Privacy in (mobile) telecommunications services

Ethics and Information Technology 6 (4):247-260 (2004)

Abstract
Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded. Traffic data subsume under the notion of data protection and are central in the discussion. The telecommunications environment is profoundly changing. The traditionally closed markets with closed networks change into an open market with open networks. Within these open networks more privacy sensitive data are generated and have to be exchanged between growing numbers of parties. Also telecommunications and computer networks are rapidly being integrated and thus the distinction between telephony and computing disappears. Traditional telecommunications privacy regulations are revised to cover internet applications. In this paper telecommunications issues are recalled to aid the on-going debate. Cellular mobile phones have recently be introduced. Cellular networks process a particular category of traffic data namely location data, thereby introducing the issue of territorial privacy into the telecommunications domain. Location data are bound to be used for pervasive future services. Designs for future services are discussed and evaluated for their impact on privacy protection.
Keywords data protection   ethics   location data   privacy   telecommunications   traffic data
Categories (categorize this paper)
Reprint years 2005
DOI 10.1007/s10676-005-5605-9
Options
Edit this record
Mark as duplicate
Export citation
Find it on Scholar
Request removal from index
Revision history

Download options

Our Archive


Upload a copy of this paper     Check publisher's policy     Papers currently archived: 46,179
Through your library

References found in this work BETA

The Moral Value of Informational Privacy in Cyberspace.Diane P. Michelfelder - 2001 - Ethics and Information Technology 3 (2):129-135.
Privacy, Secrecy and Security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.

Add more references

Citations of this work BETA

No citations found.

Add more citations

Similar books and articles

KDD, Data Mining, and the Challenge for Normative Privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
Informational Privacy, Data Mining, and the Internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
Privacy by design: delivering the promises. [REVIEW]Peter Hustinx - 2010 - Identity in the Information Society 3 (2):253-255.
Trust and privacy in the future internet—a research perspective.Dirk van Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
Privacy by Design.Peter Schaar - 2010 - Identity in the Information Society 3 (2):267-274.

Analytics

Added to PP index
2009-01-28

Total views
225 ( #32,355 of 2,285,629 )

Recent downloads (6 months)
18 ( #47,118 of 2,285,629 )

How can I increase my downloads?

Downloads

My notes

Sign in to use this feature