Protecting ‘privacy’ through control of ‘personal’ data processing: A flawed approach

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protecting the Privacy of Personal Smart Spaces

The purpose of privacy protection is dual, as it aims to both prevent, as well as cure privacy breaches. The starting point to develop such a privacy protection framework is the investigation and the definition of the privacy breach concept. A widely acceptable answer to this is provided by the privacy protection regulation, which however does not provide a precise enough definition of the priv...

متن کامل

Protecting Privacy Against Location-Based Personal Identification

This paper presents a preliminary investigation on the privacy issues involved in the use of location-based services. It is argued that even if the user identity is not explicitly released to the service provider, the geo-localized history of user-requests can act as a quasi-identifier and may be used to access sensitive information about specific individuals. The paper formally defines a frame...

متن کامل

A framework for protecting personal information and privacy

User’s security and privacy are core issues of network applications. This paper proposes a privacy protection model to evaluate property risk of users, which takes into account both sensitivity of the property and requester’s level of assurance. Furthermore, the sensitivity of the property is evaluated by problem of expectation–maximization algorithm. Experiments show that the optimal size of s...

متن کامل

Marking: A Privacy Protecting Approach Against Blackmailing

Electronic payment systems based on anonymous coins have been invented as a digital equivalent to physical banknotes. However, von Solms and Naccache discovered that such anonymous coins are also very well suited to support criminals in blackmailing. In this paper we present a payment system, which has an efficient tracing and revocation mechanism for blackmailed coins. The used tracing method ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Review of Law, Computers & Technology

سال: 2009

ISSN: 1360-0869,1364-6885

DOI: 10.1080/13600860902742562