Privacy by design: delivering the promises [Book Review]
David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Ezio Di Nucci
Jonathan Jenkins Ichikawa
Jack Alan Reynolds
Learn more about PhilPapers
Identity in the Information Society 3 (2):253-255 (2010)
An introductory message from Peter Hustinx, European Data Protection Supervisor, delivered at Privacy by Design: The Definitive Workshop. This presentation looks back at the origins of Privacy by Design, notably the publication of the first report on “Privacy Enhancing Technologies” by a joint team of the Information and Privacy Commissioner of Ontario, Canada and the Dutch Data Protection Authority in 1995. It looks ahead and adresses the question of how the promises of these concepts could be delivered in practice.
|Keywords||Privacy-enhancing technologies Privacy by design Data security|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
Luciano Floridi (forthcoming). Tolerant Paternalism: Pro-Ethical Design as a Resolution of the Dilemma of Toleration. Science and Engineering Ethics:1-20.
Similar books and articles
Peter Schaar (2010). Privacy by Design. Identity in the Information Society 3 (2):267-274.
Ann Cavoukian (2010). Privacy by Design: The Definitive Workshop. A Foreword by Ann Cavoukian, Ph.D. [REVIEW] Identity in the Information Society 3 (2):247-251.
Terry McQuay & Ann Cavoukian (2010). A Pragmatic Approach to Privacy Risk Optimization: Privacy by Design for Business Practices. [REVIEW] Identity in the Information Society 3 (2):379-396.
Ann Cavoukian, Scott Taylor & Martin E. Abrams (2010). Privacy by Design: Essential for Organizational Accountability and Strong Business Practices. [REVIEW] Identity in the Information Society 3 (2):405-413.
Seda Gürses (2010). PETs and Their Users: A Critical Review of the Potentials and Limitations of the Privacy as Confidentiality Paradigm. [REVIEW] Identity in the Information Society 3 (3):539-563.
Dawn Jutla (2010). Layering Privacy on Operating Systems, Social Networks, and Other Platforms by Design. Identity in the Information Society 3 (2):319-341.
Dirk van Rooy & Jacques Bus (2010). Trust and Privacy in the Future Internet—a Research Perspective. Identity in the Information Society 3 (2):397-404.
Alan Rubel (2011). The Particularized Judgment Account of Privacy. Res Publica 17 (3):275-290.
Ann Cavoukian, Angus Fisher, Scott Killen & David Hoffman (2010). Remote Home Health Care Technologies: How to Ensure Privacy? Build It In: Privacy by Design. [REVIEW] Identity in the Information Society 3 (2):363-378.
Luca Compagna, Paul El Khoury, Alžběta Krausová, Fabio Massacci & Nicola Zannone (2009). How to Integrate Legal Requirements Into a Requirements Engineering Methodology for the Development of Security and Privacy Patterns. Artificial Intelligence and Law 17 (1):1-30.
Paul El Khoury Luca Compagna, Fabio Massacci Alžběta Krausová & Nicola Zannone (2009). How to Integrate Legal Requirements Into a Requirements Engineering Methodology for the Development of Security and Privacy Patterns. Artificial Intelligence and Law 17 (1).
Alexander Dix (2010). Built-in Privacy—No Panacea, but a Necessary Condition for Effective Privacy Protection. Identity in the Information Society 3 (2):257-265.
Herman T. Tavani (1999). Informational Privacy, Data Mining, and the Internet. Ethics and Information Technology 1 (2):137-145.
Elin Palm (2009). Privacy Expectations at Work—What is Reasonable and Why? Ethical Theory and Moral Practice 12 (2):201 - 215.
Added to index2010-12-05
Total downloads31 ( #138,422 of 1,938,538 )
Recent downloads (6 months)8 ( #70,272 of 1,938,538 )
How can I increase my downloads?