32 research outputs found

    Ubiquitous Social Networks: Opportunities and Challenges for Privacy-Aware User Modelling

    Get PDF
    Privacy has been recognized as an important topic in the Internet for a long time, and technological developments in the area of privacy tools are ongoing. However, their focus was mainly on the individual. With the proliferation of social network sites, it has become more evident that the problem of privacy is not bounded by the perimeters of individuals but also by the privacy needs of their social networks. The objective of this paper is to contribute to the discussion about privacy in social network sites, a topic which we consider to be severely under-researched. We propose a framework for analyzing privacy requirements and for analyzing privacy-related data. We outline a combination of requirements analysis, conflict-resolution techniques, and a P3P extension that can contribute to privacy within such sites.World Wide Web, privacy, social network analysis, requirements analysis, privacy negotiation, ubiquity, P3P

    Hero or Villain: The Data Controller in Privacy Law and Technologies

    Get PDF

    Position Paper: Escaping Academic Cloudification to Preserve Academic Freedom

    Get PDF
    Especially since the onset of the COVID-19 pandemic, the use of cloud-based tools and solutions - lead by the ‘Zoomification’ of education, has picked up attention in the EdTech and privacy communities. In this paper, we take a look at the progressing use of cloud-based educational tools, often controlled by only a handful of major corporations. We analyse how this ‘cloudification’ impacts academics’ and students’ privacy and how it influences the handling of privacy by universities and higher education institutions. Furthermore, we take a critical perspective on how this cloudification may not only threaten users’ privacy, but ultimately may also compromise core values like academic freedom: the dependency relationships between universities and corporations could impact curricula, while also threatening what research can be conducted. Finally, we take a perspective on universities’ cloudification in different western regions to identify policy mechanisms and recommendations that can enable universities to preserve their academic independence, without compromising on digitalization and functionality

    Multilateral security requirements analysis for preserving privacy in ubiquitous environments

    No full text
    Privacy is of great concern in ubiquitous environments in which various technologies collect vast amounts of information about ubiquitous users with differing privacy and security interests. This concern also holds for knowledge discovery systems in which data mining technologies infer substantial new knowledge from these data. Various methods have been proposed to preserve privacy in such environments, including privacy preserving data mining, mixes etc. However, it is not clear which of these methods provide the kind of privacy that users are looking for. We take a step back and look at what privacy means, and how the notion of privacy-related data has changed in ubiquitous environments. Further, we look at how we can state privacy requirements for ubiquitous environments through security goals, and we suggest a method for analysing multilateral security requirements which takes into account users’ varying privacy interests. We believe that such a requirements analysis method will help determine whether and when privacy-preserving methods make sense for fulfilling privacy and security requirements of diverse sets of users in ubiquitous environments.status: publishe

    Can you engineer privacy?

    No full text

    Engineering Privacy by Design

    No full text
    status: publishe
    corecore