Identity in the Information Society 3 (2):247-251 (2010)
Abstract |
In November, 2009, a prominent group of privacy professionals, business leaders, information technology specialists, and academics gathered in Madrid to discuss how the next set of threats to privacy could best be addressed.The event, Privacy by Design: The Definitive Workshop, was co-hosted by my office and that of the Israeli Law, Information and Technology Authority. It marked the latest step in a journey that I began in the 1990’s, when I first focused on enlisting the support of technologies that could enhance privacy. Back then, privacy protection relied primarily upon legislation and regulatory frameworks—in an effort to offer remedies for data breaches, after they had occurred. As information technology became increasingly interconnected and the volume of personal information collected began to explode, it became clear that a new way of thinking about privacy was needed.Privacy-Enhancing Technologies paved the way for that new direction, highlighting how the universal pr ..
|
Keywords | Privacy by design Privacy-enhancing technologies Positive-sum |
Categories | (categorize this paper) |
DOI | 10.1007/s12394-010-0062-y |
Options |
![]() ![]() ![]() |
Download options
References found in this work BETA
No references found.
Citations of this work BETA
Online Security and the Protection of Civil Rights: A Legal Overview. [REVIEW]Ugo Pagallo - 2013 - Philosophy and Technology 26 (4):381-395.
Cracking Down on Autonomy: Three Challenges to Design in IT Law. [REVIEW]U. Pagallo - 2012 - Ethics and Information Technology 14 (4):319-328.
ISPs & Rowdy Web Sites Before the Law: Should We Change Today’s Safe Harbour Clauses?Ugo Pagallo - 2011 - Philosophy and Technology 24 (4):419-436.
Semantic Web Regulatory Models: Why Ethics Matter.Pompeu Casanovas - 2015 - Philosophy and Technology 28 (1):33-55.
Privacy-Centered Design for Social Robots.Tanja Heuer, Ina Schiering & Reinhard Gerndt - 2019 - Interaction Studies. Social Behaviour and Communication in Biological and Artificial Systemsinteraction Studies / Social Behaviour and Communication in Biological and Artificial Systemsinteraction Studies 20 (3):509-529.
Similar books and articles
A Pragmatic Approach to Privacy Risk Optimization: Privacy by Design for Business Practices. [REVIEW]Terry McQuay & Ann Cavoukian - 2010 - Identity in the Information Society 3 (2):379-396.
Privacy by design: delivering the promises. [REVIEW]Peter Hustinx - 2010 - Identity in the Information Society 3 (2):253-255.
Remote Home Health Care Technologies: How to Ensure Privacy? Build It In: Privacy by Design.Ann Cavoukian, Angus Fisher, Scott Killen & David A. Hoffman - 2010 - Identity in the Information Society 3 (2):363-378.
SmartPrivacy for the Smart Grid: Embedding Privacy Into the Design of Electricity Conservation. [REVIEW]Ann Cavoukian, Jules Polonetsky & Christopher Wolf - 2010 - Identity in the Information Society 3 (2):275-294.
Extending the Value Chain to Incorporate Privacy by Design Principles.Julie Smith David & Marilyn Prosch - 2010 - Identity in the Information Society 3 (2):295-318.
PETs and their users: a critical review of the potentials and limitations of the privacy as confidentiality paradigm. [REVIEW]Seda Gürses - 2010 - Identity in the Information Society 3 (3):539-563.
Layering Privacy on Operating Systems, Social Networks, and Other Platforms by Design.Dawn N. Jutla - 2010 - Identity in the Information Society 3 (2):319-341.
Analytics
Added to PP index
2010-12-05
Total views
97 ( #119,139 of 2,499,277 )
Recent downloads (6 months)
9 ( #80,200 of 2,499,277 )
2010-12-05
Total views
97 ( #119,139 of 2,499,277 )
Recent downloads (6 months)
9 ( #80,200 of 2,499,277 )
How can I increase my downloads?
Downloads