Identity in the Information Society 3 (2):319-341 (2010)
|Abstract||Pervasive, easy-to-use privacy services are keys to enabling users to maintain control of their private data in the online environment. This paper proposes (1) an online privacy lifecycle from the user perspective that drives and categorizes the development of these services, (2) a layered platform design solution for online privacy, (3) the evolution of the PeCAN (Personal Context Agent Networking) architecture to a platform for pervasively providing multiple contexts for user privacy preferences and online informational privacy services, and (4) use of platform network effects for increasing wide-scale user adoption of privacy services. One implication of this paper’s concepts is that platform-mediated networks, which are reportedly the vehicles for most of the revenue earned by 60 of the world’s largest companies, and other platforms that commonly host millions of users, will not have to individually reinvent and manage sophisticated user services for privacy protection since universal privacy platforms can be layered on them in future.|
|Keywords||No keywords specified (fix it)|
|Categories||No categories specified (fix it)|
|Through your library||Configure|
Similar books and articles
Hanna Krasnova, Oliver Günther, Sarah Spiekermann & Ksenia Koroleva (2009). Privacy Concerns and Identity in Online Social Networks. Identity in the Information Society 2 (1):39-63.
Jennifer Hendry & Kay Goodall, Facebook and the Commercialisation of Personal Information: Some Questions of Provider-to-User Privacy.
Jacques Penders (2004). Privacy in (Mobile) Telecommunications Services. Ethics and Information Technology 6 (4).
Gordon Hull, Heather Richter Lipford & Celine Latulipe (2011). Contextual Gaps: Privacy Issues on Facebook. Ethics and Information Technology 13 (4):289-302.
Thierry Nabeth (2009). Social Web and Identity: A Likely Encounter. Identity in the Information Society 2 (1):1-5.
Irene Pollach (2011). Online Privacy as a Corporate Social Responsibility: An Empirical Study. Business Ethics 20 (1):88-102.
Peter Schaar (2010). Privacy by Design. Identity in the Information Society 3 (2):267-274.
Alexander Dix (2010). Built-in Privacy—No Panacea, but a Necessary Condition for Effective Privacy Protection. Identity in the Information Society 3 (2):257-265.
Peter Hustinx (2010). Privacy by Design: Delivering the Promises. Identity in the Information Society 3 (2):253-255.
Seda Gürses (2010). PETs and Their Users: A Critical Review of the Potentials and Limitations of the Privacy as Confidentiality Paradigm. Identity in the Information Society 3 (3):539-563.
Lars Øystein Ursin (2008). Biobank Research and the Right to Privacy. Theoretical Medicine and Bioethics 29 (4):267-285.
Alan Rubel (2011). The Particularized Judgment Account of Privacy. Res Publica 17 (3):275-290.
Irene Pollach (2005). A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent. Journal of Business Ethics 62 (3):221 - 235.
Dirk van Rooy & Jacques Bus (2010). Trust and Privacy in the Future Internet—a Research Perspective. Identity in the Information Society 3 (2):397-404.
Added to index2010-12-05
Total downloads10 ( #106,238 of 549,070 )
Recent downloads (6 months)1 ( #63,317 of 549,070 )
How can I increase my downloads?