Verified Document

Privacy Protection Commenting On The Research Proposal

Moreover, all these approaches are not completely sufficient in meeting the challenges mentioned in section 3.2. For instance, PETs and privacy models do not explicitly contribute in a reduction of data collection, nor is that their intent or purpose. Although anonymous data collection is based on the assumption that if data is collected anonymously then it cannot be linked with any individual, and if data cannot be related to an individual then it poses no threats in terms of privacy. Thus, detailed privacy policies and safeguards for data are not seen as critical in this model. By collecting anonymous data, one may argue that a true minimum amount of personal data is being collected. However, ensuring complete anonymity remains both technically and practically difficult.

For example, mix zones and changing pseudonyms are used to maintain anonymity but it is also possible to break the anonymity and track a user in a mix zone. Pervasive computing, then, needs other, more robust means to minimize the amount of data collection. Moreover, there are usability and efficiency issues that arise with any of these approaches. Testing, for example, is typically done in a controlled environment under limited conditions. The effectiveness of many of these solutions, then, has not been adequately tested under typical, real-world, conditions. In a true pervasive computing environment, users will move extensively between different computing environments and will interact with various devices (e.g. starting from small portable hand held device to large wall sized displays), and applications. It is difficult to predict how privacy solutions will perform in a true user-environment under more typical conditions.

Thus, it will be necessary to find and incorporate a unique privacy model that accentuates both social and legal norms, while ensuring the technical ability to protect privacy.

Newman, a. 2008, Protectors of Privacy: Regulating Personal Data in the Global Economy, Cornell University Press.

Miller, S. And J. Weckert 2000, "Privacy, the Workplace...

28, no. 3, pp. 255-65.
OECD -- Recommendation Concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data, (September 1980), cited in: http://www.oecd.org/document/18/0,2340,en_2649_34255_1815186_1_1_1_1,00.html

See also: Caloyannides, M 2004, Privacy Protection and Computer Forensics, 2nd ed., Artech House; Bennett, C.J. And C. Raab 2006, the Governance of Privacy: Policy Instruments in Global Perspective, MIT Press.

For additional discussions on the efficacy of sensitive monitoring devices, see: Glasziou, P., et.al., eds., 2008, Evidence-Based Medical Monitoring: From Principles to Practice, BMJ Press; Jovanov, M. And D. Raskovic, 2000, "Issues in Wearable Computing for Medical Monitoring Applications," Wearable Computers: The Fourth International Symposium, pgs. 43-49, Cited in: http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=888463

See: Blanchard, J. 2004, "Ethical Considerations of Home Monitoring Technology," Telemedicine Information Exchange, vol. 1, no. 4, pp. 63-64, Cited in: http://tie.telemed.org/articles/article.asp?path=homehealth&article=ethicsAndHomeTech_jb_hhct04.xml

See: Yamada & Kamioka 2005.

See: International Telecommunications Union 2005, "Privacy and Ubiquitous Network Societies," ITU Workshop on Ubiquitous Network Societies, New Initiatives Program, April 5-8, 2005; Cited in: http://www.itu.int/osg/spu/ni/ubiquitous/Papers/Privacy%20background%20paper.pdf

Do you really need this here? If you do, a complete scholarly reference will be necessary. I was not able to find one that fit your paragraph's intent.

See the technical discussion in: Golle, P. et.al.,n.d. "Data Collection With Self-Enforcing Privacy," Cited in: http://crypto.stanford.edu/~pgolle/papers/selfprivacy.pdf

See: Aceituno, V. 2005, "On Information Security Paradigms," ISSA Journal,

September; Casey, E 2004, Digital Evidence and Computer Crime, 2nd ed., Academic Press.

Sources used in this document:
references that can be easily manipulated by the end user.

Moreover, all these approaches are not completely sufficient in meeting the challenges mentioned in section 3.2. For instance, PETs and privacy models do not explicitly contribute in a reduction of data collection, nor is that their intent or purpose. Although anonymous data collection is based on the assumption that if data is collected anonymously then it cannot be linked with any individual, and if data cannot be related to an individual then it poses no threats in terms of privacy. Thus, detailed privacy policies and safeguards for data are not seen as critical in this model. By collecting anonymous data, one may argue that a true minimum amount of personal data is being collected. However, ensuring complete anonymity remains both technically and practically difficult.

For example, mix zones and changing pseudonyms are used to maintain anonymity but it is also possible to break the anonymity and track a user in a mix zone. Pervasive computing, then, needs other, more robust means to minimize the amount of data collection. Moreover, there are usability and efficiency issues that arise with any of these approaches. Testing, for example, is typically done in a controlled environment under limited conditions. The effectiveness of many of these solutions, then, has not been adequately tested under typical, real-world, conditions. In a true pervasive computing environment, users will move extensively between different computing environments and will interact with various devices (e.g. starting from small portable hand held device to large wall sized displays), and applications. It is difficult to predict how privacy solutions will perform in a true user-environment under more typical conditions.

Thus, it will be necessary to find and incorporate a unique privacy model that accentuates both social and legal norms, while ensuring the technical ability to protect privacy.

Newman, a. 2008, Protectors of Privacy: Regulating Personal Data in the Global Economy, Cornell University Press.
OECD -- Recommendation Concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data, (September 1980), cited in: http://www.oecd.org/document/18/0,2340,en_2649_34255_1815186_1_1_1_1,00.html
For additional discussions on the efficacy of sensitive monitoring devices, see: Glasziou, P., et.al., eds., 2008, Evidence-Based Medical Monitoring: From Principles to Practice, BMJ Press; Jovanov, M. And D. Raskovic, 2000, "Issues in Wearable Computing for Medical Monitoring Applications," Wearable Computers: The Fourth International Symposium, pgs. 43-49, Cited in: http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=888463
See: Blanchard, J. 2004, "Ethical Considerations of Home Monitoring Technology," Telemedicine Information Exchange, vol. 1, no. 4, pp. 63-64, Cited in: http://tie.telemed.org/articles/article.asp?path=homehealth&article=ethicsAndHomeTech_jb_hhct04.xml
See: International Telecommunications Union 2005, "Privacy and Ubiquitous Network Societies," ITU Workshop on Ubiquitous Network Societies, New Initiatives Program, April 5-8, 2005; Cited in: http://www.itu.int/osg/spu/ni/ubiquitous/Papers/Privacy%20background%20paper.pdf
See the technical discussion in: Golle, P. et.al.,n.d. "Data Collection With Self-Enforcing Privacy," Cited in: http://crypto.stanford.edu/~pgolle/papers/selfprivacy.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Privacy for High School Students
Words: 12892 Length: 40 Document Type: Term Paper

Internet: Privacy for High School Students An Analysis of Privacy Issues and High School Students in the United States Today In the Age of Information, the issue of invasion of privacy continues to dominate the headlines. More and more people, it seems, are becoming victims of identity theft, one of the major forms of privacy invasion, and personal information on just about everyone in the world is available at the click of

Canadian National Security and Privacy
Words: 2773 Length: 10 Document Type: Term Paper

" One of the largest issues between the two nations is the issue of truck passage. In the past trucks carrying goods or cargo had enjoyed a cursory glance as they crossed into the other nation however, after the World Trade Towers came down border agents on both sides of the border began to investigate trucks with much more scrutiny than ever before. Historic allies, Canada and the United States agreed following

Legal Environment and Impact on
Words: 992 Length: 3 Document Type: Case Study

This could be something like another computer picking up someone's credit card number during what was supposed to be a secure transaction, or an employee of a company giving out a person's confidential information over the phone to someone who is not authorized to receive it. However it happens, confidentiality breaches are serious, and must be addressed immediately so they do not happen again (Allen 2001). Integrity of information assures

Drones Unmanned Aerial Systems Uavs
Words: 12745 Length: 40 Document Type: Thesis

This category can further be divided into six subgroups namely; short-range, medium range, long-range, close range, endurance, Medium Altitude Long Endurance (MALE) Unmanned Aerial Vehicles (UAVs). The long-range UAVs are technologically more advanced as they use satellites in order to overcome the communication problem between the UAVs and the ground stations. This communication problem is generally caused by the curvature of the earth. The medium, short and close range

Business in 2009, Heartland Payment Systems Hps
Words: 1558 Length: 5 Document Type: Essay

Business In 2009, Heartland Payment Systems (HPS) reported a security breach in one of its main databases. What happened is the online credit and debit card processor, reported significant portions of customer files were stolen over the course of one year. They contained all the Visa and MasterCard numbers for 175 thousand of the 250 thousand retailers the company was working with. This is potentially exposing tens millions of individual

Information Technology Industry in Washington, DC: Regulatory Frameworks...
Words: 1087 Length: 3 Document Type: Case Study

Law and Policy Case Study Overview of legal environment of Washington, DC Washington, DC is among the U.S. states that hold most of the U.S. economy. The central location of Washington, DC, provides it with strategic business opportunities and other related economic activities that contribute to the overall economy of the U.S. The strategic location of Washington, DC, implies that it has various legal regulations that influence the execution of different activities

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now