Selective Privacy in a Web-Based World: Challenges of Representing and Inferring Context
نویسندگان
چکیده
There is a growing awareness and interest in the issues of accountability and transparency in the pursuit of digital privacy. In previous work, we asserted that systems needed to be “policy aware” and able to compute the likely compliance of any digital transaction with the associated privacy policies (law, rule, or contract). This paper focuses on one critical step in respecting privacy in a digital environment, that of understanding the context associated with each digital transaction. For any individual transaction, the pivotal fact may be context information about the data, the party seeking to use it, the specific action to be taken, or the associated rules. We believe that the granularity of semantic web representation is well suited to this challenge and we support this position in the paper. From “Privacy” to “Selective Privacy” When coined, apparently by scrivener error nearly five hundred years ago [1], “privacy” meant to seclude or keep out. Over the many years since, its definition has expanded to include the concepts of being free from public attention, being free from intrusion or interference, and having personal volition about that freedom. Today, with voluminous information about each individual already having crossed the digital privet hedge, it is too late to consider digital privacy as the ability to hold back one’s personal information. Now, it must mean the ability to selectively control the use of that data based upon the context of the transaction. This is not a wholly new concept. In the physical world, we provide far less detail about our social, family, and medical lives with our business associates than we do with family and friends. Conversely, we generally provide less financial details of our life to our social network than our commercial one. And, we sub-divide these decisions much more granularly – providing more detailed financial information when seeking a mortgage than when making a deposit or providing medical information to a supervisor in order to obtain a work variance – according to context. Our personal rules for privacy are kaleidoscopic, changing as the situation changes. So, too, in the commercial and governmental environments, the written rules for privacy are heavily laced with contextual terms and conditions. Medical professionals may look at patient physical health records if they are treating the individual or providing institutional oversight (actor context); they are permitted more limited review if they are addressing insurance or other financial issues (event context) or if the records contain mental health information (data context). Financial professionals are permitted to seek and review more personal information when opening an account than when engaging in day-to-day transactions (event context). Government agencies must apply the Privacy Act [2] to the use of any data; this requires the application of some rules universally, but also the application of different rules per data repository (rule context). As implied by these examples, we take the broad view of privacy rules, meaning any rule which seeks to limit access to information about an individual or an identifiable group for the purpose of protecting them from harm. We previously focused on the importance of accountability and transparency in the arsenal of privacy protection. [3] This paper focuses on the importance of context in successfully modeling the decision process for privacy protection. It also describes how decision systems that rely solely on actor’s role, data content, and action, while incrementally useful – and possible to make transparent – fail to meet the nuanced requirements and expectations of privacy policy – and, therefore, can’t be fully accountable. We believe Web-based systems can meet the need for obtaining decision-relevant data from beyond the locus of the transaction and further posit that semantic web based systems can provide the level of
منابع مشابه
Prediction of user's trustworthiness in web-based social networks via text mining
In Social networks, users need a proper estimation of trust in others to be able to initialize reliable relationships. Some trust evaluation mechanisms have been offered, which use direct ratings to calculate or propagate trust values. However, in some web-based social networks where users only have binary relationships, there is no direct rating available. Therefore, a new method is required t...
متن کاملRepresenting a method to identify and contrast with the fraud which is created by robots for developing websites’ traffic ranking
With the expansion of the Internet and the Web, communication and information gathering between individual has distracted from its traditional form and into web sites. The World Wide Web also offers a great opportunity for businesses to improve their relationship with the client and expand their marketplace in online world. Businesses use a criterion called traffic ranking to determine their si...
متن کاملارایه یک روش جدید انتشار دادهها با حفظ محرمانگی با هدف بهبود دقّت طبقهبندی روی دادههای گمنام
Data collection and storage has been facilitated by the growth in electronic services, and has led to recording vast amounts of personal information in public and private organizations databases. These records often include sensitive personal information (such as income and diseases) and must be covered from others access. But in some cases, mining the data and extraction of knowledge from thes...
متن کاملمفهوم محرمیت در شهرهای اسلامی
Regarding the key theme of the paper, visual privacy, it is first necessary to review the content of urban studies to find out why/how has privacy been discussed or ignored in urban studies to date. Instead of direct reference to the privacy, the urban studies literature mainly highlights the concepts of territoriality and personal space, two ways in which people create different types of bound...
متن کاملPrivacy Preserving Dynamic Access Control Model with Access Delegation for eHealth
eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...
متن کامل