David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Jack Alan Reynolds
Learn more about PhilPapers
Identity in the Information Society 3 (2):247-251 (2010)
In November, 2009, a prominent group of privacy professionals, business leaders, information technology specialists, and academics gathered in Madrid to discuss how the next set of threats to privacy could best be addressed.The event, Privacy by Design: The Definitive Workshop, was co-hosted by my office and that of the Israeli Law, Information and Technology Authority. It marked the latest step in a journey that I began in the 1990’s, when I first focused on enlisting the support of technologies that could enhance privacy. Back then, privacy protection relied primarily upon legislation and regulatory frameworks—in an effort to offer remedies for data breaches, after they had occurred. As information technology became increasingly interconnected and the volume of personal information collected began to explode, it became clear that a new way of thinking about privacy was needed.Privacy-Enhancing Technologies (PETs) paved the way for that new direction, highlighting how the universal pr
|Keywords||Privacy by design Privacy-enhancing technologies Positive-sum|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
No citations found.
Similar books and articles
Terry McQuay & Ann Cavoukian (2010). A Pragmatic Approach to Privacy Risk Optimization: Privacy by Design for Business Practices. [REVIEW] Identity in the Information Society 3 (2):379-396.
Peter Hustinx (2010). Privacy by Design: Delivering the Promises. [REVIEW] Identity in the Information Society 3 (2):253-255.
Ann Cavoukian, Scott Taylor & Martin E. Abrams (2010). Privacy by Design: Essential for Organizational Accountability and Strong Business Practices. [REVIEW] Identity in the Information Society 3 (2):405-413.
Peter Schaar (2010). Privacy by Design. Identity in the Information Society 3 (2):267-274.
Ann Cavoukian, Angus Fisher, Scott Killen & David Hoffman (2010). Remote Home Health Care Technologies: How to Ensure Privacy? Build It In: Privacy by Design. [REVIEW] Identity in the Information Society 3 (2):363-378.
Ann Cavoukian, Jules Polonetsky & Christopher Wolf (2010). SmartPrivacy for the Smart Grid: Embedding Privacy Into the Design of Electricity Conservation. [REVIEW] Identity in the Information Society 3 (2):275-294.
Julie David & Marilyn Prosch (2010). Extending the Value Chain to Incorporate Privacy by Design Principles. Identity in the Information Society 3 (2):295-318.
Seda Gürses (2010). PETs and Their Users: A Critical Review of the Potentials and Limitations of the Privacy as Confidentiality Paradigm. [REVIEW] Identity in the Information Society 3 (3):539-563.
Dawn Jutla (2010). Layering Privacy on Operating Systems, Social Networks, and Other Platforms by Design. Identity in the Information Society 3 (2):319-341.
Alan Rubel (2011). The Particularized Judgment Account of Privacy. Res Publica 17 (3):275-290.
Steven Davis (2009). Is There a Right to Privacy? Pacific Philosophical Quarterly 90 (4):450-475.
Janet E. Smith (2008). The Right to Privacy. Ignatius Press.
Ferdinand David Schoeman (ed.) (1984). Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press.
Added to index2010-12-05
Total downloads9 ( #156,922 of 1,100,838 )
Recent downloads (6 months)1 ( #289,727 of 1,100,838 )
How can I increase my downloads?