Definition of privacy
What privacy is for
JE Cohen
Privacy has an image problem. Over and over
again, regardless of the forum in which it is debated, it is cast as
old-fashioned at best and downright harmful at worst-antiprogressive,
overly costly, and inimical to the welfare of the body politic.
A definition of privacy
RB Parker - Rutgers L.
The aims of this article are to present and
defend a definition of privacy which explains the close connection
privacy has with the fourth amendment, and with some of the other
amendments in the Bill of Rights.
Understanding privacy
DJ Solove
Over the years, my understanding of privacy grew, and I now believe that
I am ready to set forth my theory of privacy. Although I feel that my
theory is mature enough to take form in this book, it is but a snapshot
of one point in an ongoing evolutionary process.
The right to privacy
The right to
privacy
JJ Thomson
Perhaps the most striking thing about the right
to privacy is that nobody seems to have any very clear idea what it is.
Consider, for ex-ample, the familiar proposal that the right to privacy
is the right" to be let alone." On the one hand, this doesn't seem to
take in enough.
Why privacy is
important
J Rachels
According to Thomas Scanlon, the first element of a theory of privacy
should be" a characterization of the special interest we have in being
able to be free from certain kinds of intrusions." Since I agree that is
the right place to begin, I shall begin there.
A Tale of Two Privacy Laws: The GDPR and the International Right to
Privacy
V Krishnamurthy
The European Union's General Data Protection Regulation (GDPR) is widely
viewed as setting a new global standard for the protection of data
privacy that is worthy of emulation, even though the relationship
between the GDPR and existing international legal protections for the
right to privacy remain unexplored.
The Human Right to Privacy
Paul Tiedemann
The core function of the privacy rights is the defense of the freedom of
will against self-alienation by fixation on role-identities. In the
public sphere, persons must suppress important parts of their
personality in order to meet the expectations and ascriptions of
society. They do not display in public the personality who they really
are, but rather they display a specially shaped and distorted image of
their personality that can be called their role-identity (Erving Goffman).
The permanent display of a role-identity leads to the person’s loss of
consciousness about who she really is, i.e. about the components of her
real personality. She thus becomes, so to say, a marionette of social
expectations and loses the ability to determine herself on the basis of
a real understanding of herself. This leads to a systemically distorted
process of will making that cannot be considered authentic. This leads
to the state of self-alienation (Goffman). The privacy rights refer to
the protection of an authentic will-making process by ensuring a sphere
of life in which persons are not forced to display a role-identity.
The right to privacy under pressure
Rikke Frank Jørgensen
Today we are facing something of a paradox with regard to our right to
privacy. On the one hand, the international human rights system has
never been clearer in its message that the right to privacy applies
online as well as offline. This message has been confirmed in UN
resolutions, by the UN High Commissioner for Human Rights, the Council
of Europe, the European Court of Human Rights, the European Court of
Justice etc. On the other hand, however, there are very few
possibilities to enforce the right to privacy on the internet. Data is
collected from a large number of public and private players across
national borders; there is a very limited idea of the scope and little
control with regard to this data collection; users routinely give their
consent to allow their data to be collected; and privacy policies are
hard to access and are only read by a minority of users.
Personal privacy and economy
The economics of
privacy
RA Posner
The concept of" privacy" has received a good
deal of attention from lawyers, political scientists, sociologists,
philosophers and psychologists, but until recently very little from
economists.
An
introduction to privacy in economics and politics
GJ Stigler
The enormous increase in interest in privacy in
our society is evident in the public press and in the statute books. In
some respects this interest in privacy is paradoxical, for the average
citizen has more privacy-more areas of his life in which his behavior is
not known.
Economic aspects of personal privacy
HR Varian
The advent of low-cost technology for
manipulating and communicating information has raised significant
concerns about personal privacy. Privacy is a complex issue that can be
treated from many perspectives.
Restrictions on Privacy and Exploitation in the Digital Economy: A
Market Failure Perspective
N Economides, I Lianos
We discuss how the acquisition of private information by default without
compensation by digital platforms such as Google and Facebook creates a
market failure and can be grounds for antitrust enforcement. To avoid
the market failure, the default in the collection of personal
information has to be changed by law to “opt-out.” This would allow the
creation of a vibrant market for the sale of users’ personal information
to digital platforms. Assuming that all parties are perfectly informed,
users are better off in this functioning market and digital platforms
are worse off compared to the default opt-in. However, just switching to
a default opt-in will not restore competition to the but for world
because of the immense market power and bargaining power towards an
individual user that digital platforms have acquired.
IoT security, privacy and trust in home-sharing economy via blockchain
MN Islam, S Kundu
We explore the security, trust, and privacy concerns associated with
contractual renting or leasing of IoT (Internet-of-Things)
devices-enabled home. We propose a methodology to eliminate security,
trust, and privacy threats from IoT-enabled telematics devices in a
smart home via blockchain-based smart contract.
Privacy protection
Privacy
protection system and method
TE Coleman
Privacy protection system and method. Privacy
protection system and method.
Security and privacy protection in cloud computing: Discussions and
challenges
PJ Sun
With the development of cloud computing, privacy
security issues have become increasingly prominent, which is of concern
to industry and academia. We review the research progress on privacy
security issues from the perspective of several privacy security
protection.
A
blockchain privacy protection scheme based on ring signature
X Li, Y Mei, J Gong, F Xiang, Z Sun
Blockchain is a point-to-point distributed
ledger technology based on cryptographic algorithms. However, the open
and transparent blockchain ledger supplemented by statistical methods
such as sociological mining and data mining has caused users' privacy to
face major threats. Therefore, privacy protection has become a focus of
current blockchain technology research.
Privacy
protection, control of information, and privacy-enhancing technologies
HT Tavani, JH Moor
… PETs are clearly advantageous for managing
personal privacy: Nobody denies that … But even if PETs provide users
with a means of controlling information about themselves, do these tools
provide users with adequate privacy protection …
Towards a
theory of privacy in the information age
JH Moor
When we think of ethical problems involving
computing probably none is more paradigmatic than the issue of privacy.
Given the ability of computers to manipulate information-to store
endlessly, to sort efficiently, and to locate effortlessly-we are
justifiably concerned that in a computerized society our privacy may be
invaded and that information harmful to us will be revealed.
Privacy and the law
Privacy,
morality, and the law
WA Parent
Defining privacy requires a familiarity with its
ordinary usage, of course, but this is not enough since our common ways
of talking and using language are riddled with inconsistencies,
ambiguities, and paradoxes.
Privacy and the Limits of Law
R Gavison
Anyone who studies the law of privacy today may
well feel a sense of uneasiness. On one hand, there are popular demands
for increased protection of privacy, discussions of new threats to
privacy, and an intensified interest in the relationship between privacy
and other values, such as liberty, autonomy, and mental health.
Privacy defending organizations
Australian Privacy Foundation
To protect the privacy rights of Australians, by
means of research, awareness, education, the highlighting of privacy
risks in all forms of technology and practices, and campaigns for new
laws, regulations, codes, policies and practices, and amendments to
existing laws, regulations, codes, policies and practices.
Electronic Frontier Foundation (EFF)
EFF is the leading nonprofit organization
defending civil liberties in the digital world. Currently, they’re
fighting the use of facial recognition at the federal level and
organizing to stop the EARN IT bill before it breaks encryption.
Privacy International
Governments and corporations are using technology to exploit us. Their
abuses of power threaten our freedoms and the very things that make us
human. That’s why PI is here: to protect democracy, defend people's
dignity, and demand accountability from institutions who breach the
public trust.
Privaterra
Privaterra's mission is to provide education and support for civil
society organizations (Human Rights NGOs) in the area of data privacy,
secure communications and information security.
The Center
for Digital Democracy
The Center for Digital Democracy’s mission is to ensure that digital
technologies serve and strengthen democratic values, institutions and
processes. CDD strives to safeguard the privacy and civil and human
rights, as well as to advance equity, fairness, and community.
US Privacy Council
US Privacy Council is a coalition of US privacy groups and individuals
founded in 1991 to deal with privacy issues in the US. USPC works in
Washington monitoring legislation and the activities of government
agencies.
The Australian
Information Commissioner and Privacy Commissioner
The Australian Information Commissioner is the independent national
regulator for privacy and freedom of information. It promotes and
upholds your rights to access government-held information and have your
personal information protected.
The Office of the
Privacy Commissioner New Zealand
The Office of the Privacy Commissioner (OPC) works to develop and
promote a culture in which personal information is protected and
respected. The Privacy Act applies to almost every person, business and
organisation in New Zealand. The Act includes privacy principles that
guide how personal information can be collected, used, stored and
disclosed.
Office of the
Privacy Commissioner of Canada
The Office of the Privacy Commissioner of Canada provides advice and
information for individuals about protecting personal information. It
also enforces two federal privacy laws that set out the rules for how
federal government institutions and certain businesses must handle
personal information.
The Department of State’s Privacy Office
The Department of State’s Privacy Office safeguards privacy and promotes
transparency through compliance, advice, training, and collaboration.
The Office of
Privacy and Civil Liberties (OPCL)
The Office of Privacy and Civil Liberties (OPCL) supports the
Department’s Chief Privacy and Civil Liberties Officer (CPCLO). The
CPCLO is a member of the Office of the Deputy Attorney General and the
principal advisor to the Attorney General, Department Leadership, and
components on issues involving privacy and civil liberties policy and
compliance.
Information Commissioner’s
Office
The UK’s independent authority set up to uphold information rights in
the public interest, promoting openness by public bodies and data
privacy for individuals.
The Data
Protection Commission
The Data Protection Commission (DPC) is the national independent
authority responsible for upholding the fundamental right of individuals
in the EU to have their personal data protected. The DPC is the Irish
supervisory authority for the General Data Protection Regulation (GDPR),
and also has functions and powers related to other important regulatory
frameworks including the Irish ePrivacy Regulations (2011) and the EU
Directive known as the Law Enforcement Directive.
Journals on privacy and security
Transactions on Data Privacy
The aim of the Transactions on Data Privacy (TDP) is to provide an
international forum for researchers on all topics related to data
privacy technologies.
IEEE
Security and Privacy
IEEE Security & Privacy’s primary objective is to stimulate and track
advances in security, privacy, and dependability and present these
advances in a form that can be useful to a broad cross-section of the
professional community—ranging from academic researchers to industry
practitioners. It provides articles with both a practical and research
bent by the top thinkers in the field of security and privacy, along
with case studies, surveys, tutorials, columns, and in-depth interviews
and podcasts for the information security industry.
International
Data Privacy Law
International Data Privacy Law (IDPL) is a peer-reviewed journal that
combines analytical excellence with a focus on issues of practical
relevance. The journal is global in scope and thus seeks to cover data
protection and privacy law topics from around the world.
International Journal of Information Security and Privacy
As information technology and the Internet become more and more
ubiquitous and pervasive in our daily lives, there is an essential need
for a more thorough understanding of information security and privacy
issues and concerns. The International Journal of Information Security
and Privacy (IJISP) creates and fosters a forum where research in the
theory and practice of information security and privacy is advanced.
ACM
Transactions on Privacy and Security
ACM Transactions on Transactions on Privacy and Security (TOPS) is
devoted to the study, analysis, and application of information security
and privacy. The journal takes a wide view of this topic and its mission
is to publish the best original research in this area.
International Journal of Information Security
The International Journal of Information Security is an English language
periodical on research in information security which offers prompt
publication of important technical work, whether theoretical, applicable
or related to implementation. Coverage includes system security:
intrusion detection, secure end systems, secure operating systems,
database security, security infrastructures, security evaluation;
network security: Internet security, firewalls, mobile security,
security agents, protocols, anti-virus and anti-hacker measures; content
protection: software protection, tamper-resistant software;
applications: electronic commerce, government, health,
telecommunications, mobility; and foundations: privacy, access control,
authentication, identification, applied cryptography, and formal methods
in information security.
Cybersecurity
This journal is aimed to systematically cover all essential aspects of
cybersecurity, with a focus on reporting on cyberspace security issues,
the latest research results, and real-world deployment of security
technologies.
Computers and Security
Computers & Security is the most respected technical journal in the IT
security field. With its high-profile editorial board and informative
regular features and columns, the journal is essential reading for IT
security professionals around the world. Computers & Security provides
you with a unique blend of leading-edge research and sound practical
management advice. It is aimed at the professional involved with
computer security, audit, control and data integrity in all sectors -
industry, commerce and academia.
Journal of Computer Security
The Journal of Computer Security presents research and development
results of lasting significance in the theory, design, implementation,
analysis, and application of secure computer systems. It also provides a
forum for ideas about the meaning and implications of security and
privacy, particularly those with important consequences for the
technical community.
Security Dialogue
Security Dialogue aims to combine cutting-edge advances in theory with
new empirical findings across a range of fields relevant to the study of
security. Security Dialogue provides an outlet for new approaches and
methodologies from disciplines such as international studies, gender
studies, political sociology, political economy, geography, cultural
studies, political theory, anthropology, development studies,
postcolonial studies, and peace and conflict studies. Security Dialogue
encourages innovative analyses that challenge traditional readings of,
inter alia, subjectivity, gender, identity, the individual, the social,
the international, the economical, citizenship, health and biopolitics,
risk, information technology, globalisation, migration and
transnationalism, terrorism, crime, and media.
Information and Computer Security
Information and Computer Security (ICS) contributes to the advance of
knowledge directly related to the theory and practice of the management
and security of information and information systems. It publishes
research and case study papers relating to new technologies,
methodological developments, empirical studies, and practical
applications.
Computer Law and Security Review
CLSR publishes refereed academic and practitioner papers on topics such
as Web 2.0, IT security, Identity management, ID cards, RFID,
interference with privacy, Internet law, telecoms regulation, online
broadcasting, intellectual property, software law, e-commerce,
outsourcing, data protection, EU policy, freedom of information,
computer security and many other topics. Also, it provides a regular
update on European Union developments, national news from more than 20
jurisdictions in both Europe and the Pacific Rim.
Intelligence and National Security
Intelligence has never played a more prominent role in international
politics than it does now in the early years of the twenty-first
century. National intelligence services are larger than ever, and they
are more transparent in their activities in the policy-making of
democratic nations. Intelligence and National Security is widely
regarded as the world's leading scholarly journal focused on the role of
intelligence and secretive agencies in international relations.
|