Reverse Privacy Engineering
نویسنده
چکیده
Facing the problems of personal data industrialization, many technical and legal solutions have been proposed. Pro-privacy legislation and new design patterns try to make engineers and merchants more responsible. Although these efforts must be maintained from these actors, we believe that such a consideration for privacy, focused on commercial transactions, leaves the individual subjects and their social interactions at the deadlock. We suggest reversing privacy engineering by empowering users in context. Thus we propose to model privacy among the concept of “privatory framework” [11], then compare face-to-face and computer-mediated privatory frames, mainly in social network sites (SNS). From these results, we can discuss technical potential allowing the user to completely define privatory framework of her computer-mediated social interactions.
منابع مشابه
Secure collaboration in design and supply chain management
Increasing global competition has led to massive outsourcing of manufacturing businesses. Such outsourcing practices require effective collaborations between the manufacturing companies and their partners by sharing a large amount of information. In the meantime, since some of the partners are also potential competitors, protection of confidential information, particularly intellectual property...
متن کاملMalicious Behavior Monitoring for Android Applications
Android, as a modern popular open source mobile platform, makes its security issues more prominent, especially in user privacy leakage. In this paper, we proposed a twostep model which combines static and dynamic analysis approaches. During the static analysis, permission combination matrix is used to determine whether an application has potential risks. For those suspicious applications, based...
متن کاملA Robust Data-obfuscation Approach for Privacy Preservation of Clustered Data
Privacy is defined as the freedom from unauthorized intrusion. The availability of personal information through online databases such as government records, medical records, and voters’ lists poses a threat to personal privacy. Intelligent search engines and data mining techniques further exacerbate the problem of privacy by simplifying access and retrieval of personal records. Data Obfuscation...
متن کاملPeer-to-Peer Privacy Preserving Reputation Inquiry: An Agent Assistant Approach
This research presents a privacy preserving peer-to-peer communication mechanism that allows peers using their personal agents to obtain reputation information of each other through a pair of trustworthy mediator proxies. A mediator proxy is considered trustworthy, if even when it is compromised, it can guarantee three conditions: (1) the anonymity of the identity of the responders and the targ...
متن کاملWeaknesses in BankID, a PKI-Substitute Deployed by Norwegian Banks
BankID is a PKI-substitute widely deployed by Norwegian banks to provide digital signatures and identification on the internet. We have performed a reverse-engineering of part of the BankID system and analysed the security protocols and the implementation of certain cryptographic primitives. We have found cryptographic weaknesses that may indicate security problems, protocol flaws facilitating ...
متن کامل