Издательство Auerbach Publications, 2008, -494 pp.
Privacy as a social and legal issue has been a conce of social scientists, philosophers, and lawyers for a long time. Back in 1890, two American lawyers, S. Warren and L. Brandeis, defined privacy as the right of an individual to be alone, and it has been recognized as a fundamental human right by the United Nations Declaration of Human Rights, the Inteational Convenant on Civil and Political Rights, the Charter of Fundamental Rights of the European Union, and many other inteational treaties. Therefore, in democratic societies the protection of privacy is a crucial issue.
Meanwhile, the intensive development of information and communication technologies has resulted in numerous new electronic services that aim to improve people’s lives by allowing them to communicate and exchange data through the Inteet, advertise their ideas through the World Wide Web, and purchase goods and services. To a large extent, the raw material for most of these electronic services is the personal data of individuals. Alongside the benefits for the people, these developments have introduced new risks such as identity theft, discriminatory profiling, continuous surveillance, and fraud. According to recent surveys, privacy and (especially) anonymity, are the fundamental issues of conce for most Inteet users, ranked higher than issues like ease-of-use, spam-mail, cost, and security. In view of the above, the OECD Declaration on the Protection of Privacy on Global Networks (for developing a culture of privacy in the Global Village) is especially well timed.
In this volume, privacy is considered as the indefeasible right of an individual to control the ways in which personal information is obtained, processed, distributed, shared, and used by any other entity.
Part I: The Privacy Space
Privacy-Enhancing Technologies for the Inteet III: Ten Years Later
Communication Privacy
Privacy-Preserving Cryptographic Protocols
Part II: Privacy Attacks
Byzantine Attacks on Anonymity Systems
Introducing Traffic Analysis
Privacy, Profiling, Targeted Marketing, and Data Mining
Part III: Privacy-Enhancing Technologies
Enterprise Privacy Policies and Languages
Uncircumventable Enforcement of Privacy Policies via Cryptographic Obfuscation
Privacy Protection with Uncertainty and Indistinguishability
Privacy-Preservation Techniques in Data Mining
Part IV: User Privacy
HCI Designs for Privacy-Enhancing Identity Management
Privacy Perceptions among Members of Online Communities
Perceived Control: Scales for Privacy in Ubiquitous Computing
Part V: Privacy in Ubiquitous Computing
RFID: Technological Issues and Privacy Conces
Privacy-Enhanced Location Services Information
Beyond Consent: Privacy in Ubiquitous Computing (Ubicomp)
Part VI: The Economics of Privacy
A Risk Model for Privacy Insurance
What Can Behavioral Economics Teach Us about Privacy?
Part VII: Privacy and Policy
Privacy of Outsourced Data
Communications Data Retention: A Pandora’s Box for Rights and Liberties?
Surveillance of Emergent Associations: Freedom of Association in a Network Society
Privacy as a social and legal issue has been a conce of social scientists, philosophers, and lawyers for a long time. Back in 1890, two American lawyers, S. Warren and L. Brandeis, defined privacy as the right of an individual to be alone, and it has been recognized as a fundamental human right by the United Nations Declaration of Human Rights, the Inteational Convenant on Civil and Political Rights, the Charter of Fundamental Rights of the European Union, and many other inteational treaties. Therefore, in democratic societies the protection of privacy is a crucial issue.
Meanwhile, the intensive development of information and communication technologies has resulted in numerous new electronic services that aim to improve people’s lives by allowing them to communicate and exchange data through the Inteet, advertise their ideas through the World Wide Web, and purchase goods and services. To a large extent, the raw material for most of these electronic services is the personal data of individuals. Alongside the benefits for the people, these developments have introduced new risks such as identity theft, discriminatory profiling, continuous surveillance, and fraud. According to recent surveys, privacy and (especially) anonymity, are the fundamental issues of conce for most Inteet users, ranked higher than issues like ease-of-use, spam-mail, cost, and security. In view of the above, the OECD Declaration on the Protection of Privacy on Global Networks (for developing a culture of privacy in the Global Village) is especially well timed.
In this volume, privacy is considered as the indefeasible right of an individual to control the ways in which personal information is obtained, processed, distributed, shared, and used by any other entity.
Part I: The Privacy Space
Privacy-Enhancing Technologies for the Inteet III: Ten Years Later
Communication Privacy
Privacy-Preserving Cryptographic Protocols
Part II: Privacy Attacks
Byzantine Attacks on Anonymity Systems
Introducing Traffic Analysis
Privacy, Profiling, Targeted Marketing, and Data Mining
Part III: Privacy-Enhancing Technologies
Enterprise Privacy Policies and Languages
Uncircumventable Enforcement of Privacy Policies via Cryptographic Obfuscation
Privacy Protection with Uncertainty and Indistinguishability
Privacy-Preservation Techniques in Data Mining
Part IV: User Privacy
HCI Designs for Privacy-Enhancing Identity Management
Privacy Perceptions among Members of Online Communities
Perceived Control: Scales for Privacy in Ubiquitous Computing
Part V: Privacy in Ubiquitous Computing
RFID: Technological Issues and Privacy Conces
Privacy-Enhanced Location Services Information
Beyond Consent: Privacy in Ubiquitous Computing (Ubicomp)
Part VI: The Economics of Privacy
A Risk Model for Privacy Insurance
What Can Behavioral Economics Teach Us about Privacy?
Part VII: Privacy and Policy
Privacy of Outsourced Data
Communications Data Retention: A Pandora’s Box for Rights and Liberties?
Surveillance of Emergent Associations: Freedom of Association in a Network Society