32,944 research outputs found

    BeeintrÀchtigung der PrivatsphÀre in der Informationsgesellschaft [Detraction of Privacy in the Information Society]

    Get PDF
    Digitizing, Minimizing and Networking are the prerequisites for the evolving Information-Society, whose most attracting features are gathering, storing, linking and providing of enormous amounts of data. Best-known advantages are easy communication via e-Mail, easy access to information via Internet, comfortable services in e-Commerce and e-Government. On the other hand there are substantial dangers for privacy coming along with these developments. This paper shows basic technological developments, different actors and their use of personal data and deals with short and long-term effects of detraction of privacy. Special emphasis is given to the analysis of existing trade-offs between efficiency and security on the one hand and privacy on the other. Based on existing privacy regulations some recommendations for further policy actions are given. -- Digitalisierung, Minia-turisierung und Vernetzung haben die Voraussetzungen fĂŒr eine Informationsgesellschaft geschaffen, die durch Sammlung, Speicherung und VerknĂŒpfung enormer Datenmengen und deren breite VerfĂŒgbarkeit gekennzeichnet ist. Das schafft fĂŒr die meisten StaatsbĂŒrger erhebliche Vorteile, die durch Schlagworte wie e-Mail, Internet, e-Commerce, aber auch elektronische Erledigung von Behördenwegen umschrieben werden können. Die verfĂŒgbaren Datenmassen entfalten aber auch ein Eigenleben, das in die PrivatsphĂ€re der meisten StaatsbĂŒrger in vielfacher Weise eingreift; den meisten ist gar nicht bewusst, wieviel Informationen ĂŒber sie verfĂŒgbar sind und z.T. auch gehandelt wer-den. Im Folgenden sollen zunĂ€chst die neuen technischen Möglichkeiten der Informationssammlung, -speicherung und -verknĂŒpfung beschrieben werden; es wird aufgezeigt, welche dieser neuen Möglichkeiten vom wem genutzt werden, und mit welchen Konsequenzen. Dann wird das Janusgesicht der Informationsgesellschaft herausgearbeitet, die kritische Austauschbeziehung zwischen Effizienz und Sicherheit auf der einen Seite, die durch die intensive Informationssammlung und -verarbeitung ĂŒberhaupt erst ermöglicht wird, und dem daraus resultierenden z.T. tiefen Eindringen in die PrivatsphĂ€re auf der anderen. Aus einer Diskussion der bestehenden Datenschutzbestimmungen wird versucht, erste Ansatzpunkte fĂŒr Lösungen abzuleiten. Das stĂ¶ĂŸt auf zahlreiche Schwierigkeiten: Die Dynamik des Sektors, ein in weiten Bereichen noch mangelndes Problembewusstsein, international erheblich differierende Vorstellungen ĂŒber Art und Umfang der SchutzbedĂŒrftigkeit, aber auch die Tatsache, dass es einer ausgewogenen Kombination gesetzlicher Maßnahmen mit SelbstbeschrĂ€nkung, also bewusstem Verzicht der Nutzer auf manchen Komfort bedarf.PrivatsphĂ€re, Privacy, Datenschutz, Informationsgesellschaft, problemorientierte TechnikfolgenabschĂ€tzung

    Privacy self-regulation and the changing role of the state: from public law to social and technical mechanisms of governance

    Get PDF
    This paper provides a structured overview of different self-governance mechanisms for privacy and data protection in the corporate world, with a special focus on Internet privacy. It also looks at the role of the state, and how it has related to privacy self-governance over time. While early data protection started out as law-based regulation by nation-states, transnational self-governance mechanisms have become more important due to the rise of global telecommunications and the Internet. Reach, scope, precision and enforcement of these industry codes of conduct vary a lot. The more binding they are, the more limited is their reach, though they - like the state-based instruments for privacy protection - are becoming more harmonised and global in reach nowadays. These social codes of conduct are developed by the private sector with limited participation of official data protection commissioners, public interest groups, or international organisations. Software tools - technical codes - for online privacy protection can give back some control over their data to individual users and customers, but only have limited reach and applications. The privacy-enhancing design of network infrastructures and database architectures is still mainly developed autonomously by the computer and software industry. Here, we can recently find a stronger, but new role of the state. Instead of regulating data processors directly, governments and oversight agencies now focus more on the intermediaries - standards developers, large software companies, or industry associations. And instead of prescribing and penalising, they now rely more on incentive-structures like certifications or public funding for social and technical self-governance instruments of privacy protection. The use of technology as an instrument and object of regulation is thereby becoming more popular, but the success of this approach still depends on the social codes and the underlying norms which technology is supposed to embed. --

    Governance of Digitalization in Europe A contribution to the Exploration Shaping Digital Policy - Towards a Fair Digital Society? BertelsmannStiftung Study

    Get PDF
    Digital policy is a unique policy area. As a cross-cutting policy issue, it has an impact not only on individual areas of regulation but on almost all other policy areas as well. Aspects of digital policy such as data regimes, cybersecurity and standardization issues are relevant not only to the the future of the internet or 5G mobile communications infrastructure, but to other areas of our lives to which they are closely linked, which range from automated driving to digital assistance systems in education and healthcare to the digitalization of sectors such as agriculture and construction. Nevertheless, regulation efforts have thus far been primarily sector-specific and national in their scope. With a few exceptions, such as the EU’s controversial General Data Protection Regulation, there are few digital policy frameworks in place for Europe that defines and integrates basic principles for broad application. Instead, we face a situation in which a variety of approaches stand side by side, at times complementing each other but also – all too often – competing with each other in ways that foster inconsistencies. The development of Europe’s 5G infrastructure is illustrative of this state of affairs. Despite the presence of what were originally uniform objectives across Europe, 28 nationally distinct tendering procedures with different requirements have since emerged. As a result, we must now find ways to manage the problems associated with having three or more networks per country, high costs, a difficult debate over security and the threat of dependency on non-EU providers

    Second annual progress report

    Get PDF

    Vortex of the Web. Potentials of the online environment

    Get PDF
    This volume compiles international contributions that explore the potential risks and chances coming along with the wide-scale migration of society into digital space. Suggesting a shift of paradigm from Spiral of Silence to Nexus of Noise, the opening chapter provides an overview on systematic approaches and mechanisms of manipulation – ranging from populist political players to Cambridge Analytica. After a discussion of the the juxtaposition effects of social media use on social environments, the efficient instrumentalization of Twitter by Turkish politicans in the course of the US-decision to recognize Jerusalem as Israel’s capital is being analyzed. Following a case study of Instagram, Black Lives Matter and racism is a research about the impact of online pornography on the academic performance of university students. Another chapter is pointing out the potential of online tools for the successful relaunch of shadow brands. The closing section of the book deals with the role of social media on the opinion formation about the Euromaidan movement during the Ukrainian revolution and offers a comparative study touching on Russian and Western depictions of political documentaries in the 2000s

    The net neutrality debate and the German communications and competition law

    Get PDF
    A common denominator of network neutrality definitions is a plea against traffic shaping within the Internet and the resultant challenge to the traditional best effort transmission. By means of access regulation of local loop bottleneck components the transfer of market power from the telecommunications network bottleneck components into the complementary Internet access service markets can be avoided. Regulation between access service providers and Internet appli-cation service providers is not justified. The avoidance of network neutrality regulation is of importance, because only then can the adequate market signals (congestion tariffs, quality differentiations etc.) be supplied to the content pro-vider, leading to a more efficient exploitation of the Internet traffic resources. --

    Power as an ethical concern in the Global South’s digital transformation: Power or empowerment?

    Get PDF
    open access articleThe digitalization of the Global South, particularly with respect to African countries, is moving at a fast pace. This can be seen in the use of information and communications technology (ICT) in different domains such as healthcare, education, industry, entertainment, as well as in the provision of e-government services, to name just a few. Such digital progress is seen as positive and often presented as such in international development discussions, for example at the World Summit on the Information Society Forum 2019 on ICTs for achieving the United Nations’ Sustainable Development Goals. Despite the positives, there are also negative aspects of digitalization, which have to be addressed in the form of ethical concerns. This paper discusses these concerns by specifically exploring the aspect of power in light of the digital transformation of the Global South. The discussion advanced in this paper is informed by a review of literature

    Surveillance and security - a dodgy relationship

    Get PDF
    Modern societies are vulnerable. We have known this long before the attacks of September 11, but they made it clear to everyone. The second lesson learned was that it is impossible to foresee such events. Although these attacks to the real world were 'low-tech', now there are attempts around the globe to control especially the electronic or virtual world. However, does more surveillance really lead to more security? If so, what will be the price we have to pay? This paper gives an overview over what happened on a governmental level after September 11 in the EU, in some EU-member states and in the USA. Apart from political actions, we already face even direct socio-economic implications as some anonymizer services were shut down. They empowered Internet users to protect their right of privacy, and they were the first targets of investigation and suspicion. Shutting down these services reduces the potential room of users to protect their privacy by using privacy enhancing technologies (PETs). This is an indicator for a serious societal problem: democracy already has changed. In a second part this paper analyses the relationship between surveillance and security. It is argued that, the international over-reactions will not lead to the intended effects. Rather, they will have long-term implications for the respective societies.Privacy, security, surveillance, international policy
    • 

    corecore