Analysing Privacy Analyses
نویسندگان
چکیده
The debate on people’s right to privacy and on the meaning of privacy is ongoing worldwide, for example in Europe over the newly adopted General Data Protection Regulation. By contrast, works in the area of formal e-voting privacy analysis, which aim at assessing the privacy preservation of a target e-voting system by means of mathematical rigour, appear to have reached a well-known plateau. This plateau is called indistinguishability. However, also other works look at privacy from a formal standpoint, though on different grounds. Notable ones are unlinkability and minimal information disclosure. This paper provides a contrastive argument about the three mentioned approaches by discussing the intuition behind each of them and by assessing their respective pros and cons. The ultimate aim is to revamp the privacy debate also at the level of formal analysis.
منابع مشابه
Analysing Privacy-Invasive Software Using Computer Forensic Methods
User privacy is widely affected by the occurrence of privacy-invasive software (PIS) on the Internet. We present a computer forensic investigation method for detecting and analysing PIS. In an experiment we use this method to evaluate both the evolution of PIS and associated countermeasures, over a four year period. Background information on both PIS and countermeasure techniques are also prese...
متن کاملSNS and 3rd Party Applications Privacy Policies and their Construction of Privacy Concerns
In this paper we use template analysis to study the content of privacy policies both of online social networks as well as 3 party application providers. After analysing and prioritising the topics mentioned in these policies, we discuss potential problems, limitations of privacy policies, and the responsibilities they assign to various stakeholders. These findings will, in future work serve as ...
متن کاملTowards an effective PIA-based Risk Analysis: An Approach for Analysing Potential Privacy Risks
The use of Privacy Impact Assessments (PIAs) has become common practice in a variety of jurisdictions since the mid 1990s. They play a crucial role in achieving privacy protection for data subjects and in supporting risk management for organisations. Many guidance documents have been published to help support organisations in performing PIAs and in achieving their intended benefits. However, th...
متن کاملPrivacy Conflicts in CRM Services for Online Shops: A Case Study
Sophisticated Data Mining tools are able to provide valuable information for online retailers. But especially when an external data mining service provider is contracted, important questions arise concerning the privacy preservation of the shop customers. This paper discusses the specific case of an online retailer who aims at usefully analysing customers’ data for product and capacity planning...
متن کاملA Method for Analysing Traceability between Privacy Policies and Privacy Controls of Online Social Networks
Privacy management in online social networks (OSNs) is a major concern. However, the complexity of privacy policies and the plethora of privacy controls make it very difficult to assess whether the controls adequately implement the intended policies. This paper proposes a method to assess the degree of traceability between privacy policies and privacy controls in OSNs. The resulting analysis en...
متن کامل