David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Jack Alan Reynolds
Learn more about PhilPapers
Identity in the Information Society 3 (2):397-404 (2010)
With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and identity lie at the basis of many human interactions and transactions, and societies have developed legitimate concern for privacy being essential for freedom and creativity. The burgeoning development of the Information Society, particularly during the past fifteen years, transcended the societal readiness to respond to the transformational change evoked by ICT. We have reached the eleventh hour for the preservation of trust and privacy as elements that can be transposed into our digital future. Europe has been at the forefront in recognizing the importance of privacy protection in relation to digital data, witness the advanced European legislation in this domain. The European Commission recognizes that appropriate measures need to combine technology development with legal means, user awareness and tools supporting data controllers to comply with law in an accountable and transparent way, and that empower users with a controlling stake in managing their personal data. Activities are underway at many levels. European RTD programmes play their role in supporting research in trustworthy ICT, privacy enhancing technologies, privacy-by-design in service layers as well as in networks, enabling technologies such as cryptography, and in generalized frameworks for trust and privacy-protective identity management
|Keywords||Trust Privacy e-Identity Research Technology Future internet|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
No citations found.
Similar books and articles
Herman T. Tavani (1999). Informational Privacy, Data Mining, and the Internet. Ethics and Information Technology 1 (2):137-145.
Jacques Penders (2004). Privacy in (Mobile) Telecommunications Services. Ethics and Information Technology 6 (4):247-260.
Peter Hustinx (2010). Privacy by Design: Delivering the Promises. [REVIEW] Identity in the Information Society 3 (2):253-255.
Dawn Jutla (2010). Layering Privacy on Operating Systems, Social Networks, and Other Platforms by Design. Identity in the Information Society 3 (2):319-341.
Seda Gürses (2010). PETs and Their Users: A Critical Review of the Potentials and Limitations of the Privacy as Confidentiality Paradigm. [REVIEW] Identity in the Information Society 3 (3):539-563.
Ann Cavoukian, Angus Fisher, Scott Killen & David Hoffman (2010). Remote Home Health Care Technologies: How to Ensure Privacy? Build It In: Privacy by Design. [REVIEW] Identity in the Information Society 3 (2):363-378.
Peter Schaar (2010). Privacy by Design. Identity in the Information Society 3 (2):267-274.
Herman T. Tavani (1999). KDD, Data Mining, and the Challenge for Normative Privacy. Ethics and Information Technology 1 (4):265-273.
Michael Zimmer (2010). But the Data is Already Public: On the Ethics of Research in Facebook. Ethics and Information Technology 12 (4):313-325.
Luciano Floridi (2005). The Ontological Interpretation of Informational Privacy. Ethics and Information Technology 7 (4):185-200.
Stephen Coleman (2006). E-Mail, Terrorism, and the Right to Privacy. Ethics and Information Technology 8 (1):17-27.
Lars Øystein Ursin (2008). Biobank Research and the Right to Privacy. Theoretical Medicine and Bioethics 29 (4):267-285.
Masahiko Mizutani, James Dorsey & James H. Moor (2004). The Internet and Japanese Conception of Privacy. Ethics and Information Technology 6 (2):121-128.
Andrea Monti (2010). Trust in the Shell. Knowledge, Technology and Policy 23 (3-4):507-517.
Added to index2010-12-05
Total downloads65 ( #24,511 of 1,100,109 )
Recent downloads (6 months)44 ( #2,263 of 1,100,109 )
How can I increase my downloads?