Abstract
Informational self-determination refers to the right or ability of individuals to exercise personal control over the collection, use and disclosure of their personal data by others. The basis of modern privacy laws and practices around the world, informational privacy has become a challenging concept to protect and promote in a world of ubiquitous and unlimited data sharing and storage among organizations. The paper advocates a “user-centric” approach to managing personal data online. However, user-centricity can be problematic when the user—the data subject—is not directly involved in transactions involving the disclosure, collection, processing, and storage of their personal data. Identity data is increasingly being generated, used and stored entirely in the networked “Cloud”, where it is under control of third parties. The paper explores possible technology solutions to ensure that individuals will be able to exercise informational self-determination in an era of network grid computing, exponential data creation, ubiquitous surveillance and rampant online fraud. The paper describes typical “Web 2.0” use scenarios, suggests some technology building blocks to protect and promote informational privacy online, and concludes with a call to develop a privacy-respective information technology ecosystem for identity management. Specifically, the paper outlines four fundamental technological approaches to help assure widespread and enduring online participation, confidence and trust in the information society
Keywords Cloud computing  Identity management  Informational self-determination  Online trust  PETs  Privacy  Privacy-enhancing technologies  User-centric identity
Categories (categorize this paper)
DOI 10.1007/s12394-008-0005-z
Options
Edit this record
Mark as duplicate
Export citation
Find it on Scholar
Request removal from index
Revision history

Download options

PhilArchive copy


Upload a copy of this paper     Check publisher's policy     Papers currently archived: 52,893
External links

Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
Through your library

References found in this work BETA

No references found.

Add more references

Citations of this work BETA

Add more citations

Similar books and articles

Inaccuracy as a Privacy-Enhancing Tool.Gloria González Fuster - 2010 - Ethics and Information Technology 12 (1):87-95.
Four Challenges for a Theory of Informational Privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109-119.
The Ontological Interpretation of Informational Privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185-200.
A persistent data tracking mechanism for user-centric identity governance.Hidehito Gomi - 2010 - Identity in the Information Society 3 (3):639-656.
Trust and privacy in the future internet—a research perspective.Dirk van Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
Lockbox: Mobility, Privacy and Values in Cloud Storage. [REVIEW]Luke Stark & Matt Tierney - 2014 - Ethics and Information Technology 16 (1):1-13.
The Moral Value of Informational Privacy in Cyberspace.Diane P. Michelfelder - 2001 - Ethics and Information Technology 3 (2):129-135.

Analytics

Added to PP index
2013-12-01

Total views
37 ( #261,475 of 2,342,991 )

Recent downloads (6 months)
1 ( #515,062 of 2,342,991 )

How can I increase my downloads?

Downloads

My notes