2005 IEEE International Conference on E-Technology, E-Commerce and E-Service
DOI: 10.1109/eee.2005.90
|View full text |Cite
|
Sign up to set email alerts
|

Maturing e-Privacy with P3P and Context Agents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…For instance, many privacy laws contain provisions that allow for the processing and distribution of sensitive pieces of information under rare circumstances, such as when a person's life is at stake. P3P cannot describe such extraordinary circumstances [Jutla and Zhang 2005].…”
Section: Survey Methodologymentioning
confidence: 99%
“…For instance, many privacy laws contain provisions that allow for the processing and distribution of sensitive pieces of information under rare circumstances, such as when a person's life is at stake. P3P cannot describe such extraordinary circumstances [Jutla and Zhang 2005].…”
Section: Survey Methodologymentioning
confidence: 99%
“…(7) The privacy component may support provision/retrieval of the user model information to the user on request. User models for privacy management can be found in [12,13,30]. Some user model attributes for privacy, from the organization's perspective, include individual data release rules, client trust (in the organization) attribute, user role, and user tenure with the organization.…”
Section: Figure 3 Biometric Security and Privacymentioning
confidence: 99%
“…Most of these are only a few sentences for a particular transactional context. Examples of transactional contexts [12,13] are buy, retrieve (browse, search), register, etc. (4) After (3), the system may ask the user whether he/she consents to all the data collection/uses/retention terms/and sharing present in the statements or whether the user would like to customize individually his/her privacy preferences for the transaction."…”
Section: Figure 3 Biometric Security and Privacymentioning
confidence: 99%
See 1 more Smart Citation
“…On one hand, let me mention work on the regulatory aspects of technology in such fields as universal usability (Shneiderman 2000); informed consent (Friedman et al 2002); crime control and architecture (Katyal 2002(Katyal , 2003; social justice (Borning et al 2004); allegedly perfect self-enforcement technologies on the internet (Zittrain 2007); and design-based instruments for implementing social policies (Yeung 2007 On the other hand, following seminal work on the ethics of design (Friedman 1986;Mitcham 1995;Whitbeck 1996), and privacy (Agre 1997), it is noteworthy that scholars have examined data protection issues raised by the design of ICT, by the means of value-sensitive design (Friedman and Kahn 2003;Friedman et al 2006), legal ontologies (Abou-Tair and Berlik 2006; Mitre et al 2006;Lioudakis et al 2007), projects on platforms for privacy preferences (P3P), (Jutla and Zhang 2005;Cranor et al 2008;Reay et al 2009) and PeCAN platforms (Jutla et al 2006;Jutla 2010), down to the topology of complex social networks (Pagallo 2007). In addition, the idea of incorporating data protection safeguards in ICT was the subject matter of both "Privacy by Design.…”
Section: Introductionmentioning
confidence: 99%