computer-science Structural Metadata - an overview]
  4. What is Metadata?
  5. The Open Graph protocol
  6. Metadata - have we got the ethics right?
  7. Keyword Stuffing As A Google Ranking Factor: What You Need To Know
  8. 4 Things You Should Know About Metadata, Hackers And Privacy That Edward Snowden Would Never Tell You
  9. Your Data is Shared and Sold… What’s Being Done About It?