Information Security Technical Report最新文献

筛选
英文 中文
Victorian values: Politicians and the public incorrectly see security and privacy as opposites 维多利亚时代的价值观:政治家和公众错误地将安全和隐私视为对立面
Information Security Technical Report Pub Date : 2009-08-01 DOI: 10.1016/j.istr.2009.10.006
David G.W. Birch
{"title":"Victorian values: Politicians and the public incorrectly see security and privacy as opposites","authors":"David G.W. Birch","doi":"10.1016/j.istr.2009.10.006","DOIUrl":"10.1016/j.istr.2009.10.006","url":null,"abstract":"<div><p>It is impossible to make any progress on the security vs. privacy debate, or move towards a political settlement around identity for the coming years, unless we develop a more modern notion of what identity is and how it should be addressed online. So long as we maintain an essentially “Victorian” view of the balance between security and privacy, founded on the central concept of identity as a card in a filing cabinet, then society cannot properly take advantage of technological developments. If it does, then security and privacy are no longer competing concerns that need to be balanced but simultaneous deliverables of an infrastructure founded in utility.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 3","pages":"Pages 143-145"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.10.006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125585333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
‘Privacy and public policy delivery – Dichotomy or design’ “隐私和公共政策的实施——两分法还是设计”
Information Security Technical Report Pub Date : 2009-08-01 DOI: 10.1016/j.istr.2009.10.009
Andrew Churchill
{"title":"‘Privacy and public policy delivery – Dichotomy or design’","authors":"Andrew Churchill","doi":"10.1016/j.istr.2009.10.009","DOIUrl":"10.1016/j.istr.2009.10.009","url":null,"abstract":"<div><p>In recent years the repeated compromise and loss of personal information, from a variety of sources, both public and private, have led to the issue of privacy being increasingly in the public eye. Concurrently public policy developments in line with the UK's Transformational Government agenda have led to ever greater amounts of personal information being made available electronically, and with greater levels of access being explored in order to exploit greater efficiencies in the delivery of public services. Such a rise in both public concern of the security of their data and the levels of access being afforded to improve efficiency has sometimes been seen as dichotomous. This article looks at some of these underlying concerns to suggest some of the issues that need to be addressed when considering privacy in a public policy context, and examines the dangers of retrofitting privacy as an afterthought, and hence the importance of privacy by design.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 3","pages":"Pages 131-137"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.10.009","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123304030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The first practical guide to data security law and breach action! 数据安全法和违规行为的第一个实用指南!
Information Security Technical Report Pub Date : 2009-08-01 DOI: 10.1016/j.istr.2009.09.002
{"title":"The first practical guide to data security law and breach action!","authors":"","doi":"10.1016/j.istr.2009.09.002","DOIUrl":"https://doi.org/10.1016/j.istr.2009.09.002","url":null,"abstract":"","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 3","pages":"Page 173"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.09.002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138240678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the secure management of personal data: Privacy on-line IS important, but it's not easy 改善个人资料的安全管理:网上隐私很重要,但这并不容易
Information Security Technical Report Pub Date : 2009-08-01 DOI: 10.1016/j.istr.2009.10.005
Jeremy Hilton
{"title":"Improving the secure management of personal data: Privacy on-line IS important, but it's not easy","authors":"Jeremy Hilton","doi":"10.1016/j.istr.2009.10.005","DOIUrl":"10.1016/j.istr.2009.10.005","url":null,"abstract":"<div><p>This article introduces the growing importance of privacy and the need for an improved understanding of the issues involved. A key requirement is for organisations to better understand the relationship between security and privacy and, therefore, to ensure the design of their systems includes the ability to safeguard privacy and staff consistently apply controls that include the protection of individuals' personal data. A new approach to information security is proposed, as well as some outline results of the application of new methods and mechanisms for ensuring privacy in multi-agency data sharing. It is hoped that this article will prompt dialogue about the need to reconsider existing methods and tools for securely managing data.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 3","pages":"Pages 124-130"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.10.005","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121738692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Young people, disclosure of personal information and online privacy: Control, choice and consequences 年轻人,个人信息披露和网络隐私:控制,选择和后果
Information Security Technical Report Pub Date : 2009-08-01 DOI: 10.1016/j.istr.2009.10.007
Jo Bryce , Mathias Klang
{"title":"Young people, disclosure of personal information and online privacy: Control, choice and consequences","authors":"Jo Bryce ,&nbsp;Mathias Klang","doi":"10.1016/j.istr.2009.10.007","DOIUrl":"10.1016/j.istr.2009.10.007","url":null,"abstract":"<div><p>This paper examines the privacy implications of the different online practices in which young people disclose personal information, and how associated configurations of choice and control create possibilities for violations of online privacy. The implications of the commercial and non-commercial use of young peoples' personal information are examined, with a specific focus on how this can potentially facilitate cyberbullying. The paper suggests that educational strategies should more clearly focus on encouraging young people to protect their online privacy, encourage control over disclosure practices, and consider the potential commercial and non-commercial uses of their information. There is a need for development of these strategies to be informed by empirical research exploring the everyday contexts and social norms which influence young peoples' online behaviour. Such an evidence-base can inform a critical review of educational, legal and regulatory actions which aim to protect their online privacy and safety.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 3","pages":"Pages 160-166"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.10.007","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132258322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
The changing shape of privacy and consent 隐私和同意形态的变化
Information Security Technical Report Pub Date : 2009-08-01 DOI: 10.1016/j.istr.2009.10.008
Lizzie Coles-Kemp
{"title":"The changing shape of privacy and consent","authors":"Lizzie Coles-Kemp","doi":"10.1016/j.istr.2009.10.008","DOIUrl":"10.1016/j.istr.2009.10.008","url":null,"abstract":"","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 3","pages":"Pages 111-112"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.10.008","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130484849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy and consent in pervasive networks 无处不在的网络中的隐私和同意
Information Security Technical Report Pub Date : 2009-08-01 DOI: 10.1016/j.istr.2009.10.002
Nazir A. Malik, Allan Tomlinson
{"title":"Privacy and consent in pervasive networks","authors":"Nazir A. Malik,&nbsp;Allan Tomlinson","doi":"10.1016/j.istr.2009.10.002","DOIUrl":"10.1016/j.istr.2009.10.002","url":null,"abstract":"<div><p>Pervasive networks and location based systems have the potential to provide many new services. However the user of these services often has to provide personal information to allow the service to operate effectively. This article considers the problem of protecting personal information in this environment, and reports on the legislative and technical efforts being made to protect user privacy.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 3","pages":"Pages 138-142"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.10.002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124050679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy and consent in the digital era 数字时代的隐私和同意
Information Security Technical Report Pub Date : 2009-08-01 DOI: 10.1016/j.istr.2009.10.004
Shirin Elahi
{"title":"Privacy and consent in the digital era","authors":"Shirin Elahi","doi":"10.1016/j.istr.2009.10.004","DOIUrl":"10.1016/j.istr.2009.10.004","url":null,"abstract":"<div><p>In today's digital era no one has knowledge, access or control of all their available personal information. This makes the very concepts of privacy and consent increasingly illusory and raises questions that are likely to shape not only the future form of cyberspace, but also the political, social and economic interactions within it. The institutions tasked with regulation of the physical world are ill equipped to respond and undertake a similar role in the virtual world; the timescales, dimensions and scope are all materially different. This article sets out five dilemmas that will need to be addressed in the search for solutions.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 3","pages":"Pages 113-118"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.10.004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134124391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
What's happened to PETs? 宠物发生了什么?
Information Security Technical Report Pub Date : 2009-08-01 DOI: 10.1016/j.istr.2009.10.010
Robin Wilton
{"title":"What's happened to PETs?","authors":"Robin Wilton","doi":"10.1016/j.istr.2009.10.010","DOIUrl":"10.1016/j.istr.2009.10.010","url":null,"abstract":"<div><p>Given that many candidate technical elements have been available for some time, it seems strange that Privacy Enhancing Technologies (PETs) have achieved neither widespread implementation in mainstream products, nor visible adoption by individual data subjects.</p><p>In this paper I suggest some possible explanations, and set out some of the privacy-related problems which PETs could be aiming to address in today's online world.</p><p>I then describe an application of “S-curve” and maturity models to the analysis of this problem, and conclude by using it to examine the success factors for adoption of innovative privacy-related technology.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 3","pages":"Pages 146-153"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.10.010","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121177717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Informational privacy, consent and the “control” of personal data 信息隐私、同意和个人数据的“控制”
Information Security Technical Report Pub Date : 2009-08-01 DOI: 10.1016/j.istr.2009.10.001
Edgar A. Whitley
{"title":"Informational privacy, consent and the “control” of personal data","authors":"Edgar A. Whitley","doi":"10.1016/j.istr.2009.10.001","DOIUrl":"10.1016/j.istr.2009.10.001","url":null,"abstract":"<div><p>This paper reviews how the notion of control has been conceptualised in relation to informational privacy and, from a perspective of consent and the revocation of consent, suggests that there are more sophisticated notions of control over personal data that can be proposed. The paper outlines some of the challenges underlying these enhanced notions of control in the context of privacy and consent.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 3","pages":"Pages 154-159"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.10.001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129707456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 87
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信