{"title":"Victorian values: Politicians and the public incorrectly see security and privacy as opposites","authors":"David G.W. Birch","doi":"10.1016/j.istr.2009.10.006","DOIUrl":"10.1016/j.istr.2009.10.006","url":null,"abstract":"<div><p>It is impossible to make any progress on the security vs. privacy debate, or move towards a political settlement around identity for the coming years, unless we develop a more modern notion of what identity is and how it should be addressed online. So long as we maintain an essentially “Victorian” view of the balance between security and privacy, founded on the central concept of identity as a card in a filing cabinet, then society cannot properly take advantage of technological developments. If it does, then security and privacy are no longer competing concerns that need to be balanced but simultaneous deliverables of an infrastructure founded in utility.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 3","pages":"Pages 143-145"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.10.006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125585333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"‘Privacy and public policy delivery – Dichotomy or design’","authors":"Andrew Churchill","doi":"10.1016/j.istr.2009.10.009","DOIUrl":"10.1016/j.istr.2009.10.009","url":null,"abstract":"<div><p>In recent years the repeated compromise and loss of personal information, from a variety of sources, both public and private, have led to the issue of privacy being increasingly in the public eye. Concurrently public policy developments in line with the UK's Transformational Government agenda have led to ever greater amounts of personal information being made available electronically, and with greater levels of access being explored in order to exploit greater efficiencies in the delivery of public services. Such a rise in both public concern of the security of their data and the levels of access being afforded to improve efficiency has sometimes been seen as dichotomous. This article looks at some of these underlying concerns to suggest some of the issues that need to be addressed when considering privacy in a public policy context, and examines the dangers of retrofitting privacy as an afterthought, and hence the importance of privacy by design.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 3","pages":"Pages 131-137"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.10.009","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123304030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The first practical guide to data security law and breach action!","authors":"","doi":"10.1016/j.istr.2009.09.002","DOIUrl":"https://doi.org/10.1016/j.istr.2009.09.002","url":null,"abstract":"","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 3","pages":"Page 173"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.09.002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138240678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the secure management of personal data: Privacy on-line IS important, but it's not easy","authors":"Jeremy Hilton","doi":"10.1016/j.istr.2009.10.005","DOIUrl":"10.1016/j.istr.2009.10.005","url":null,"abstract":"<div><p>This article introduces the growing importance of privacy and the need for an improved understanding of the issues involved. A key requirement is for organisations to better understand the relationship between security and privacy and, therefore, to ensure the design of their systems includes the ability to safeguard privacy and staff consistently apply controls that include the protection of individuals' personal data. A new approach to information security is proposed, as well as some outline results of the application of new methods and mechanisms for ensuring privacy in multi-agency data sharing. It is hoped that this article will prompt dialogue about the need to reconsider existing methods and tools for securely managing data.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 3","pages":"Pages 124-130"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.10.005","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121738692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Young people, disclosure of personal information and online privacy: Control, choice and consequences","authors":"Jo Bryce , Mathias Klang","doi":"10.1016/j.istr.2009.10.007","DOIUrl":"10.1016/j.istr.2009.10.007","url":null,"abstract":"<div><p>This paper examines the privacy implications of the different online practices in which young people disclose personal information, and how associated configurations of choice and control create possibilities for violations of online privacy. The implications of the commercial and non-commercial use of young peoples' personal information are examined, with a specific focus on how this can potentially facilitate cyberbullying. The paper suggests that educational strategies should more clearly focus on encouraging young people to protect their online privacy, encourage control over disclosure practices, and consider the potential commercial and non-commercial uses of their information. There is a need for development of these strategies to be informed by empirical research exploring the everyday contexts and social norms which influence young peoples' online behaviour. Such an evidence-base can inform a critical review of educational, legal and regulatory actions which aim to protect their online privacy and safety.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 3","pages":"Pages 160-166"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.10.007","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132258322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy and consent in pervasive networks","authors":"Nazir A. Malik, Allan Tomlinson","doi":"10.1016/j.istr.2009.10.002","DOIUrl":"10.1016/j.istr.2009.10.002","url":null,"abstract":"<div><p>Pervasive networks and location based systems have the potential to provide many new services. However the user of these services often has to provide personal information to allow the service to operate effectively. This article considers the problem of protecting personal information in this environment, and reports on the legislative and technical efforts being made to protect user privacy.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 3","pages":"Pages 138-142"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.10.002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124050679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy and consent in the digital era","authors":"Shirin Elahi","doi":"10.1016/j.istr.2009.10.004","DOIUrl":"10.1016/j.istr.2009.10.004","url":null,"abstract":"<div><p>In today's digital era no one has knowledge, access or control of all their available personal information. This makes the very concepts of privacy and consent increasingly illusory and raises questions that are likely to shape not only the future form of cyberspace, but also the political, social and economic interactions within it. The institutions tasked with regulation of the physical world are ill equipped to respond and undertake a similar role in the virtual world; the timescales, dimensions and scope are all materially different. This article sets out five dilemmas that will need to be addressed in the search for solutions.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 3","pages":"Pages 113-118"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.10.004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134124391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"What's happened to PETs?","authors":"Robin Wilton","doi":"10.1016/j.istr.2009.10.010","DOIUrl":"10.1016/j.istr.2009.10.010","url":null,"abstract":"<div><p>Given that many candidate technical elements have been available for some time, it seems strange that Privacy Enhancing Technologies (PETs) have achieved neither widespread implementation in mainstream products, nor visible adoption by individual data subjects.</p><p>In this paper I suggest some possible explanations, and set out some of the privacy-related problems which PETs could be aiming to address in today's online world.</p><p>I then describe an application of “S-curve” and maturity models to the analysis of this problem, and conclude by using it to examine the success factors for adoption of innovative privacy-related technology.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 3","pages":"Pages 146-153"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.10.010","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121177717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Informational privacy, consent and the “control” of personal data","authors":"Edgar A. Whitley","doi":"10.1016/j.istr.2009.10.001","DOIUrl":"10.1016/j.istr.2009.10.001","url":null,"abstract":"<div><p>This paper reviews how the notion of control has been conceptualised in relation to informational privacy and, from a perspective of consent and the revocation of consent, suggests that there are more sophisticated notions of control over personal data that can be proposed. The paper outlines some of the challenges underlying these enhanced notions of control in the context of privacy and consent.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 3","pages":"Pages 154-159"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.10.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129707456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}