Tell me…Do you really pay attention to the Privacy rules online or just pass it as quick as possible?


Do we really have privacy when we go online? Well, there is still a debate about it.  A long time ago when we all have no idea about the Internet, the term of ‘privacy’ can be simpler than it is now. Before the age of the Internet, you stay in your room and watch TV or read a comic book or write a diary without anyone watching you, no one knows what you are doing behind the door. This is called the freedom of a person without surveillance. Time flies till the day Mr. Internet comes and knocks at your door in a very gracious and trendy suit bonus a gentle smile, promises us a bright future.  Apparently, no one can resist him. We invite him in with a big hope. Conversely, we don’t know or maybe we don’t care about ‘those data’ which Mr. Internet brings along with him are extremely dangerous… Those data work like detective; they silently collect our information, our personal material that we provide online, they silently watch us doing things, surfing web. Our online privacy is no privacy at all. When we use social media such as Facebook, Twitter, Myspace… All of the information about us are saved somewhere in the cyberspace and anyone can find or access it. Hence, without cautious, people can easily get involved in serious trouble.


Recently, a fresh wind blows ‘Facebook’ to Iran. To Iranian, Facebook is something related to ‘Freedom’ in their mindset. However, to the Government, Facebook is a mousetrap for dissident, is a tool to help the government control the social and politic of Iran. Consequently, a photographer named Soheil Arabi was imprisoned and punished to death for his offend about the Prophet of Islam by using his Facebook account. (Rigot 2014). This is an example of using social media without cautious, the police can easily find out your information and catches you anytime if you say something sensitive related to Government policy.


Another story that gets in privacy concern is the announcement of changing privacy policy by Google in 2012. Google will add posts from Google Plus and put it into search results. This creates controversy and criticism as people who use Google Plus don’t want or even they don’t know if their post will appear in the search results (Miller, C 2012). By that, everyone can easily search for their information and steal their privacy. To reinforce the idea of privacy, a specific case that happens in Vietnam several years ago, as we all remember Hoang Thuy Linh – Nhat Ky Vang Anh. She has a scandal in 2007 when her boyfriend uploads the sex video clip of them online. It happens 8 years ago but till now, it still has a negative impact on Hoang Thuy Linh career. She is excluded from the music show ‘The Remix’ 2015 because of her scandal in the past (Phu Nu News, 2015).


Optimistically, there are remaining ways for users to protect their online privacy such as using high-quality version of virus protection, setting security policy for their own, blocking pop-ups, creating online firewall, managing cookies and so on (Youn, 2009). However, not many people know how to set up these things as this is the “IT” thing and yes, it’s a complicated process with many steps (Larose & Rifon 2007). How can we request a normal person to create their own network security while they have no idea about it? The debate is on-going.


Larose, R & Rifon, J 2007, ‘Effects of Privacy Warnings and Privacy Seals on Risk Assessment and Online Privacy Behavior’, Journal Of Consumer Affairs, vol.41, iss.1, pp.127–149

Miller, C 2012, ‘Google To Update Privacy Policy to Cover Wider Data Use’, NY Times, viewed on 15th March 2015, <>

Phu Nu News, 2015, ‘Hoang Thuy Linh bi the Remix loai vi scandal khung khiep sau vu clip sex’, Phu Nu News, viewed on 15th March 2015, <>

Rigot, A 2014, ‘Facebook – A double-Edged sword’, Article 19, viewed on 15th March 2015, <>

Youn, S 2009, ‘Determinants of Online Privacy Concern and Its Influence on Privacy Protection Behaviors Among Young Adolescents’, Journal of Consumer Affair, vol.43, iss.3, pp.389–418


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s