Article thumbnail

PRIME Framework V3.

By S. Fischer-Hubner, H. Hedbom, M. Hansen, G. Hogben, C. Andersson, R.E. Leenes, E. Kosta, A.M. Fairchild, P.M.A. Ribbers, P. Keller, B.P. Priem, I.C. Oomen, A. Kuczerawy, J. Tseng, D. Sommer, J.S. Pettersson, G. Kramer, L. Fritsch, M. Kohlweiss, J. Zibuschka and M. Casassa-Mont
OAI identifier:

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.

Suggested articles

Citations

  1. (2003). 3G “ad” Work - 3G’S Breakthrough with mobile Advertising. In:
  2. (2004). A cryptographic framework for the controlled release of certified data.
  3. (2006). A New Software Quality Model for Evaluating COTS Components.
  4. (1998). A product perspective on total data quality management.
  5. (2003). A social and technological view of ambient intelligence in everyday life: What bends the trend?
  6. (2008). A typology of identity-related crime: Conceptual, technical, and legal issues. (forthcoming):
  7. (2005). Article 29 Data Protection Working Party. Opinion 5/2005 on the use of location data with a view to providing value-added services.
  8. (2004). Article 29 Data Protection Working Party. Opinion on More Harmonised Information Provisions.
  9. Association E-Government Act of 2002- Details and Background,
  10. (1999). authentication and anonymity in a legal context.
  11. (1999). Building consumer trust online: How merchants can win back lost consumer trust in the interest of e-commerce sales.
  12. (1999). Code and other Laws of Cyberspace.
  13. (2005). Code and the slow erosion of privacy.
  14. (2007). Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions on Radio Frequency Identification (RFID) in Europe: steps towards a policy framework, COM(2007) 96,
  15. (2002). Complexity and information overload in society: Why increasing efficiency leads to decreasing control. The Information Society:
  16. (2002). Conceptualizing privacy.
  17. (2006). Council of the European Union, Statements, Council doc.
  18. (2007). Council of the European Union. Agreement between the EU and the USA on the processing and transfer of PNR data by air carriers to the United States Department of Homeland Security.
  19. (2006). Data Protection Audit Framework (EU Directive 95/46) Part I: Baseline Framework.
  20. (2007). Data protection in the third pillar: in the aftermath of the ECJ decision on PNR data and the data retention directive.
  21. (2002). Data retention and the panoptic society: The social benefits of forgetfulness.
  22. (2004). Diffusion of innovations in service organizations: Systematic review en recommendations.
  23. (2003). Diffusion of Innovations,
  24. (2002). Directive 2002/58/EC of the European Parliament and of the
  25. (1995). Directive 95/46/EC of the European Parliament and of the
  26. (2007). Directorate-General Information Society and Media. Broadband access in the EU:
  27. (2001). Discipline and punish: The birth of the prison. Londen: Allen Lane;
  28. (2006). DRM Sony system, consumer protection and user privacy.
  29. (2002). E-Privacy and Online Data Protection,
  30. (2006). Effects of site, vendor and consumer characteristics on web site trust and disclosure.
  31. (2001). Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation.
  32. (1997). Electronic Transaction LLC. The set standard specification,
  33. (2007). Electronic voting machines eliminated in the Netherlands.
  34. (2001). English dictionary for advanced learners,
  35. (1950). European Convention of Human Rights (ECHR).
  36. (2007). European Data Protection Law – Corporate Compliance and Regulation,
  37. (2004). Evaluating public sector innovation in networks: extending the reach of the national cancer institute’s web bases health communication intervention research initiative. The Innovation Journal: The public Sector
  38. (2008). Evaluation of final application prototypes (Deliverable): PRIME Consortium,
  39. (2005). Exploring the feasibility of a spatial user interface paradigm for privacy enhancing technology. In:
  40. (2004). Facing the challenge; the Lisbon strategy for growth and employment. Luxembourg: European Communities,
  41. (2004). Foundation for Information Policy Research, UK Information Commissioner study project: privacy and law enforcement, Paper n°4: the legal framework, an analysis of the constitutional European approach to issues of data protection and law enforcement ,
  42. (2001). From the 'digital divide' to 'digital inequality': Studying internet use as penetration increases:
  43. (2007). Generic Predefined Privacy Preferences for Online Applications. In:
  44. (2004). Globalizing surveillance; Comparative and sociological perspectives.
  45. (2007). Governing the safety state. Tilburg Safety Seminar.
  46. (2001). Groeimodel voor IV-functie – Het systematisch weergeven van een herinrichtingproces.
  47. (2004). Guidance to the privacy and electronic communications (EC Directive) Regulations – Part 1: marketing by electronic means,
  48. (1985). How information gives you competitive advantage.
  49. (2000). How much negotiation and details can users handle? Experiences with security negotiation and the granularity of access control in communications.
  50. (2002). Identifying law and policy concerns. In
  51. (1998). Identity and deception in the virtual community.
  52. (2001). Identity management and its support of multilateral security.
  53. (2003). Identity Management Systems: Identification and Comparison Study.
  54. (2006). Identity Theft, Identity Fraud and/or Identity-related Crime.
  55. (2003). Identity theft, privacy, and the architecture of vulnerability.
  56. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation.
  57. (1988). Information Technology and Dataveillance.
  58. (1992). Information Technology Diffusion: A Review of Empirical Research.
  59. (2001). Informationstechnische Voraussetzungen von E-Government am Beispiel des Katastrophenschutzes mittels Mobilkommunikation. In:
  60. (1973). Innovations and organizations,
  61. Institute of Standards and Technology, Role-Based Access Control,
  62. (2005). Intervention at the European Parliament (LIBE Committee) Public Seminar “Data Protection and citizens’ Security: What Principles for the European
  63. (1995). Legislating privacy; technology, social values, and public policy.
  64. (2003). Liberty ID-FF protocols and schema specification,
  65. (2006). life; het tweede leven van virtual reality. The Hague: EPN,
  66. (2002). Location Aggregation from Multiple Sources.
  67. (2007). Managing identities in online social environments. (forthcoming):
  68. (1999). Media Player and Privacy.
  69. (2006). Merriam webster online dictionary,
  70. (2005). Microsoft‘s vision for an identity metasystem white paper,
  71. (2005). Mind your step! How profiling location reveals your identity and how you prepare for it.
  72. (1999). Net surfers don't ride alone: Virtual communities as communities. In
  73. (2006). Network. A report on the surveillance society: Surveillance Studies Network,
  74. (1986). Out of the Crisis. Center for Advanced Engineering Study,
  75. (1991). Perceived control and the effects of crowding and consumer choice on the service experience.
  76. (2007). Personal identity in online environments (forthcoming PhD thesis):
  77. (2006). piracy and digital rights management: The good, the bad and the ugly? In Paper presented at the 2nd Greek national conference with international participation: Electronic democracy -challenges of the digital era,
  78. (2000). Plan 9 from cyberspace: The implications of the internet for personality and social psychology.
  79. (2006). Privacy & human rights.
  80. (2007). Privacy & identity management. Oslo: Senter for rettsinformatikk,
  81. (1967). Privacy and freedom.
  82. (1997). Privacy and the computer: Why we need privacy in the information society.
  83. (1980). Privacy and the limits of law.
  84. (2003). Privacy as a social issue and behavioural concept.
  85. (2004). Privacy Enhancing Technologies – Witboek voor beslissers. Ministry of internal affairs and Kingdom relations;
  86. (2005). Privacy in the digital networked economy.
  87. (2001). Privacy protection, control of information and privacy-enhancing technologies. Computers and Society,
  88. (2004). Privacy versus willingness to disclose in e-commerce exchanges: The effect of risk awareness on the relative role of trust and control.
  89. (2002). Private demands and demands for privacy: Dynamic pricing and the market for customer information.
  90. (2006). Project. Whitepaper: Personal identity.
  91. (1998). Protecting privacy in an information age: The problem of privacy in public.
  92. (2007). Protecting privacy online: Law or technology? (forthcoming):
  93. (2006). Protection Supervisor, First opinion on the Proposal for a Council Framework Decision on the protection of personal data processed in the framework of police and judicial co-operation in criminal matters (COM (2005) 475 final),
  94. (1998). pseudonymity, or inescapable identity on the net. Computers and Society,
  95. (2005). Public administration in the information society: Essays on risk and trust.
  96. (2004). Public displays of connection.
  97. (2006). Real ID, real trouble?
  98. (1990). Rechtssicherheit trotz Anonymitt in offenen digitalen Systemen. Datenschutz und Datensicherung DuD,
  99. (2008). Requirements v3 (forthcoming) (Deliverable):
  100. (2000). Rethinking public key infrastructures and digital certificates,
  101. (2005). RFID and the perception of control: The consumer’s view.
  102. (2003). Security and Privacy in Sensor Networks.
  103. (2004). Security considerations in the information development life cycle.
  104. (1985). Security without Identification: Transaction Systems to Make Big Brother Obsolete.
  105. (2004). security, and privacy in the post-9/11 European information society.
  106. (2003). Some problems with employee monitoring.
  107. (2005). Sony Slated over Anti-Piracy CD. BBC News,
  108. (2001). Surveillance society; monitoring everyday life.
  109. (2003). The digital divide as a complex and dynamic phenomenon.
  110. (1999). The economics, concept and design of information intermediaries.
  111. (2002). The failure of privacy enhancing technologies (PETs) and the voiding of privacy.
  112. (2002). The future of business services in the age of ubiquitous computing.
  113. (2000). The Humane Interface - New Directions for Designing Interactive Systems.
  114. (2004). The impact of the online and offline features on the user acceptance of internet shopping malls.
  115. (2005). The laws of identity:
  116. (2004). The logic of consent: The diversity and deceptiveness of consent as a defense to criminal conduct. Aldershot/Burlington: Ashgate,
  117. (2007). The need for global privacy standards, Ethics and human rights in information society.
  118. (2004). The Open Group Identity Management Work Area. The open group identity management white paper,
  119. (2006). The Prüm Convention: A Real-False Reinforced Cooperation in the Area of Freedom, Security and Justice of the EU and EC Treaties (Le Traité de Prüm une Vraie-Fausse Coopération Renforcée dans L'Espace de Sécurité de Liberté et de
  120. (1999). The real jukebox monitoring system. Computerbytesman.com,
  121. (2003). The social affordances of the internet for networked individualism.
  122. (1968). The social psychology of privacy.
  123. (1999). The Unified Software Development Process.
  124. (2008). Transparency as the Key to User-controlled Processing of Personal Data.
  125. (2001). Trust and distrust definitions: One bite at a time. In
  126. (2005). Trust in PRIME.
  127. (2000). Trust online.
  128. (2007). Unlinkability, Undetectability, Unobservability, Pseudonymity,
  129. (1981). Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
  130. (2003). Varieties of personal information as influences on attitudes toward surveillance.
  131. (2007). Web 2.0; what does it mean and why does it matter?
  132. (1998). Web Consortium. P3P protocol specification.
  133. (2005). What is web 2.0; Design patterns and business models for the next generation of software. O'Reilly,
  134. (2000). When choice is demotivating: Can one desire too much of a good thing?
  135. (1975). Why privacy is important.
  136. (2003). Workplan — Description of Work,
  137. (2005). WP 2.2. Requirements version 0 (Deliverable): PRIME Consortium,