scispace - formally typeset
Search or ask a question

Showing papers on "Privacy software published in 1997"


Journal ArticleDOI
TL;DR: Author demonstrates that removing all explicit identifiers from medical data does not guarantee medical record confidentiality, but examines three new software systems that do help maintain anonymity, but warns that systems' limitations demand complementary policies.
Abstract: Author demonstrates that removing all explicit identifiers from medical data does not guarantee medical record confidentiality. She examines three new software systems that do help maintain anonymity, but warns that systems' limitations demand complementary policies.

401 citations


Proceedings ArticleDOI
23 Feb 1997
TL;DR: The paper gives an overview of existing and potential privacy enhancing technologies for the Internet, as well as motivation and challenges for future work in this field.
Abstract: The increased use of the Internet for everyday activities is bringing new threats to personal privacy. The paper gives an overview of existing and potential privacy enhancing technologies for the Internet, as well as motivation and challenges for future work in this field.

233 citations


Journal ArticleDOI
01 Sep 1997
TL;DR: This paper contends that while biometric concerns may pose legitimate privacy concerns, these issues can be adequately addressed and in the final analysis, biometrics emerges as privacy's friend.
Abstract: From the INS to ATM's, both the public and private sectors are making extensive use of biometrics for human recognition. As this technology becomes more economically viable and technically perfected, and thus more commonplace, the field of biometrics will spark legal and policy concerns. Critics inevitably compare biometrics to Big Brother and the loss of individual privacy. The probiometric lobby generally stresses the greater security and improved service that the technology provides. Is biometrics privacy's friend or privacy's foe? This paper explores the various arguments for and against biometrics and contends that while biometrics may pose legitimate privacy concerns, these issues can be adequately addressed. In the final analysis, biometrics emerges as privacy's friend.

149 citations


Book
01 Oct 1997
TL;DR: Cate as mentioned in this paper provides an overview of the technologies that are provoking the current privacy debate and discusses the range of legal issues that these technologies raise He examines the central elements that make up the definition of privacy and the values served, and liabilities incurred, by each of those components.
Abstract: Electronic information networks offer extraordinary advantages to business, government, and individuals in terms of power, capacity, speed, accessibility, and cost But these same capabilities present substantial privacy issues With an unprecedented amount of data available in digital format--which is easier and less expensive to access, manipulate, and store--others know more about you than ever beforeConsider this: data routinely collected about you includes your health, credit, marital, educational, and employment histories; the times and telephone numbers of every call you make and receive; the magazines you subscribe to and the books your borrow from the library; your cash withdrawals; your purchases by credit card or check; your electronic mail and telephone messages; where you go on the World Wide Web The ramifications of such a readily accessible storehouse of information are astonishingGovernments have responded to these new challenges to personal privacy in a wide variety of ways At one extreme, the European Union in 1995 enacted sweeping regulation to protect personal information; at the other extreme, privacy law in the United States and many other countries is fragmented, inconsistent, and offers little protection for privacy on the internet and other electronic networksFor all the passion that surrounds discussions about privacy, and the recent attention devoted to electronic privacy, surprisingly little consensus exists about what privacy means, what values are served--or compromised--by extending further legal protection to privacy, what values are affected by existing and proposed measures designed to protect privacy, and what principles should undergird a sensitive balancing of those valuesIn this book, Fred Cate addresses these critical issues in the context of computerized information He provides an overview of the technologies that are provoking the current privacy debate and discusses the range of legal issues that these technologies raise He examines the central elements that make up the definition of privacy and the values served, and liabilities incurred, by each of those components Separate chapters address the regulation of privacy in Europe and the United States The final chapter identifies four sets of principles for protecting information privacy The principles recognize the significance of individual and collective nongovernmental action, the limited role for privacy laws and government enforcement of those laws, and the ultimate goal of establishing multinational principles for protecting information privacyPrivacy in the Information Age involves questions that cut across the fields of business, communications, economics, and law Cate examines the debate in provocative, jargon-free, detail

135 citations



Journal ArticleDOI
TL;DR: This article highlights a contemporary privacy problem that falls outside the scope of dominant theoretical approaches and is preliminary work in a larger effort to map out future theoretical directions.
Abstract: This article highlights a contemporary privacy problem that falls outside the scope of dominant theoretical approaches. Although these approaches emphasize the connection between privacy and a protected personal (or intimate) sphere, many individuals perceive a threat to privacy in the widespread collection of information even in realms normally considered "public". In identifying and describing the problem of privacy in public, this article is preliminary work in a larger effort to map out future theoretical directions.

94 citations


04 Jan 1997

69 citations


Proceedings ArticleDOI
08 Dec 1997
TL;DR: The paper proposes a scheme that allows the user to register with the network and remain anonymous (both location and identification) and authentication is achieved through a token based scheme.
Abstract: Third generation mobile networks aim to offer 'any service, anywhere, at any time'. Users require privacy within these systems in order to feel confident of their use. Privacy requirements (in mobile networks) are: content, location and identification privacy, and authentication. Differing from previous approaches to privacy, the network itself is considered to be an untrusted party. The paper proposes a scheme that allows the user to register with the network and remain anonymous (both location and identification). Digital mixes are used to create anonymity and authentication is achieved through a token based scheme. Finally the aspect of information leaking to authorised third parties is discussed and billing requirements are detailed which involve the use of 'coin' like tokens traded for services.

41 citations


01 Jan 1997

31 citations


Journal ArticleDOI
TL;DR: By returning to the fundamental definition of money and the essential nature of electronic information systems, the authors argue that privacy, reliability, and security are also critical issues in electronic commerce.
Abstract: In this article the authors identify reliability, privacy, and security as critical issues in electronic commerce In other work, designers of information systems have identified other issues as critical, such as the ability to provide offline verification It is widely agreed that an electronic currency system must provide divisibility, scalability in number of users, conservation of money or tamper resistance, exchangeability or interoperability, and availability However, by returning to the fundamental definition of money and the essential nature of electronic information systems, the authors argue that privacy, reliability, and security are also critical issues It is argued that these issues are particularly important in Internet commerce The authors conclude by noting how some proposed Internet commerce systems provide, or fail to provide, security, reliability, and privacy

29 citations


Book
01 Jan 1997


Book ChapterDOI
01 Jan 1997


Journal ArticleDOI
TL;DR: The 2002 Global Internet Symposium, chaired by Markus Hofmann and Robin Kravets and held during November 17–21 in Taipei, Taiwan in conjunction with IEEE Globecom 2002, was the seventh in a series of successful symposia.
Abstract: Until a few years ago, most of the world knew only little or nothing about the Internet. It was a relatively small network used largely by the scientific community for sharing resources on computers and for interacting with research colleagues. Ever since, the Internet has grown dramatically and has revolutionized our society and our economy. It has changed the way people communicate with each other and the way business is conducted. The Internet has created a global environment that is drawing people from all over the world closer together––it has evolved into a Global Internet. The global nature of the Internet poses significant technical challenges at all levels. These challenges have been at the focus of a very successful symposium series––the IEEE Global Internet Symposium, the flagship workshop of the IEEE’s Internet Technical Committee. These symposia provide a forum for researchers and practitioners to present and discuss advances in Internet-related technologies with a special focus on experimental systems and on emerging Internet technologies. The 2002 Global Internet Symposium, chaired by Markus Hofmann and Robin Kravets and held during November 17–21 in Taipei, Taiwan in conjunction with IEEE Globecom 2002, was the seventh in a series of successful symposia. After an extensive reviewing process from a program committee made of well-respected networking experts, 28 outstanding papers were accepted out of a record 141 submissions. Despite the distant location, IEEE Global Internet 2002 had excellent attendance and participation in all of the sessions. The papers and presentations addressed a wide range of challenging topics and generated interesting

Posted Content
TL;DR: The direct privacy implications of both private keys and public keys are considered, and proposals made for new privacy rights that are needed are made.
Abstract: This paper identifies the privacy implications of digital signatures, and some weaknesses in current approaches in law and policy in Australia. It introduces digital signatures and current standards and policies concerning them. The direct privacy implications of both private keys and public keys are considered, as are the consequential privacy implications. Legislative controls (Privacy Act 1988) and recommendations (PKAF Report) are then considered, and proposals made for new privacy rights that are needed.

Journal ArticleDOI
TL;DR: An overview of some of the emerging technologies that currently and potentially will impact the privacy of every individual, centred around computer or computer-driven applications.




Journal Article
TL;DR: Universities, as significant users of new technologies, need to assess the privacy implications of using new technologies by asking: What does it mean for the individual?
Abstract: Among the many challenges posed by new information and communications technologies is to address the question of what it all means for individual privacy. Farreaching changes to the way we communicate with each other, with organisations and with the world at large are presently being ushered in, and some of these have quite significant implications for our personal privacy. While it is true that cultures are changing, I suggest there are parts of the present culture that we should aim to preserve. Personal privacy is one of these. The right to privacy is such a basic, universal expectation, that it is rarely as clearly articulated as it is felt, and rarely more keenly felt than when it is threatened. But how do we protect it in the face of fundamental changes to our modes and means of communication? How can we avail ourselves of the best that the technology has to offer without at the same time losing autonomy, anonymity, and choice over who knows us and what we’re doing? Privacy in the context of new technologies is very much about how we define ourselves as we interact with others via complex electronic systems and connections. A conscious effort is required to ensure we do not gradually and unwittingly accept a diminution of our privacy rights. Universities, as significant users of new technologies, need to assess the privacy implications of using new technologies by asking: What does it mean for the individual? Does it reduce or support individual autonomy, choice, sense of security, trust? What information does it generate about individuals and how is it used? What controls exist to protect the integrity of the transaction? Ideally, this assessment should take place before the event; if not there is a chance that any infringements on privacy will slow the pace and extent to which the new service will be embraced by the very communities they are designed for. In any case, the assessment should not take place only once, but be a continuing appraisal of the impact on our private lives. To quote David Flaherty, formerly a leading privacy scholar and now the Information and Privacy Commissioner of the Province of British Columbia:

Journal ArticleDOI
TL;DR: If you follow certain steps, you can ensure the highest possible visibility while retaining the maximum level of privacy; the article presents guidelines on how best to achieve this.
Abstract: Job hunting is probably one of the best Internet applications to date, since it promises to bring candidates and companies together worldwide. Nevertheless, online career services frustrate many candidates: resume submission processes are complex, and they can't guarantee privacy for someone already employed. However, if you follow certain steps, you can ensure the highest possible visibility while retaining the maximum level of privacy; the article presents guidelines on how best to achieve this.

Journal ArticleDOI
TL;DR: This article will discuss the recent UK proposals with regards to encryption in Britain and the European Union.
Abstract: The impact of Internet technology has raised many privacy issues and it will be one of the greatest civil liberty issues of the next century. Millions of people use electronic mail (email) on the Internet and, at present, there is little security involved in sending an email. Cryptography may be an important tool to safeguard individual on-line privacy from others but its use and regulation has created many privacy and speech related issues especially in the USA. This article will discuss the recent UK proposals with regards to encryption in Britain and the European Union.

Journal ArticleDOI
TL;DR: The Web actually offers an opportunity to improve the authors' lives by managing the invasions of their privacy, and the Internet and the World Wide Web are rapidly making things worse.
Abstract: In our changing world, it's becoming harder and harder to keep secrets. Government agencies maintain profiles on each of us, credit card companies record every transaction we make, and mailing lists sell our addresses and telephone numbers to anyone who wants to buy them. This has caused much alarm, and at first glance it seems that the Internet and the World Wide Web are rapidly making things worse. Already, there are many sites that let anyone look up our addresses and telephone numbers. Nevertheless, in this article, I argue that the Web actually offers an opportunity to improve our lives by managing the invasions of our privacy.


Book ChapterDOI
24 Feb 1997
TL;DR: It is claimed that strong cryptography will be used to preserve anonymity only in a highly restricted subset of financial transactions and that legal rules can and should play an important supplementary role in the protection of privacy in financial transactions.
Abstract: There is considerable support in the cryptography community for the “Cypherpunk Credo,” defined as: “Privacy through technology, not legislation.“ Much discussion to date has assumed that the U.S. government's opposition to strong cryptography, such as its key escrow proposals, is the primary obstacle to widespread use of anonymous electronic cash. For purposes of this paper, I assume that strong cryptography is legal and readily available. Even in that event, I claim that strong cryptography will be used to preserve anonymity only in a highly restricted subset of financial transactions. Furthermore, because technology often will not assure privacy, legal rules can and should play an important supplementary role in the protection of privacy in financial transactions.



Book
05 May 1997
TL;DR: Bryan Pfaffenberger arms you with privacy defense strategies such as creating a bulletproof password, getting your name out of the databases, and cleaning up your browser's trails.
Abstract: From the Publisher: Protect Your Privacy on the Internet tells you everything you need to know to ensure your privacy and use the same technology that's being used against you to protect yourself. You'll get industrial-strength encryption tools to keep your affairs secret, the way they ought to be. Bryan Pfaffenberger arms you with privacy defense strategies such as creating a bulletproof password, getting your name out of the databases, and cleaning up your browser's trails. Protect Your Privacy on the Internet gives you proven privacy defense strategies and techniques to help you make the Net a safer place to work and play. You'll get the names of Internet privacy organizations that are working to protect your privacy rights and find out what you can do to help. On the accompanying CD-ROM you'll find a collection of Windows privacy freeware and shareware.

Book ChapterDOI
01 Jan 1997
TL;DR: International privacy regulations, besides the European Union Directive on Data Protection, will be needed because the communication using the new information infrastructure will be global.
Abstract: Privacy is a fundamental civil right which has to be protected in a democratic society. In the global information society, individual privacy is seriously endangered. An increasing amount of personal data is being transferred around the world and communication data of users could be easily traced and used to create individual communication profiles. International privacy regulations, besides the European Union Directive on Data Protection, will be needed because the communication using the new information infrastructure will be global.