Abstract
Privacy is a human right and an important need for societies to progress. It is considered as a requirement for maintaining the human condition with dignity and respect (Schneier in The eternal value of privacy, 2006).
Civilization is the progress toward a society of privacy.
Ayn Rand (Writer and Novelist, 1905–1982)
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
B. Schneier, The eternal value of privacy (2006), Available: http://www.wired.com/politics/security/commentary/securitymatters/2006/05/70886. Accessed 5 May 2010
R. Clarke, Introduction to dataveillance and information privacy, and definitions and terms (1999), Available: http://www.anu.edu.au/people/Roger.Clarke/DV/Intro.html. Accessed 6 May 2010
R. Clarke, What’s Privacy? [Workshop at the Australian Law Reform Commission] (2006), Available: http://www.anu.edu.au/people/Roger.Clarke/DV/Privacy.html. Accessed 6 May 2010
M.H. Kamali, The Dignity of Man: An Islamic Perspective, 2nd edn. (Islamic Texts Society, 2002)
U. Nations, The universal declaration of human rights (1948), Available: http://www.un.org/en/documents/udhr/index.shtml. Accessed 1 April 2011
The Office of the United Nations High Commissioner for Human Rights, International Covenant on Civil and Political Rights (1966), Available: http://www2.ohchr.org/english/law/ccpr.htm. Accessed 1 April 2011
European Convention on Human Rights (1950), Available: http://conventions.coe.int/Treaty/en/Treaties/Html/005.htm. Accessed 1 April 2011
European Union, The charter of fundamental rights of the European Union (2000), Available: http://ec.europa.eu/justice_home/fsj/rights/charter/fsj_rights_charter_en.htm. Accessed 1 April 2011
G. Hosein, Politics of information society: the bordering and restraining of global data flows (2004), Available: http://www.privacyinternational.org/survey/censorship/unesco.pdf. Accessed 6 May 2010
K. O’Hara, N. Shadbolt, The Spy in the Coffee Machine: The End of Privacy as We Know It (Oneworld Publications, 2008)
L.S. Nelson, Constructing policy: the unsettled question of biometric technology and privacy, in Privacy and Technologies of Identity: a Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 151–172
Privacy, in Stanford Encyclopedia of Philosophy (2006)
G.T. Marx, Murky conceptual waters: the public and the private. Ethics Inf. Technol. 3(3), 157–169 (2001)
J. Cas, Privacy in pervasive computing environments—a contradiction in terms? IEEE Technol. Soc. Mag. 24(1), 24–33 (Spring, 2005)
D.J. Solove, A taxonomy of privacy. J. Univ. PA Law Rev. 154, 477 (2006)
A. Pfitzmann, M. Hansen, Anonymity, unlinkability, unobservability, pseudonymity, and identity management—a consolidated proposal for terminology (2008), Available: http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.31.pdfIdentity. Accessed: 21 May 2010
PRIME, PRIME glossary related to privacy and identity management, Available: https://prime.inf.tu-dresden.de/prime/space/Dictionary. Accessed: 11 May 2008
P.J. Windley, Digital Identity: Unmasking identity management architecture (IMA) (O’Reilly Media, 2005)
International Telecommunication Union, Digital life. ITU internet report (2006), Available: http://www.itu.int/osg/spu/publications/digitalife/docs/digital-life-web.pdf. Accessed 21 May 2010
M.C. Mont et al., Towards accountable management of privacy and identity information. LNCS (Springer, Berlin, 2003)
M. Gardiner, The business value of identity federation (2007), Available: http://whitepaper.techworld.com/authentication/4818/the-business-value-of-identity-federation. Accessed: 21 May 2010
D. Boyd, Why youth (heart) social network sites: the role of networked publics in teenage social life. MacArthur Foundation Series on digital learning—youth, identity, and digital media volume (2007), Available: http://www.danah.org/papers/WhyYouthHeart.pdf. Accessed 27 Aug 2010
Organizing Committee of Digital Identity & Privacy (Human Capital & Social Innovation Technology Summit), Call for controbution to managing digital identities for education, employment and business development (2007), Available: http://events.eife-l.org/HCSIT2007/overview/dip/dip2007. Accessed 11 May 2010
K. Cukier, The data deluge: businesses, governments and society are only starting to tap its vast potential. The economist (February 23–March 5) (2010), Available: http://www.economist.com/opinion/displaystory.cfm?story_id=15579717. Accessed 13 May 2010
Center for Democracy & Technology, Privacy principles for identity in the digital age [draft for comment—version 1.4] (2007), Available: http://www.cdt.org/files/pdfs/20071201_IDPrivacyPrinciples.pdf. Accessed 28 May 2010
H. Noonan, Identity, in Stanford Encyclopedia of Philosophy (2009)
K.J. Strandburg, Social norms, self control, and privacy in the online world, in Privacy and Technologies of Identity: a Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 31–54
T.Z. Zarsky, Online privacy, tailoring, and persuasion, in Privacy and Technologies of Identity: A Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 209–224
B. Otjacques et al., Identity management and data sharing in the European Union, in Proceedings of the 39th Hawaii International Conference on System Sciences, 2006
A.R. Galloway, E. Thacker, The Exploit—A Theory of Networks (University of Minnesota Press, 2008)
V. Mayer-Schönberger, Delete: The Virtue of Forgetting in the Digital Age (Princeton University Press, Princeton, 2009)
J. Madelin, L. Razzell, Towards the Identity Society, Available: http://www.identitysociety.org/files/identitysociety.pdf. Accessed 7 Sept 2009
A. Juels, RFID privacy: a technical primer for the non-technical reader, in Privacy and Technologies of Identity: a Cross-disciplinary Conversation (Springer, Berlin, 2006), pp. 57–74
Google, Google privacy principles, Available: http://www.google.com/intl/en/corporate/privacy_principles.html. Accessed 14 May 2010
Google Privacy Center, Privacy FAQ. Available: http://www.google.com/intl/en/privacy_faq.html#serverlogs. Accessed 14 May 2010
Ofcom: Office of Communication, Social networking: a quantitative and qualitative research report into attitudes, behaviours and use (2008), Available: http://stakeholders.ofcom.org.uk/binaries/research/media-literacy/report1.pdf. Accessed 27 Aug 2010
N. Reichenthal, Une identité connectée. Bulletin HEC—Le Magazine des Gradués (2007), Available: http://www.gradueshec.ch/bulletins/documents/75nadine.pdf. Accessed 13 May 2010
S. Davies, Opt-Out control. Scientific American (2007)
S. Lloyd, Privacy and the Quantum Internet Scientific American Magazine (2009)
Google—Centre de confidentialité, Publicité et confidentialité (2010), Available: http://www.google.com/privacy_ads.html. Accessed 28 Aug 2010
Google—Centre de confidentialité, Règles de confidentialité (2009), Available: http://www.google.com/intl/fr/privacypolicy.html. Accessed 28 Aug 2010
Google—Centre de confidentialité, FAQ relative à la confidentialité (2010), Available: http://www.google.com/intl/fr/privacy_faq.html#toc-terms-personal-info. Accessed 28 Aug 2010
Google—Centre de confidentialité, Principes applicables à la confidentialité (2010), Available: http://www.google.com/intl/fr/corporate/privacy_principles.html. Accessed 28 Aug 2010
Y. Duan, J. Canny, Protecting user data in ubiquitous computing: towards trustworthy environments. LNCS (Springer, Berlin, 2005)
V. Bellotti, What you don’t know can hurt you: privacy in collaborative computing, in British Computer Society Conference on Human-Computer Interaction (1996), pp. 241–261
Organization for Economic Co-operation and Development (OECD), Guidelines on the protection of privacy and transborder flows of personal data (1980), Available: http://www.oecd.org/document/18/0,3343,en_2649_34255_1815186_1_1_1_1,00.html. Accessed 6 May 2010
Organization for Economic Co-operation and Development (OECD), At crossroads: personhood and digital identity in the information society. The working paper series of the OECD directorate for science, technology and industry (2008), Available: http://www.oecd.org/LongAbstract/0,3425,en_2649_34223_40204774_119684_1_1_1,00.html. Accessed 21 May 2010
European Union, Directive 95/46/EC of the European Parliament and of the Council (1995), Available: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML. Accessed 26 March 2010
Wikipedia, Data protection directive (2011), Available: http://en.wikipedia.org/wiki/Data_Protection_Directive. Accessed 26 March 2010
P. Brown, Privacy in an age of terabytes and terror. Sci. Am. Mag. 299, 46–47 (2008)
Overview of the Privacy Act of 1974, United States Department of Justice’s Office of Privacy and Civil Liberties (OPCL), 2010
R. Agrawal et al., Hippocratic databases, in Proceedings of the 28th International Conference on Very Large Data Bases (VLDB), Hong Kong-China 2002, pp. 143–154
J.J. Luna, How to be invisible: a step-by-step guide to protecting your assets, your identity, and your life. New York, 2012
CSA Model Code for the Protection of Personal Information, The Canadian Standards Association, 2000
Personal Information Protection and Electronic Documents Act, Government of Canada—Department of Justice, 2000
The Canadian Standards Association, Privacy code, Available: http://www.csa.ca/cm/ca/en/privacy-code. Accessed 12 May 2010
Privacy Act, 1985, Available: http://laws-lois.justice.gc.ca/eng/acts/P-21/
The Japanese Act on the Protection of Personal Information, The Government of Japan, 2003
Hewlett-Packard, Japan Personal Information Protection Act (JPIPA)—legislative summary, Available: http://h71028.www7.hp.com/ERC/cache/571127-0-0-0-121.html. Accessed 12 May 2010
ZL Technologies Inc., Regulation overview of the Japanese Act on the protection of personal information, Available: http://www.zlti.com/resources/docs/Rules%20and%20Regulations/ZL.RR.Japan-PIPA.pdf. Accessed 12 May 2010
Australian Government—Office of the Privacy Commissioner. Information Privacy Principles under the Privacy Act 1988—Plain English Summary, Available: http://www.privacy.gov.au/materials/types/law/view/6892. Accessed 12 May 2010
L. Baeriswyl, G. Mangeat, Protection des données personnelles sur Internet: la situation en Suisse (2000), Available: http://www.juriscom.net/chr/2/ch20000621.htm. Accessed 10 Nov 2011
Commission nationale de l’informatique et des libertés (CNIL), Security guide of personal data (2010), Available: http://www.cnil.fr/fileadmin/documents/en/Guide_Security_of_Personal_Data-2010.pdf. Accessed 10 Nov 2011
La loi de la protection des données à caractère personnelles de la Tunisie, 2004
United States Department of Health & Human Services, Office for civil right privacy brief: summary of the HIPAA privacy rule (2003), Available: http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/privacysummary.pdf. Accessed 28 May 2010
Wikipedia, The Health Insurance Portability and Accountability Act (HIPAA) of 1996 (2011), Available: http://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act#Privacy_Rule. Accessed 26 April 2010
Wikipedia, The Gramm–Leach–Bliley Act (GLB) (2011), Available: http://en.wikipedia.org/wiki/Gramm%E2%80%93Leach%E2%80%93Bliley_Act. Accessed 26 April 2010
G. Ben Ayed, S. Ghernaouti-Hélie, Privacy requirements specification for digital identity management systems implementation: towards a digital society of privacy, in 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011), Abu Dhabi, UAE, 2011
M. Rotenberg, The privacy law sourcebook 2004: United States law, international law, and recent developments: Electronic Privacy Information Center, 2004
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Ben Ayed, G. (2014). Privacy and Digital Identity. In: Architecting User-Centric Privacy-as-a-Set-of-Services. Springer Theses. Springer, Cham. https://doi.org/10.1007/978-3-319-08231-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-08231-8_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-08230-1
Online ISBN: 978-3-319-08231-8
eBook Packages: EngineeringEngineering (R0)