The public expects that technologies used in electronic commerce and government will enhance security while preserving privacy. These expectations are focused through public policy influences, implemented by law, regulation, and standards emanating from states (provincial governments), federal agencies (central governments) and international law. They are influenced through market pressures set in contracts. This chapter posits that personally identifiable information (PII) is a form of property that flows along an “information supply chain” from collection, through archival and analysis and ultimately to its use in decision-making. The conceptual framework for balancing privacy and security developed here provides a foundation to develop and implement public policies that safeguard individual rights, the economy, critical infrastructures and national security. The illusive resolution of the practical antithesis between privacy and security is explored by developing some tradeoff relationships using exemplars from various fields that identify this quandary while recognizing how privacy and security sometimes harmonize.
The public expects that technologies used in electronic commerce and government will enhance security while preserving privacy. These expectations are focused through public policy influences, implemented by law, regulation, and standards emanating from states (provincial governments), federal agencies (central governments) and international law. They are influenced through market pressures set in contracts. This chapter posits that personally identifiable information (PII) is a form of property that flows along an “information supply chain” from collection, through archival and analysis and ultimately to its use in decision-making. The conceptual framework for balancing privacy and security developed here provides a foundation to develop and implement public policies that safeguard individual rights, the economy, critical infrastructures and national security. The illusive resolution of the practical antithesis between privacy and security is explored by developing some tradeoff relationships using exemplars from various fields that identify this quandary while recognizing how privacy and security sometimes harmonize.
Abstract:There is an evolution in the process used by standards-development organizations (SDOs) and this is changing the prevailing standards development activity (SDA) for information and communications technology (ICT). The process is progressing from traditional SDA modes, typically involving the selection from many candidate, existing alternative components, into the crafting of standards that include a substantial design component (SSDC), or "anticipatory" standards. SSDC require increasingly important roles from organizational players as well as SDOs. Few theoretical frameworks exist to understand these emerging processes. This project conducted archival analysis of SDO documents for a selected subset of web-services (WS) standards taken from publicly available sources including minutes of meetings, proposals, drafts and recommendations. This working paper provides a deeper understanding of SDAs, the roles played by different organizational participants and the compliance with SDO due process requirements emerging from public policy constraints, recent legislation and standards accreditation requirements. This research is influenced by a recent theoretical framework that suggests viewing the new standards-setting processes as a complex interplay among three forces: sense-making, design, and negotiation (DSN). The DSN model provides the framework for measuring SDO progress and therefore understanding future generations of standards development processes. The empirically grounded results are useful foundation for other SDO modeling efforts.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.