e-Privacy and Social Networks

被引:0
作者
Roig, Antoni [1 ]
机构
[1] Univ Autonoma Barcelona, Inst Derecho & Tecnol, IDT, Barcelona 08193, Spain
来源
IDP-INTERNET LAW AND POLITICS | 2009年 / 09期
关键词
social networks; privacy-enhancing technologies; privacy; e-privacy; analysis of social networks; privacy in design;
D O I
暂无
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
The technological risks for privacy and anonymity are not limited to the problems of databases. Social networks, RFID tags, ubiquitous data processing and robotics, for example, are other examples of risk. Social networks have an economic value and search engines increasingly try to access their users' personal information. In contrast, the study of privacy in social networks is a new area. Experts in information technology generally consider privacy as a quantifiable attribute which can be negotiated and probably exchanged between individuals for certain benefits. We believe, on the other hand, that regulation should favour the so-called Privacy Enhancing Technologies (PET) to guarantee privacy, and that these are particularly necessary in social networks. Fundamental rights cannot be reduced to individual options which need to be activated. The public component of public policy could be guaranteed if versions favourable to privacy were incorporated in the design of information technologies themselves, such as privacy by default. Another way may be for businesses to see economic benefits in planning technological measures guaranteeing privacy.
引用
收藏
页数:11
相关论文
共 16 条
[1]  
Androulaki E, 2008, LECT NOTES COMPUT SC, V5134, P202, DOI 10.1007/978-3-540-70630-4_13
[2]  
BERTEAU S, 2007, FACEBOOKS MISREPRESE
[3]   Private relationships in social networks [J].
Carminati, Barbara ;
Ferrari, Elena ;
Perego, Andrea .
2007 IEEE 23RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOP, VOLS 1-2, 2007, :163-171
[4]  
Carminati B, 2008, LECT NOTES COMPUT SC, V5094, P81
[5]  
CHEN L., 2006, THE AMHERST STUDENT
[6]  
Domingo-Ferrer J, 2007, LECT NOTES ARTIF INT, V4617, P373
[7]  
Fan L, 2008, LECT NOTES ARTIF INT, V5009, P668, DOI 10.1007/978-3-540-79721-0_89
[8]  
GRUPO DE TRABAJO SOBRE PROTECCION DE DATOS DEL ARTICULO 29, 2009, DICT 5 2009 RED SOC
[9]  
Hansen M, 2008, FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, P199
[10]  
HOGBEN G, 2007, SECURITY ISSUES RECO