Beyond Secrecy: New Privacy Protection Strategies for the World Wide Web
نویسنده
چکیده
In 1967, Alan Westin [1] set in motion the foundations of what most Western democracies now think of as privacy when he published his book, Privacy and Freedom. He defined privacy as ”the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.” His careful collection of sociological, legal, and historical perspectives on privacy came at a time when people worried that human dignity would erode or that governments would tend toward tyranny, becoming tempted to misuse their newfound power over private data. Computer scientists shared these concerns. Following Westin’s emphasis on privacy as confidentiality, much of the security and privacy research over the last four decades has concentrated on developing more and more robust access control and confidentiality mechanisms. Today, despite the fact that technical innovation in cryptography and network security has enabled all manner of confidentiality control over the exposure of identity in information systems, the vast majority of Internet user remain deeply worried about their privacy rights and correctly believe that they are far more exposed today than they might have been a generation earlier. Have we just failed to deploy the proper security technology to protect privacy, are our laws inadequate to meet present day privacy threats, or is have business practices and social conventions simply rendered privacy dead? While there is some truth to each possibility, the central failure to achieve robust privacy in the information age can be traced to an a long-standing mis-identification of privacy with confidentiality and access control. Privacy protection in an era in which information flows more freely than ever will require increased emphasis on laws that govern how we can use personal data, not just who can collect it or how long they can store it. Much of our current privacy views are based on controlling access to information. We believed that
منابع مشابه
Privacy Enforcement and Accountability with Semantics (peas2007) Iswc 2007 Sponsor Workshop Motivation and Goal beyond Secrecy: New Privacy Protection Strategies for the World Wide Web Semantic-driven Enforcement of Rights Delegation Policies via the Combination of Rules and Ontologies
We show that the semantic formal model for Open Digital Right Language (ODRL)-based rights delegation policies can be enforced and expressed as a combination of ontologies and rules, e.g., Semantic Web Rule Language (SWRL). Based on ODRL’s expressions and data dictionary, a rights delegation ontology is proposed in this study. Furthermore, we express the rights delegation policy as a set of ont...
متن کاملTransparent Accountable Data Mining: New Strategies for Privacy Protection
Attempts to address issues of personal privacy in a world of computerized databases and information networks -from security technology to data protection regulation to Fourth Amendment law jurisprudence -typically proceed from the perspective of controlling or preventing access to information. We argue that this perspective has become inadequate and obsolete, overtaken by the ease of sharing an...
متن کاملA Novel Biometrics-based One-Time Commitment Authenticated Key Agreement Scheme with Privacy Protection for Mobile Network
In recent years, due to the wide applications of social network and electronic business, privacy protection in the cyber world has attracted much attention. And in general, in order to solve the problems to set up a secure channel over public Internet, authenticated key agreement protocols can be adopted because it can achieve authentication of the corresponding participants and confidentiality...
متن کاملW3C Geolocation API calls for Better User Privacy Protection
The W3C’s Geolocation API will be able to standardize rapidly the transmission of location information of users on the Web. However, such sensitive information raises serious privacy concerns especially in the mobile Internet. Our position is that the introduction of this API has to be complemented with additional means in order to prevent privacy violations originating from combining location ...
متن کاملAnonymity, Privacy and Cyberspace
This paper examines some of the issues relating to the protection of privacy on-line, specifically whether anonymity is a necessary and proportionate response to the issues raised. The subject is considered in the light of the relationship between anonymity and privacy, the application of existing data protection law, current proposals and the possibility that increased anonymous use of the Int...
متن کامل