Thinking Outside the Box: Considering Transparency, Anonymity, and Pseudonymity as Overall Solutions to the Problems of Information Privacy in the Internet Society

نویسنده

  • TAL Z. ZARSKY
چکیده

Preamble . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1302 R I. Transparency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1305 R I.1. What Is Transparency? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1305 R Required Opacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1311 R The Information “Hubs” – Location, Interaction, and Transaction . 1313 R I.2. Transparency and the Practical Harms to Society . . . . . . . . . . . . . . . . . . . . 1315 R (a) Fear of Abuse and Criminal Misuse . . . . . . . . . . . . . . . . . . . . . . . . . . 1316 R (b) Fear of Errors in Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1319 R (c) Price Discrimination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1320 R (d) Manipulation and the “Autonomy Trap” . . . . . . . . . . . . . . . . . . . . . . . 1325 R I.3. Transparency as “Leveling the Playing Field”? . . . . . . . . . . . . . . . . . . . . . . 1331 R Leveling vs. Mining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1332 R II. Anonymity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1334 R II.1. What Is Anonymity? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1334 R II.2. The Troubles of the Anonymous Society . . . . . . . . . . . . . . . . . . . . . . . . . . . 1337 R Anonymity’s Enemies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1339 R III. Pseudonymity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1340 R III.1. What is Pseudonymity? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1340 R Traceable vs. Untraceable Pseudonymity . . . . . . . . . . . . . . . . . . . . . . 1341 R Traceable Pseudonymity: How Can It Be Done? . . . . . . . . . . . . . . . . 1342 R Pseudonymity and Identity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1344 R III.2. Pseudonymity, the Data Flow, and the Detriments of Surveillance . . . . . . 1345 R III.3. Pseudonymity and the Troubles of Anonymity . . . . . . . . . . . . . . . . . . . . . . 1349 R III.4. The Troubles of Pseudonymity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1350 R (a) Keeping Up the Walls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1350 R (b) “Virtual Babies and Virtual Bathwater” . . . . . . . . . . . . . . . . . . . . . . . 1353 R Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1354 R

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymity Online for Everyone: What Is Missing for Zero-Effort Privacy on the Internet?

Privacy is difficult to protect on the Internet, because surveillance is ubiquitous. Researchers have conceived many different countermeasures. However, these solutions have so far failed to find widespread adoption due to poor performance and usability. What is missing is an Internet access that offers a decent level of privacy for average users out of the box. In this paper, we survey suitabl...

متن کامل

Privacy-Preserving Digital Rights Management

Digital Rights Management (DRM) is a technology that provides content protection by enforcing the use of digital content according to granted rights. DRM can be privacy-invasive due to many reasons. The solution is not easy: there are economic and legitimate reasons for distributors and network operators to collect data about users and their activities, such as traffic modelling for infrastruct...

متن کامل

[Name Withheld]: Anonymity and Its Implications

Anonymity allows the individual to have a voice without having a name. Since the word “anonymous” entered the English language with the advent of the printing press, the implications of being anonymous and its lexical offspring “anonymity” have shifted with time, place, and circumstance. What are the perceived effects of being anonymous/anonymity on the individual and on society? In this paper,...

متن کامل

Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case

The paper presents a Pan-European Identity Management System that was developed through the concerted efforts of several European research initiatives, and identifies gaps in the privacy protection mechanisms, which occur because privacy is considered strictly from the EU Data Protection regulation perspective. Privacy protection problems are identified, and measures to eliminate them are outli...

متن کامل

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004