{"title":"Institutionalizing Behavior‐Based Privacy","authors":"C. Demchak, Kurt D. Fenstermacher","doi":"10.1177/0095399709344047","DOIUrl":null,"url":null,"abstract":"After 9/11, a bitter national debate emerged pitting privacy against security. No theory of privacy or domestic security and no compromise blend of institutional insights and technological advances have been proposed to meet this dilemma. This work fills that gap by offering a middle ground proposing a knowledge‐based systems focus that parses privacy into two separable concepts: behavior and identity in the behavior–identity–knowledge (BIK) model. The authors outline a plan for a BIK‐sensible world involving initial steps to simulate behavior choices, streamlined social identity masking, and the institutional adaptations required for a practical compromise between security and privacy.","PeriodicalId":153353,"journal":{"name":"Administration and Society","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Administration and Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1177/0095399709344047","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
After 9/11, a bitter national debate emerged pitting privacy against security. No theory of privacy or domestic security and no compromise blend of institutional insights and technological advances have been proposed to meet this dilemma. This work fills that gap by offering a middle ground proposing a knowledge‐based systems focus that parses privacy into two separable concepts: behavior and identity in the behavior–identity–knowledge (BIK) model. The authors outline a plan for a BIK‐sensible world involving initial steps to simulate behavior choices, streamlined social identity masking, and the institutional adaptations required for a practical compromise between security and privacy.