David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Jack Alan Reynolds
Learn more about PhilPapers
Identity in the Information Society 3 (2):267-274 (2010)
In view of rapid and dramatic technological change, it is important to take the special requirements of privacy protection into account early on, because new technological systems often contain hidden dangers which are very difficult to overcome after the basic design has been worked out. So it makes all the more sense to identify and examine possible data protection problems when designing new technology and to incorporate privacy protection into the overall design, instead of having to come up with laborious and time-consuming “patches” later on. This approach is known as “Privacy by Design”
|Keywords||Privacy by Design Electronic health card Electronic ID card ELENA|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
Anders Nordgren (2013). Privacy by Design in Personal Health Monitoring. Health Care Analysis:1-17.
Similar books and articles
Peter Hustinx (2010). Privacy by Design: Delivering the Promises. [REVIEW] Identity in the Information Society 3 (2):253-255.
Alexander Dix (2010). Built-in Privacy—No Panacea, but a Necessary Condition for Effective Privacy Protection. Identity in the Information Society 3 (2):257-265.
Ann Cavoukian (2010). Privacy by Design: The Definitive Workshop. A Foreword by Ann Cavoukian, Ph.D. [REVIEW] Identity in the Information Society 3 (2):247-251.
Dawn Jutla (2010). Layering Privacy on Operating Systems, Social Networks, and Other Platforms by Design. Identity in the Information Society 3 (2):319-341.
Julie David & Marilyn Prosch (2010). Extending the Value Chain to Incorporate Privacy by Design Principles. Identity in the Information Society 3 (2):295-318.
Ann Cavoukian, Scott Taylor & Martin E. Abrams (2010). Privacy by Design: Essential for Organizational Accountability and Strong Business Practices. [REVIEW] Identity in the Information Society 3 (2):405-413.
Terry McQuay & Ann Cavoukian (2010). A Pragmatic Approach to Privacy Risk Optimization: Privacy by Design for Business Practices. [REVIEW] Identity in the Information Society 3 (2):379-396.
Patrick Feng (2000). Rethinking Technology, Revitalizing Ethics: Overcoming Barriers to Ethical Design. Science and Engineering Ethics 6 (2):207-220.
Thomas B. Hodel-Widmer (2006). Designing Databases That Enhance People's Privacy Without Hindering Organizations. Ethics and Information Technology 8 (1):3-15.
Lars Øystein Ursin (2008). Biobank Research and the Right to Privacy. Theoretical Medicine and Bioethics 29 (4):267-285.
Georg Aichholzer & Stefan Strauß (2010). The Austrian Case: Multi-Card Concept and the Relationship Between Citizen ID and Social Security Cards. [REVIEW] Identity in the Information Society 3 (1):65-85.
Ann Cavoukian, Angus Fisher, Scott Killen & David Hoffman (2010). Remote Home Health Care Technologies: How to Ensure Privacy? Build It In: Privacy by Design. [REVIEW] Identity in the Information Society 3 (2):363-378.
Added to index2010-12-05
Total downloads42 ( #47,583 of 1,410,463 )
Recent downloads (6 months)9 ( #25,266 of 1,410,463 )
How can I increase my downloads?