32,944 research outputs found
BeeintrÀchtigung der PrivatsphÀre in der Informationsgesellschaft [Detraction of Privacy in the Information Society]
Digitizing, Minimizing and Networking are the prerequisites for the evolving Information-Society, whose most attracting features are gathering, storing, linking and providing of enormous amounts of data. Best-known advantages are easy communication via e-Mail, easy access to information via Internet, comfortable services in e-Commerce and e-Government. On the other hand there are substantial dangers for privacy coming along with these developments. This paper shows basic technological developments, different actors and their use of personal data and deals with short and long-term effects of detraction of privacy. Special emphasis is given to the analysis of existing trade-offs between efficiency and security on the one hand and privacy on the other. Based on existing privacy regulations some recommendations for further policy actions are given. -- Digitalisierung, Minia-turisierung und Vernetzung haben die Voraussetzungen fĂŒr eine Informationsgesellschaft geschaffen, die durch Sammlung, Speicherung und VerknĂŒpfung enormer Datenmengen und deren breite VerfĂŒgbarkeit gekennzeichnet ist. Das schafft fĂŒr die meisten StaatsbĂŒrger erhebliche Vorteile, die durch Schlagworte wie e-Mail, Internet, e-Commerce, aber auch elektronische Erledigung von Behördenwegen umschrieben werden können. Die verfĂŒgbaren Datenmassen entfalten aber auch ein Eigenleben, das in die PrivatsphĂ€re der meisten StaatsbĂŒrger in vielfacher Weise eingreift; den meisten ist gar nicht bewusst, wieviel Informationen ĂŒber sie verfĂŒgbar sind und z.T. auch gehandelt wer-den. Im Folgenden sollen zunĂ€chst die neuen technischen Möglichkeiten der Informationssammlung, -speicherung und -verknĂŒpfung beschrieben werden; es wird aufgezeigt, welche dieser neuen Möglichkeiten vom wem genutzt werden, und mit welchen Konsequenzen. Dann wird das Janusgesicht der Informationsgesellschaft herausgearbeitet, die kritische Austauschbeziehung zwischen Effizienz und Sicherheit auf der einen Seite, die durch die intensive Informationssammlung und -verarbeitung ĂŒberhaupt erst ermöglicht wird, und dem daraus resultierenden z.T. tiefen Eindringen in die PrivatsphĂ€re auf der anderen. Aus einer Diskussion der bestehenden Datenschutzbestimmungen wird versucht, erste Ansatzpunkte fĂŒr Lösungen abzuleiten. Das stöĂt auf zahlreiche Schwierigkeiten: Die Dynamik des Sektors, ein in weiten Bereichen noch mangelndes Problembewusstsein, international erheblich differierende Vorstellungen ĂŒber Art und Umfang der SchutzbedĂŒrftigkeit, aber auch die Tatsache, dass es einer ausgewogenen Kombination gesetzlicher MaĂnahmen mit SelbstbeschrĂ€nkung, also bewusstem Verzicht der Nutzer auf manchen Komfort bedarf.PrivatsphĂ€re, Privacy, Datenschutz, Informationsgesellschaft, problemorientierte TechnikfolgenabschĂ€tzung
Privacy self-regulation and the changing role of the state: from public law to social and technical mechanisms of governance
This paper provides a structured overview of different self-governance mechanisms for privacy and data protection in the corporate world, with a special focus on Internet privacy. It also looks at the role of the state, and how it has related to privacy self-governance over time. While early data protection started out as law-based regulation by nation-states, transnational self-governance mechanisms have become more important due to the rise of global telecommunications and the Internet. Reach, scope, precision and enforcement of these industry codes of conduct vary a lot. The more binding they are, the more limited is their reach, though they - like the state-based instruments for privacy protection - are becoming more harmonised and global in reach nowadays. These social codes of conduct are developed by the private sector with limited participation of official data protection commissioners, public interest groups, or international organisations. Software tools - technical codes - for online privacy protection can give back some control over their data to individual users and customers, but only have limited reach and applications. The privacy-enhancing design of network infrastructures and database architectures is still mainly developed autonomously by the computer and software industry. Here, we can recently find a stronger, but new role of the state. Instead of regulating data processors directly, governments and oversight agencies now focus more on the intermediaries - standards developers, large software companies, or industry associations. And instead of prescribing and penalising, they now rely more on incentive-structures like certifications or public funding for social and technical self-governance instruments of privacy protection. The use of technology as an instrument and object of regulation is thereby becoming more popular, but the success of this approach still depends on the social codes and the underlying norms which technology is supposed to embed. --
Governance of Digitalization in Europe A contribution to the Exploration Shaping Digital Policy - Towards a Fair Digital Society? BertelsmannStiftung Study
Digital policy is a unique policy area. As a cross-cutting policy issue, it has an impact not only on individual areas
of regulation but on almost all other policy areas as well. Aspects of digital policy such as data regimes, cybersecurity
and standardization issues are relevant not only to the the future of the internet or 5G mobile communications
infrastructure, but to other areas of our lives to which they are closely linked, which range from automated driving
to digital assistance systems in education and healthcare to the digitalization of sectors such as agriculture and
construction. Nevertheless, regulation efforts have thus far been primarily sector-specific and national in their
scope. With a few exceptions, such as the EUâs controversial General Data Protection Regulation, there are few
digital policy frameworks in place for Europe that defines and integrates basic principles for broad application.
Instead, we face a situation in which a variety of approaches stand side by side, at times complementing each other
but also â all too often â competing with each other in ways that foster inconsistencies. The development of Europeâs
5G infrastructure is illustrative of this state of affairs. Despite the presence of what were originally uniform
objectives across Europe, 28 nationally distinct tendering procedures with different requirements have since
emerged. As a result, we must now find ways to manage the problems associated with having three or more networks
per country, high costs, a difficult debate over security and the threat of dependency on non-EU providers
Vortex of the Web. Potentials of the online environment
This volume compiles international contributions that explore the potential risks and chances coming along with the wide-scale migration of society into digital space. Suggesting a shift of paradigm from Spiral of Silence to Nexus of Noise, the opening chapter provides an overview on systematic approaches and mechanisms of manipulation â ranging from populist political players to Cambridge Analytica. After a discussion of the the juxtaposition effects of social media use on social environments, the efficient instrumentalization of Twitter by Turkish politicans in the course of the US-decision to recognize Jerusalem as Israelâs capital is being analyzed. Following a case study of Instagram, Black Lives Matter and racism is a research about the impact of online pornography on the academic performance of university students. Another chapter is pointing out the potential of online tools for the successful relaunch of shadow brands. The closing section of the book deals with the role of social media on the opinion formation about the Euromaidan movement during the Ukrainian revolution and offers a comparative study touching on Russian and Western depictions of political documentaries in the 2000s
The net neutrality debate and the German communications and competition law
A common denominator of network neutrality definitions is a plea against traffic shaping within the Internet and the resultant challenge to the traditional best effort transmission. By means of access regulation of local loop bottleneck components the transfer of market power from the telecommunications network bottleneck components into the complementary Internet access service markets can be avoided. Regulation between access service providers and Internet appli-cation service providers is not justified. The avoidance of network neutrality regulation is of importance, because only then can the adequate market signals (congestion tariffs, quality differentiations etc.) be supplied to the content pro-vider, leading to a more efficient exploitation of the Internet traffic resources. --
Power as an ethical concern in the Global Southâs digital transformation: Power or empowerment?
open access articleThe digitalization of the Global South, particularly with respect to African countries, is moving at a fast pace. This can be seen in the use of information and communications technology (ICT) in different domains such as healthcare, education, industry, entertainment, as well as in the provision of e-government services, to name just a few. Such digital progress is seen as positive and often presented as such in international development discussions, for example at the World Summit on the Information Society Forum 2019 on ICTs for achieving the United Nationsâ Sustainable Development Goals. Despite the positives, there are also negative aspects of digitalization, which have to be addressed in the form of ethical concerns. This paper discusses these concerns by specifically exploring the aspect of power in light of the digital transformation of the Global South. The discussion advanced in this paper is informed by a review of literature
Surveillance and security - a dodgy relationship
Modern societies are vulnerable. We have known this long before the attacks of September 11, but they made it clear to everyone. The second lesson learned was that it is impossible to foresee such events. Although these attacks to the real world were 'low-tech', now there are attempts around the globe to control especially the electronic or virtual world. However, does more surveillance really lead to more security? If so, what will be the price we have to pay? This paper gives an overview over what happened on a governmental level after September 11 in the EU, in some EU-member states and in the USA. Apart from political actions, we already face even direct socio-economic implications as some anonymizer services were shut down. They empowered Internet users to protect their right of privacy, and they were the first targets of investigation and suspicion. Shutting down these services reduces the potential room of users to protect their privacy by using privacy enhancing technologies (PETs). This is an indicator for a serious societal problem: democracy already has changed. In a second part this paper analyses the relationship between surveillance and security. It is argued that, the international over-reactions will not lead to the intended effects. Rather, they will have long-term implications for the respective societies.Privacy, security, surveillance, international policy
Recommended from our members
Technology-enhanced Personalised Learning: Untangling the Evidence
Technology-enhanced personalised learning is not yet common in Germany, which is why we have tasked scientists with summarising the current status of international research on the matter. This study demonstrates the great potential of technology in implementing effective personalised learning. Nevertheless, it has not been assessed yet whether the practical implementation actually works: Even in countries such as the U.S., which lead the way in using techology in classroom settings, hardly any evaluation studies have been done to prove the effectiveness of technology-enhanced personalised learning. In the light of the above, the authors make recommendations for actions to be taken in Germany to make best use of the potential of technology in providing individual support and guidance to students
- âŠ