Inaccuracy as a privacy-enhancing tool

被引:0
|
作者
Gloria González Fuster
机构
[1] Vrije Universiteit Brussel (VUB),Institute for European Studies (IES), Research Group on Law, Science, Technology & Society (LSTS)
来源
关键词
Data protection; Informational privacy; Informational self-determination; Privacy; Surveillance;
D O I
暂无
中图分类号
学科分类号
摘要
The accuracy principle is one of the key standards of informational privacy. It epitomises the obligation for those processing personal data to keep their records accurate and up-to-date, with the aim of protecting individuals from unfair decisions. Currently, however, different practices being put in place in order to enhance the protection of individuals appear to deliberately rely on the use of ‘inaccurate’ personal information. This article explores such practices and tries to assess their potential for privacy protection, giving particular attention to their legal implications and to related ethical issues. Ultimately, it suggests that the use of ‘inaccurate’ data can potentially play a useful role to preserve the informational autonomy of the individual, and that any understandings of privacy or personal data protection that would tend to unduly limit such potential should be critically questioned.
引用
收藏
页码:87 / 95
页数:8
相关论文
共 50 条
  • [1] Inaccuracy as a privacy-enhancing tool
    Fuster, Gloria Gonzalez
    [J]. ETHICS AND INFORMATION TECHNOLOGY, 2010, 12 (01) : 87 - 95
  • [2] Privacy-enhancing technologies
    Senicar, V
    Klobucar, T
    Jerman-Blazic, B
    [J]. SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 213 - 227
  • [3] A Privacy-Enhancing Architecture for Databases
    Wahlstrom, Kirsten
    Quirchmayr, Gerald
    [J]. JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2008, 40 (03): : 151 - 162
  • [4] On the Adoption of Privacy-enhancing Technologies
    Caulfield, Tristan
    Ioannidis, Christos
    Pym, David
    [J]. DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 175 - 194
  • [5] Privacy-Enhancing Overlays in Bitcoin
    Meiklejohn, Sarah
    Orlandi, Claudio
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8976 : 127 - 141
  • [6] Privacy-enhancing technologies for the Internet
    Goldberg, I
    Wagner, D
    Brewer, E
    [J]. IEEE COMPCON 97, PROCEEDINGS, 1997, : 103 - 109
  • [7] Practical Privacy-Enhancing Technologies
    Hajny, Jan
    Malina, Lukas
    Dzurenda, Petr
    [J]. 2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015, : 60 - 64
  • [8] Privacy-Enhancing Identity Management
    Hansen, Marit
    Berlich, Peter
    Camenisch, Jan
    Clauß, Sebastian
    Pfitzmann, Andreas
    Waidner, Michael
    [J]. Information Security Technical Report, 2004, 9 (01): : 35 - 44
  • [9] Factors of Intention to Use a Photo Tool: Comparison Between Privacy-Enhancing and Non-privacy-enhancing Tools
    Bracamonte, Vanessa
    Pape, Sebastian
    Lobner, Sascha
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP SEC 2023, 2024, 679 : 321 - 334
  • [10] Critical RFID Privacy-Enhancing Technologies
    Spiekermann, Sarah
    Evdokimov, Sergei
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (02) : 56 - 62