CS 5431 – Computer Security

نویسنده

  • Eleanor Birrell
چکیده

There is no universally accepted definition of privacy. It is variously referred to as a right or a privilege, a descriptive concept or a normative one, a question of secrecy or of control. Several efforts have been made to formally define privacy, but none are universally accepted. One definition that has had a lot of influence over the years, particularly on legal interpretations of privacy, was introduced by Samuel Warren and Louis Brandeis in a Harvard Law Review article in 1890. They described privacy as “the right to be left alone,” more specifically the right of individuals to prevent publication of certain information against their will. This definition focused exclusively on secrecy: Warren and Brandeis believed that the right to privacy ceases after consensual publication. More recently, philosopher Helen Nissenbaum has defined privacy as contextual integrity. By this she means that uses are considered to be privacy violations if they occur outside an appropriate context. Whether a context is appropriate might depend on time, location, purpose, and/or participating principals. Despite the lack of consensus regarding a formal definition of privacy, most people have their own intuitive notion of what privacy means to them; at the very least, they know it when they see it. These ideals can impose external design constraints— either in the form of legal requirements or customer preferences—that influence how computer systems store, use, and share data.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CS 5431 – Computer Security Practicum Spring 2017 Lecture 5 : Key Management

So far, you have seen an overview of the basic cryptographic protocols that are used to secure a variety of modern systems. In 5430, you talked about symmetric encryption (e.g., AES), asymmetric encryption (e.g., RSA, El Gamal), hybrid encryption, MACs, digital signatures, and key agreement protocols. This means you are now familiar with many of the essential cryptographic building blocks that ...

متن کامل

Cybersecurity Policy Compliance: An Empirical Study of Jamaican Government Agencies

In addition to implementing technological tools, entities have adopted cybersecurity policies (CSPs) to address the rising number of employee related cybersecurity (CS) incidents. If however, employees do not understand the importance of or are unwilling to comply with CSPs, CS efforts may be in vain. This study investigates employees’ actual CS compliance behaviour. Informed by the literatures...

متن کامل

The Advanced Course in Engineering on Cyber Security

The Advanced Course in Engineering on Cyber Security (ACE-CS) is a publicprivate partnership to develop top ROTC cadets into the next generation of cyber security leaders. Modeled after the General Electric Advanced Course in Engineering, ACE-CS immerses students in the cyber-security discipline through a combination of intense coursework, open-ended problems, and concurrent internships. In thi...

متن کامل

Characterizing Payments Among Men with No Names

Damon McCoy is an assistant professor in the CS department at George Mason University. He obtained his PhD from the University of Colorado, Boulder, and his research includes work on anonymous communication systems, cyber-physical security, e-crime, and wireless privacy. [email protected] Geoffrey M. Voelker is a Professor of Computer Science at the University of California, San Diego. He w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017