{"title":"What's happened to PETs?","authors":"Robin Wilton","doi":"10.1016/j.istr.2009.10.010","DOIUrl":null,"url":null,"abstract":"<div><p>Given that many candidate technical elements have been available for some time, it seems strange that Privacy Enhancing Technologies (PETs) have achieved neither widespread implementation in mainstream products, nor visible adoption by individual data subjects.</p><p>In this paper I suggest some possible explanations, and set out some of the privacy-related problems which PETs could be aiming to address in today's online world.</p><p>I then describe an application of “S-curve” and maturity models to the analysis of this problem, and conclude by using it to examine the success factors for adoption of innovative privacy-related technology.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 3","pages":"Pages 146-153"},"PeriodicalIF":0.0000,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.10.010","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Security Technical Report","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1363412709000454","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Given that many candidate technical elements have been available for some time, it seems strange that Privacy Enhancing Technologies (PETs) have achieved neither widespread implementation in mainstream products, nor visible adoption by individual data subjects.
In this paper I suggest some possible explanations, and set out some of the privacy-related problems which PETs could be aiming to address in today's online world.
I then describe an application of “S-curve” and maturity models to the analysis of this problem, and conclude by using it to examine the success factors for adoption of innovative privacy-related technology.