Identity in the Information Society 3 (2):257-265 (2010)
Abstract |
Built-in privacy has for too long been neglected by regulators. They have concentrated on reacting to violations of rules. Even imposing severe fines will however not address the basic issue that preventative privacy protection is much more meaningful. The paper discusses this in the context of the International Working Group on Data Protection in Telecommunications which has published numerous recommendations on privacy-compliant design of technical innovations. Social network services, road pricing schemes, and the distribution of digital media content have figured prominently in the group’s latest working papers. More recently, a judgment of the European Court of Human Rights has thrown light on weaknesses in the protection of patients’ data in hospitals that requires urgent action by designers of IT systems. Built-in privacy is no magic button, no panacea, but it has turned out to be a necessary condition for meaningful privacy protection.
|
Keywords | Social networks Road pricing Locational privacy Distribution of digital media content Hospital IT systems Web-based telemedicine Electronic health records International Working Group on Data Protection in Telecommunications "Berlin Group" |
Categories | (categorize this paper) |
DOI | 10.1007/s12394-010-0045-z |
Options |
![]() ![]() ![]() |
Download options
References found in this work BETA
No references found.
Citations of this work BETA
Privacy by Design in Personal Health Monitoring.Anders Nordgren - 2015 - Health Care Analysis 23 (2):148-164.
Big Data in the Workplace: Privacy Due Diligence as a Human Rights-Based Approach to Employee Privacy Protection.Jeremias Adams-Prassl, Isabelle Wildhaber & Isabel Ebert - 2021 - Big Data and Society 8 (1).
Similar books and articles
Privacy in (Mobile) Telecommunications Services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.
Privacy by design: delivering the promises. [REVIEW]Peter Hustinx - 2010 - Identity in the Information Society 3 (2):253-255.
Layering Privacy on Operating Systems, Social Networks, and Other Platforms by Design.Dawn N. Jutla - 2010 - Identity in the Information Society 3 (2):319-341.
Inaccuracy as a Privacy-Enhancing Tool.Gloria González Fuster - 2010 - Ethics and Information Technology 12 (1):87-95.
Privacy Rights and Protection: Foreign Values in Modern Thai Context. [REVIEW]Krisana Kitiyadisai - 2005 - Ethics and Information Technology 7 (1):17-26.
Social Web and Identity: A Likely Encounter. [REVIEW]Thierry Nabeth - 2009 - Identity in the Information Society 2 (1):1-5.
The Apec Asia-Pacific Privacy Initiative: A New Route to Effective Data Protection or a Trojan Horse for Self-Regulation?Nigel Waters - unknown
“Lost in Translation”?: Intercultural Dialogues on Privacy and Information Ethics. [REVIEW]Charles Ess - 2005 - Ethics and Information Technology 7 (1):1-6.
Strategic and Ethical Considerations in Managing Digital Privacy.Ravi Sarathy & Christopher J. Robertson - 2003 - Journal of Business Ethics 46 (2):111 - 126.
Biobank Research and the Right to Privacy.Lars Øystein Ursin - 2008 - Theoretical Medicine and Bioethics 29 (4):267-285.
Private Parts: A Global Analysis of Privacy Protection Schemes and a Proposed Innovation for Their Comparative Evaluation. [REVIEW]Laura B. Pincus & Roger Johns - 1997 - Journal of Business Ethics 16 (12-13):1237-1260.
Informational Privacy, Data Mining, and the Internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
Assessing Gender Differences in Computer Professionals' Self-Regulatory Efficacy Concerning Information Privacy Practices.Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu - 2006 - Journal of Business Ethics 73 (2):145 - 160.
Analytics
Added to PP index
2010-12-05
Total views
61 ( #185,500 of 2,499,813 )
Recent downloads (6 months)
1 ( #418,066 of 2,499,813 )
2010-12-05
Total views
61 ( #185,500 of 2,499,813 )
Recent downloads (6 months)
1 ( #418,066 of 2,499,813 )
How can I increase my downloads?
Downloads