Ethics and Information Technology 6 (4):247-260 (2004)
Abstract |
Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded. Traffic data subsume under the notion of data protection and are central in the discussion. The telecommunications environment is profoundly changing. The traditionally closed markets with closed networks change into an open market with open networks. Within these open networks more privacy sensitive data are generated and have to be exchanged between growing numbers of parties. Also telecommunications and computer networks are rapidly being integrated and thus the distinction between telephony and computing disappears. Traditional telecommunications privacy regulations are revised to cover internet applications. In this paper telecommunications issues are recalled to aid the on-going debate. Cellular mobile phones have recently be introduced. Cellular networks process a particular category of traffic data namely location data, thereby introducing the issue of territorial privacy into the telecommunications domain. Location data are bound to be used for pervasive future services. Designs for future services are discussed and evaluated for their impact on privacy protection.
|
Keywords | data protection ethics location data privacy telecommunications traffic data |
Categories | (categorize this paper) |
Reprint years | 2005 |
DOI | 10.1007/s10676-005-5605-9 |
Options |
![]() ![]() ![]() ![]() |
Download options
References found in this work BETA
The Moral Value of Informational Privacy in Cyberspace.Diane P. Michelfelder - 2001 - Ethics and Information Technology 3 (2):129-135.
Privacy, Secrecy and Security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
Citations of this work BETA
Building Theory From Consumer Reactions to RFID: Discovering Connective Proximity.Anna Margulis, Harold Boeck, Ygal Bendavid & Fabien Durif - 2016 - Ethics and Information Technology 18 (2):81-101.
Similar books and articles
KDD, Data Mining, and the Challenge for Normative Privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
Layering Privacy on Operating Systems, Social Networks, and Other Platforms by Design.Dawn N. Jutla - 2010 - Identity in the Information Society 3 (2):319-341.
Informational Privacy, Data Mining, and the Internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
Privacy by design: delivering the promises. [REVIEW]Peter Hustinx - 2010 - Identity in the Information Society 3 (2):253-255.
Trust and privacy in the future internet—a research perspective.Dirk van Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
Built-in privacy—no panacea, but a necessary condition for effective privacy protection.Alexander Dix - 2010 - Identity in the Information Society 3 (2):257-265.
Analytics
Added to PP index
2009-01-28
Total views
231 ( #48,311 of 2,505,153 )
Recent downloads (6 months)
1 ( #416,587 of 2,505,153 )
2009-01-28
Total views
231 ( #48,311 of 2,505,153 )
Recent downloads (6 months)
1 ( #416,587 of 2,505,153 )
How can I increase my downloads?
Downloads