1. _____________________________________________________________________
HIGHER COLLEGES OF TECHNOLOGY
RAS AL KHAIMAH WOMEN’S COLLEGE
________________________________________________________________
LSC 2103
Academic Reading & Writing
Reading Log 2
Name: ____________________________ Section: ________
Faculty: ________________________________
Contents:
3 (three) annotatedacademic articles
3 word lists of 5+ vocabulary words each
3 100 word summaries
3 100+ word opinion paragraphs
1 APA formatted reference listof articles
2. Summary:
In this article, the writer Liu says that the internet violation been a common problem in all the
countries when it’s appear because the Internet Privacy security models has changes that the
local assurance is different to the historical background and value protection . The European
Union use models to protect the internet privacy for people and for the improvement efficient
because of the conflict between the rules and also to make a lot features in law. There are
many countries have a special thing for the protection of the internet privacy such as
European Union, the United States, South Korea and Japan. 1
1 Liu, D. T. (2011).On China's construction of Internet privacy protection system. Legal Space, (01). (In
Chinese).
INTERNET PRIVACY PROTECTION MODELS IN FOREIGN COUNTRIES
The occurrence of Internet infringement cases has become a common problem in all countries. Because
of different local emphases on historical background and value protection, Internet privacy protection
models vary. Some countries providing distinctive Internet privacy protection in law mainly include
the European Union, the United States, South Korea and Japan.
The European Union is a typical country which uses legislation as the primary means to protect
Internet privacy for its people. In order to make its people follow Internet privacy protection principles,
the EU keeps enacting laws and regulations, and even, in order to complement this implementation, it
also enacts administrative regulations and judicial relief in particular. The EU as a whole, in order to
improve efficiency and reduce hassles due to inconsistencies between the rules, makes a lot of common
laws and regulations. Due to its own characteristics of virtual network, the EU member countries have
reached a consensus foe this legislation. For example, in 1981, the council of Europe member states
signed the "Personal Protection Convention of Automatic Processing of Personal Data". On October
24, 1995, EU member states passed "EU Personal Data Protection Direction". After that, the EU has
successively promulgated a series of regulations, such as the "General Principles of Internet Privacy
Protection" and so on.
The United States is a case law country. In protecting Internet privacy, it typically adopts industry self-
regulation model. The industry self-regulation model can be divided into three kinds: the first one is to
regulate the behavior of Internet service providers, Congress provides suggestions for Internet service
providers by developing relevant laws and regulations, requires them to develop Internet privacy
protection rules, and reviews the rules they have developed to achieve Internet privacy protection. The
second one is to allow users to better identify the scope of others' personal information. Enterprises in
compliance with Internet privacy protection standards can post a Internet privacy protection
certification after authorized to make sure their users are under Internet privacy protection. The third
one is to conduct technology protection in order to respect users' right to choose. The Internet
community takes a large number of privacy platforms as a carrier, allowing individuals to decide which
information can be made public and which cannot from the information presented by the carrier.
Ultimately, users can decide to post information and adopt methods provided by Internet technology.
This can prevent users from losing confidence in Internet security.
3. Opinion:
In my opinion, the European Union made the good thing for people to how to protect their
privacy while using the internet and also they dominate the violation that has been a problem
in the internet and fix it right away and people can make sure of the local historical
background that are value protection and because of the models that are make a good
protection for the people and the European, the United States, South Korea and Japan these
countries make it better and more privacy and adding features that people can insure the
privacy in a good way.
Word Meaning
1 Infringement To do something that is against a law or someone's legal rights
2 Emphases Special attention or importance
3 Vary Several things of the same type, they are all different from
each other
4 Distinctive Having a special quality, character, or appearance that is
different and easy to recognize
5 Enact To act in a play, story
4. Summary:
In this article, the writer Justin Healey says that Email let us to send or text messages secretly
from phone or computers. Also we have to make an account by email that easy to contact
other people by using ( ISP ) Internet Service Provider which people can send to each other
but we have to know their address. On the other hand, internet takes a place which has
subject conclude chat groups that they can discuss in interactive better than individually and
the messages can be replied in real time. Also the internet privacy have a threat in web when
we suffered that the web can gather personal information without we know.2
Opinion:
In my point of view, making mails is so easy that to connect to other people from same
country and out of country by texting, sharing images and making free calls or video. With
the Internet Service Provider help us to communicate with other people could be family or
friends from aboard. Chatting with one friend are not interactive but chatting with group an
more interactive and fun. But the web have one problem that can’t save the personal
information without our permission. Also we have to be careful when we provide our
personal information in the internet because some of web don’t have privacy system and cant
save our details.
2 Justin Healey, in The Internet Uses and Abuses,Issues in society,Volue161,February (2002)
Word Meaning
6 Account A written or spoken description that says what happens in an
event or process
7 Blueprint A photographic print of a plan for a building, machine etc on
special blue paper
8 Protocol A system of rules about the correct way to behave on an
official occasion
9 Interactive An interactive computer program, television system etc allows
you to communicate directly with it, and does things in
reaction to your actions
10 Suffer To experience physical or mental pain
5. A Taxonomy for Privacy Concerns
There exists a wide range of Internet marketing activities that have negative effects on the
Internet consumer’s individual privacy . The privacy concerns are not limited to the more well-
known cases of junk mailing [6, 8], or illicit Web cookie distribution, but have expanded to
certain practices that have become cornerstones of Internet merchants’ revenue streams, for
example, the selling of consumer databases for direct marketing purposes.
Over the past few years, we have seen evidence of an increasing number of privacy-related
cases, as related to the growth of Internet marketing activities:
• Privacy concerns related to the activities of junk email marketing organizations, such as Cyber
Promotions and net.net.
• The activities of Web-based advertisements that track the user’s usage history and preferences
through cookies, such as those from Double Click net, Preferences.com, and many others.
• Privacy concerns over malicious programs that can be constructed through security holes in
many Internet tools, such as Java, ActiveX, JavaScript, and many others. Well-known malicious
techniques include ActiveX controls that can obtain a person’s credit information and JavaScript
that accesses personal files.
• Privacy concerns regarding the use and transfer of private information, illustrated by the cases
involving: MSN (Microsoft Network) and their practice of tracking all activities of their
subscribers; Microsoft Sidewalk viewers and their viewing activity patterns to be used for
Microsoft marketing purposes. Choices to opt out of such practices are often non-existent or
extremely difficult to exercise.
Principles for Protecting Privacy
The key issue of privacy in the Internet marketplace is that the privacy rights of individuals
should be balanced with the benefits associated with the free flow of information. Protecting
privacy must be undertaken in combination with a number of other efforts. There are three main
parties involved, each playing different roles:
• Government: promoting strong privacy laws for both the public and private sectors;
establishing independent privacy commissions to oversee the implementation of these laws;
educating the
public about privacy issues; encouraging business self-regulation.
• Businesses: promoting self-regulation for fair information practices.
• Individuals: adopting privacy enhancing technologies, such as network and information
security tools.
6. Summary:
According to the article the writers Wilinsky and Sylvester says that there are many activities
has been going on the internet but with bad effects the consumers individually. The
marketing purposes have been targeted in the selling for the consumer and have a bases
database for selling also. Also recent years have been seen that the number of cases about the
privacy is increasing because the fears of the privacy are not welcomed and other reason of
the privacy that the internet followed the history of use and favorites on the personal profiles
and other reason that the internet can follow the personal users when they sending MSN.3
Opinion:
My point of view, the negative activates in the internet are wider in the all over the world and
the consumers get affected from it in bad way. Also the consumer’s privacy database has
been sold in the internet and we have to be careful when we put the data in the internet.
Although, the consumer don’t know that the internet can take the privacy data and also the
more threats have been show up in the internet that harm the consumer privacy. With sending
with MSN the user is sure of sending personal thing with emails that are protected and easy
to use.
3
Wilinsky, C. and Sylvester, J. Privacy in the telecommunications age. Commun. ACM 35, 2 (Feb. 1992), 23–25.
Word Meaning
11 Junk To get rid of something because it is old or useless
12 Cornerstone Something that is extremely important because
everything else depends on it
13 Database A large amount of data stored in a computer system so
that you can find and use it easily
14 Malicious Very unkind and cruel, and deliberately behaving in a
way that is likely to upset or hurt someone
15 Sidewalk A hard surface or path at the side of a street for people
to walk on