Ensuring online data privacy and controlling anonymity

C. Axelrod
{"title":"Ensuring online data privacy and controlling anonymity","authors":"C. Axelrod","doi":"10.1109/CEWIT.2015.7338156","DOIUrl":null,"url":null,"abstract":"In this paper we first develop models of privacy and anonymity from an examination of various categories of data and the motivations of the various persons and groups involved. We point out where specific risk-reduction tools and methods apply and where they do not. We also examine whether the desire for privacy and anonymity favors lawful or criminal activities. Then we propose methods, including legislation, which are needed to ensure that everyone's data privacy requirements might be met. We examine who benefits from anonymity and privacy and who do not, and how to take advantage of the benefits of privacy without providing undue opportunities for criminality.","PeriodicalId":153787,"journal":{"name":"2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","volume":"341 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CEWIT.2015.7338156","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

In this paper we first develop models of privacy and anonymity from an examination of various categories of data and the motivations of the various persons and groups involved. We point out where specific risk-reduction tools and methods apply and where they do not. We also examine whether the desire for privacy and anonymity favors lawful or criminal activities. Then we propose methods, including legislation, which are needed to ensure that everyone's data privacy requirements might be met. We examine who benefits from anonymity and privacy and who do not, and how to take advantage of the benefits of privacy without providing undue opportunities for criminality.
保障网络数据隐私,控制匿名性
在本文中,我们首先通过对各种类型的数据以及所涉及的各种个人和团体的动机的检查来开发隐私和匿名模型。我们指出具体的降低风险的工具和方法在哪里适用,在哪里不适用。我们还研究了对隐私和匿名的渴望是否有利于合法或犯罪活动。然后,我们提出了包括立法在内的方法,以确保每个人的数据隐私要求都能得到满足。我们研究谁从匿名和隐私中受益,谁没有,以及如何利用隐私的好处而不为犯罪提供不适当的机会。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信