Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2022, SSRN Electronic Journal
https://doi.org/10.2139/ssrn.4326794…
7 pages
1 file
Recent decades have produced a wide variety of technical tools for privacy protection. However, the hopes placed in these tools are often inflated. Overestimating the protective effect of privacy-enhancing technologies can be dangerous and may lead to a false sense of security. This chapter stresses that the following aspects need to be born in mind when assessing the real impact of technical privacy safeguards: (1) Data controllers’ reluctance to apply self-limiting privacy safeguards, (2) the loophole created by the notice-and-choice approach to privacy protection, (4) technical challenges and limitations, (4) the limited scope of protection that privacy-enhancing technologies can offer. Also, many problems associated with the processing of personal data are not primarily of technical nature but involve fundamental social, ethical, and political questions. There is no doubt that technical tools play a crucial part in protecting people’s privacy today. They are necessary but not sufficient. To meaningfully protect people against the dangers resulting from modern data processing, strong regulation is needed as well.
Innovation: The European Journal of Social Science Research, 2013
Privacy and data protection are recognized as fundamental human rights. 1 They underpin human dignity and other values such as freedom of association and freedom of speech. Indeed they have become two of the most important human rights of the modern age. However, new technologies undermine individual rights because they facilitate the collection, storage, processing and combination of personal data for the use not only of government agencies, but also of businesses.
2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)
This paper deals with the hot, evergreen topic of the relationship between privacy and technology. We give extensive motivation for why the privacy debate is still alive for private citizens and institutions, and we investigate the privacy concept. This paper proposes our vision of the privacy ecosystem, introducing privacy dimensions, the related users' expectations, the privacy violations, and the changing factors. We provide a critical assessment of the Privacy by Design paradigm, strategies, tactics, patterns, and Privacy-Enhancing Technologies, highlighting the current open issues. We believe that promising approaches to tackle the privacy challenges move in two directions: (i) identification of effective privacy metrics; and (ii) adoption of formal tools to design privacy-compliant applications.
Information & Communications Technology Law, 2020
In recent years, research within and outside the European Union (EU) has focused on the expanding scope of personal data. The analysis provided has primarily supported the conclusions that in time, personal data will become so ubiquitous that the EU data protection law would become meaningless, unreasonable, or even discredited and ignored. Notwithstanding these criticisms, EU law is promoted as the 'gold standard' for data protection laws and the law, including its definition of personal data, is being rapidly adopted by many non-EU countries. The objective of this article is to analyse the concept of personal data under EU law and to explore its continued relevance within a data protection framework that is rapidly globalised and in which technology is continuously evolving. The article argues that far from reflecting a universal notion of data protection, the EU law and particularly its definition of personal data reflects a perception of privacy that is peculiarly European. It further argues that recent developments in technology call for a re-examination of the concept of personal data and a more critical approach by countries with nascent data protection regimes. The article proposes the 'objective risk of contextual harm' as a new approach for formulating an alternative definition of personal data. It concludes that this approach better articulates the construction of data protection as a social good and a mechanism for (consumer) protection.
2015
In this paper we explore the extent to which privacy enhancing technologies (PETs) could be effective in providing privacy to citizens. Rapid development of ubiquitous computing and 'the internet of things' are leading to Big Data and the application of Predictive Analytics, effectively merging the real world with cyberspace. The power of information technology is increasingly used to provide personalised services to citizens, leading to the availability of huge amounts of sensitive data about individuals, with potential and actual privacy-eroding effects. To protect the private sphere, deemed essential in a state of law, information and communication systems (ICTs) should meet the requirements laid down in numerous privacy regulations. Sensitive personal information may be captured by organizations, provided that the person providing the information consents to the information being gathered, and may only be used for the express purpose the information was gathered for. Any other use of information about persons without their consent is prohibited by law; notwithstanding legal exceptions. If regulations are properly translated into written code, they will be part of the outcomes of an ICT, and that ICT will therefore be privacy compliant. We conclude that privacy compliance in the 'technological' sense cannot meet citizens' concerns completely, and should therefore be augmented by a conceptual model to make privacy impact assessments at the level of citizens' lives possible.
International Journal of E-Business Research, 2005
Increasingly, the Internet is used as a common tool for communication, information gathering, and online transactions. Information privacy is threatened as users are expected to reveal personal information without knowing the consequences of sharing their information. To that end, research groups, both from academia and industry, have embarked on the development of privacy enhancement technologies. One such technology is Platform for Privacy Preferences (P3P). Developed by the World Wide Web Consortium (W3C), P3P has a number of prominent stakeholders such as IBM, Microsoft, and AT&T. Yet, there is little published information on what P3P is and to what extent it is being adopted by e-business organizations. This study is exploratory in nature and aims at addressing these questions; in particular, we look at P3P both as a new technology and as a standard. We use our empirical data on top 500 interactive companies to assess its adoption.
2013
After the recent spread of the Internet, many technology terms appeared like Smartphone, social media and cloud computing. Flexibility in use this technology encourage people to communicate and share their information in all kinds: photos, videos, documents and sometimes sensitive information like bank account. Annually we note the increased number of users of this technology to be arrived over billions of users. Most of these users are public which they do not realize ambiguity of technology and therefore easier to access their information. The abundance of information and poor knowledge of users about privacy led to the emergence of numerous threats and fears under this term. Thus, the importance of educating people about privacy issues and related risk factors become essential. This paper views the definition of privacy and what level of awareness should be applied. With try to understand some security issues and related laws. And compare between two different privacy laws.
Innovation: The European Journal of Social Science Research, 2013
This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example as manifested by increasing surveillance) with the fundamental right of privacy? Our political masters justify their intrusions upon our privacy with proclamations of the need to protect the citizenry against further terrorist attacks like those that have already marred the early 21 st century, The surveillance industry has been quick to exploit this new market opportunity, supported as it is by inexorable technological "progress" in devising new ways to infringe upon our privacy. The trade-off has troubled academics. While the European Commission has been devoting billions of euro to security research, it too is troubled by the trade-off paradigm. It is funding the PRISMS project which will undertake a major public opinion survey on privacy and security and which aims to formulate a decision support system which should offer an alternative to the traditional trade-off model.
Anali Pravnog fakulteta u Beogradu, 2014
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Proceedings of the 8th International Conference on Cloud Computing and Services Science, 2018
SSRN Electronic Journal, 2000
Oxford University Press eBooks, 2020
Innovation–The European Journal of Social Science Research, 2010
Computer Law & Security Review, 2012
IEEE Transactions on Software Engineering, 2009
Metaphilosophy, 1997
International Journal of Advanced Research in Computer Science, ISSN No. 0976-5697, Volume 8, No. 7, July-August 2017, 2017
Privacy Technologies and Policy, 2018
California Law Review, 1999
Health and Technology, 2017
Mobility, Data Mining and Privacy, 2008