Identity in the Information Society 3 (2):397-404 (2010)
With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and identity lie at the basis of many human interactions and transactions, and societies have developed legitimate concern for privacy being essential for freedom and creativity. The burgeoning development of the Information Society, particularly during the past fifteen years, transcended the societal readiness to respond to the transformational change evoked by ICT. We have reached the eleventh hour for the preservation of trust and privacy as elements that can be transposed into our digital future. Europe has been at the forefront in recognizing the importance of privacy protection in relation to digital data, witness the advanced European legislation in this domain. The European Commission recognizes that appropriate measures need to combine technology development with legal means, user awareness and tools supporting data controllers to comply with law in an accountable and transparent way, and that empower users with a controlling stake in managing their personal data. Activities are underway at many levels. European RTD programmes play their role in supporting research in trustworthy ICT, privacy enhancing technologies, privacy-by-design in service layers as well as in networks, enabling technologies such as cryptography, and in generalized frameworks for trust and privacy-protective identity management.
|Keywords||Trust Privacy e-Identity Research Technology Future internet|
|Categories||categorize this paper)|
References found in this work BETA
No references found.
Citations of this work BETA
No citations found.
Similar books and articles
Informational Privacy, Data Mining, and the Internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
Privacy in (Mobile) Telecommunications Services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.
Privacy by Design: Delivering the Promises. [REVIEW]Peter Hustinx - 2010 - Identity in the Information Society 3 (2):253-255.
Layering Privacy on Operating Systems, Social Networks, and Other Platforms by Design.Dawn Jutla - 2010 - Identity in the Information Society 3 (2):319-341.
PETs and Their Users: A Critical Review of the Potentials and Limitations of the Privacy as Confidentiality Paradigm. [REVIEW]Seda Gürses - 2010 - Identity in the Information Society 3 (3):539-563.
Remote Home Health Care Technologies: How to Ensure Privacy? Build It In: Privacy by Design. [REVIEW]Ann Cavoukian, Angus Fisher, Scott Killen & David Hoffman - 2010 - Identity in the Information Society 3 (2):363-378.
KDD, Data Mining, and the Challenge for Normative Privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
But the Data is Already Public: On the Ethics of Research in Facebook.Michael Zimmer - 2010 - Ethics and Information Technology 12 (4):313-325.
The Ontological Interpretation of Informational Privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185-200.
E-Mail, Terrorism, and the Right to Privacy.Stephen Coleman - 2006 - Ethics and Information Technology 8 (1):17-27.
Biobank Research and the Right to Privacy.Lars Øystein Ursin - 2008 - Theoretical Medicine and Bioethics 29 (4):267-285.
The Internet and Japanese Conception of Privacy.Masahiko Mizutani, James Dorsey & James H. Moor - 2004 - Ethics and Information Technology 6 (2):121-128.
Added to index2010-12-05
Total downloads112 ( #44,674 of 2,178,217 )
Recent downloads (6 months)1 ( #316,497 of 2,178,217 )
How can I increase my downloads?