Ensuring Online Data Privacy and Controlling Anonymity

被引:0
|
作者
Axelrod, C. Warren [1 ]
机构
[1] Delta Risk LLC, Great Neck, NY 11023 USA
关键词
data categories; privacy; anonymity; security; secrecy;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper we first develop models of privacy and anonymity from an examination of various categories of data and the motivations of the various persons and groups involved. We point out where specific risk-reduction tools and methods apply and where they do not. We also examine whether the desire for privacy and anonymity favors lawful or criminal activities. Then we propose methods, including legislation, which are needed to ensure that everyone's data privacy requirements might be met. We examine who benefits from anonymity and privacy and who do not, and how to take advantage of the benefits of privacy without providing undue opportunities for criminality.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Data retention: Privacy, anonymity, and accountability online
    Crump, C
    [J]. STANFORD LAW REVIEW, 2003, 56 (01) : 191 - 229
  • [2] Ensuring Data Privacy and Access Anonymity using Cryptographic Techniques in Cloud Computing
    Singsit, Lamminthang
    Ashok, Marie Stanislas
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (05): : 42 - 47
  • [3] Challenges on Anonymity, Privacy and Big Data
    Basso, Tania
    Matsunaga, Roberta
    Moraes, Regina
    Antunes, Nuno
    [J]. 2016 SEVENTH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 2016, : 164 - 171
  • [4] A new technique ensuring privacy in big data: K-anonymity without prior value of the threshold k
    El Ouazzani, Zakariae
    El Bakkali, Hanan
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 : 52 - 59
  • [5] Privacy, Anonymity, and Big Data in the Social Sciences
    Daries, Jon P.
    Reich, Justin
    Waldo, Jim
    Young, Elise M.
    Whittinghill, Jonathan
    Ho, Andrew Dean
    Seaton, Daniel Thomas
    Chuang, Isaac
    [J]. COMMUNICATIONS OF THE ACM, 2014, 57 (09) : 56 - 63
  • [6] A survey on anonymity for privacy preserving data mining
    Zhang, X. X.
    Liu, Q.
    Liu, D. M.
    Xie, W.
    [J]. INFORMATION SCIENCE AND ELECTRONIC ENGINEERING, 2017, : 343 - 346
  • [7] Privacy Preserving for Spatio-Temporal Data Publishing Ensuring Location Diversity Using K-Anonymity Technique
    Avaghade, Sachin B.
    Patil, Sachin S.
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), 2015,
  • [8] Privacy Preserving for Spatio-Temporal Data Publishing Ensuring Location Diversity Using K-Anonymity Technique
    Avaghade, Sachin B.
    Patil, Sachin S.
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [9] PRIVACY AND ANONYMITY
    MOSMANN, C
    [J]. DATAMATION, 1976, 22 (02): : 168 - &
  • [10] Anonymity Is Not Privacy
    Shmatikov, Vitaly
    [J]. COMMUNICATIONS OF THE ACM, 2011, 54 (12) : 132 - 132