Introduction. Chapter 1

AuthorLeani Marlie Van Schalkwyk
Published date01 January 2005
Pages1-11
Date01 January 2005
DOI10.10520/EJC74045
CHAPTER 1
INTRODUCTION
1. General introduction1
The era in which we find ourselves demonstrates the rapid deve-
lopment of technology.Information that would have been practically
inaccessible a few years ago is available to anyone with a computer
or Internet2access. In the beginning of the previous century every-
body’s personal papers and details were kept in their houses and
places of business. Today this detailed information is on computer
disks. It is in most instances not even in our possession but is in
the custody of third parties — banks, insurance companies, medical
institutions and employers, to only name a few.
With the progress associated with technology and the information
industry, life has become much more convenient. Banks claim that
a person can do his or her necessary banking in front of the com-
puter at any convenient time. Online shops and merchants lure
“shoppers” into the magical world of cyber malls where you can
purchase anything your heart desires without leaving the comfort
of your own home.
This accessibility to innumerable opportunities can pose a danger
to the individual. The darker side of progress has many times been
coined as an involuntary sacrifice of privacy and the peace of mind
that your interests are safe.
Information is constantly being gathered, filtered and processed for
different purposes. How can a person ensure that information that
was intended not to be freely available is not publicised?
The green paper on e-commerce3worded this dilemma quite clearly:
“Privacy or the lack thereof, is a major concern for individuals in the
use of the electronic medium in commerce.This includes not only the
privacy of the communication between the parties in a transaction
e.g. the protection of credit and debit card numbers while traversing
the Internet, or of other personal details, which can be solved through
the use of encryption; but also the accumulation of personal data
at web sites4visited, for example through the use of “cookies”.5
1
1 Because of the technical nature of this study a list of relevant defini-
tions and terms is supplied at the end of this dissertation in the form
of a list of key terms for purposes of reference.
2 See page 104 in the list of key terms.
3 See chapter 3 (3.1)
4For a definition of “Web site” see page 106 in the list of key terms.
5See chapter 2 (2.1.2) and page 103 in the list of key terms.

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT