David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Jack Alan Reynolds
Learn more about PhilPapers
Identity in the Information Society 3 (2):257-265 (2010)
Built-in privacy has for too long been neglected by regulators. They have concentrated on reacting to violations of rules. Even imposing severe fines will however not address the basic issue that preventative privacy protection is much more meaningful. The paper discusses this in the context of the International Working Group on Data Protection in Telecommunications (“Berlin Group”) which has published numerous recommendations on privacy-compliant design of technical innovations. Social network services, road pricing schemes, and the distribution of digital media content have figured prominently in the group’s latest working papers. More recently, a judgment of the European Court of Human Rights has thrown light on weaknesses in the protection of patients’ data in hospitals that requires urgent action by designers of IT systems. Built-in privacy is no magic button, no panacea, but it has turned out to be a necessary condition for meaningful privacy protection
|Keywords||Social networks Road pricing Locational privacy Distribution of digital media content Hospital IT systems Web-based telemedicine Electronic health records International Working Group on Data Protection in Telecommunications "Berlin Group"|
|Categories||categorize this paper)|
|Through your library||Configure|
References found in this work BETA
No references found.
Citations of this work BETA
Anders Nordgren (2013). Privacy by Design in Personal Health Monitoring. Health Care Analysis:1-17.
Similar books and articles
Jacques Penders (2004). Privacy in (Mobile) Telecommunications Services. Ethics and Information Technology 6 (4):247-260.
Peter Schaar (2010). Privacy by Design. Identity in the Information Society 3 (2):267-274.
Peter Hustinx (2010). Privacy by Design: Delivering the Promises. [REVIEW] Identity in the Information Society 3 (2):253-255.
Dawn Jutla (2010). Layering Privacy on Operating Systems, Social Networks, and Other Platforms by Design. Identity in the Information Society 3 (2):319-341.
Gloria González Fuster (2010). Inaccuracy as a Privacy-Enhancing Tool. Ethics and Information Technology 12 (1):87-95.
Elin Palm (2009). Privacy Expectations at Work—What is Reasonable and Why? Ethical Theory and Moral Practice 12 (2):201 - 215.
Krisana Kitiyadisai (2005). Privacy Rights and Protection: Foreign Values in Modern Thai Context. [REVIEW] Ethics and Information Technology 7 (1):17-26.
Thierry Nabeth (2009). Social Web and Identity: A Likely Encounter. [REVIEW] Identity in the Information Society 2 (1):1-5.
Nigel Waters, The Apec Asia-Pacific Privacy Initiative: A New Route to Effective Data Protection or a Trojan Horse for Self-Regulation?
Charles Ess (2005). “Lost in translation”?: Intercultural dialogues on privacy and information ethics (introduction to special issue on privacy and data privacy protection in asia). [REVIEW] Ethics and Information Technology 7 (1):1-6.
Ravi Sarathy & Christopher J. Robertson (2003). Strategic and Ethical Considerations in Managing Digital Privacy. Journal of Business Ethics 46 (2):111 - 126.
Lars Øystein Ursin (2008). Biobank Research and the Right to Privacy. Theoretical Medicine and Bioethics 29 (4):267-285.
Laura B. Pincus & Roger Johns (1997). Private Parts: A Global Analysis of Privacy Protection Schemes and a Proposed Innovation for Their Comparative Evaluation. [REVIEW] Journal of Business Ethics 16 (12-13):1237-1260.
Herman T. Tavani (1999). Informational Privacy, Data Mining, and the Internet. Ethics and Information Technology 1 (2):137-145.
Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu (2007). Assessing Gender Differences in Computer Professionals' Self-Regulatory Efficacy Concerning Information Privacy Practices. Journal of Business Ethics 73 (2):145 - 160.
Added to index2010-12-05
Total downloads6 ( #162,855 of 1,088,810 )
Recent downloads (6 months)1 ( #69,666 of 1,088,810 )
How can I increase my downloads?