2001
DOI: 10.1145/572277.572278
|View full text |Cite
|
Sign up to set email alerts
|

Privacy protection, control of information, and privacy-enhancing technologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
106
0
1

Year Published

2004
2004
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 163 publications
(112 citation statements)
references
References 10 publications
1
106
0
1
Order By: Relevance
“…Privacy represents a preferred state in which an individual is protected from intrusion, interference, and information access by unwanted others (Tavani, 2007;Tavani & Moor, 2001). Privacy is both a state of being and a value to be desired (Smith et al, 2011).…”
Section: Privacy Protectionmentioning
confidence: 99%
“…Privacy represents a preferred state in which an individual is protected from intrusion, interference, and information access by unwanted others (Tavani, 2007;Tavani & Moor, 2001). Privacy is both a state of being and a value to be desired (Smith et al, 2011).…”
Section: Privacy Protectionmentioning
confidence: 99%
“…P2, Students as agents, encourages the view that students are collaborators in learning analytics and should be involved in decisions regarding use of their data. This is similar to the recognition of Actors (Information subjects) and Transmission Principles (Nissenbaum, 2010) and management of privacy expressed through choice, consent, and correction (Tavani & Moor, 2001). P3, Student identity and performance are temporal dynamic constructs, and P5, Transparency, speaks to the management aspects of privacy.…”
Section: Future Challengesmentioning
confidence: 67%
“…Contemporary privacy theories proposed by Nissenbaum (2010), Tavani (H. Tavani, 2007;Tavani & Moor, 2001;H.T. Tavani, 2007) and Moor (J. Moor, 2005; J.H.…”
Section: Contemporary Privacy Theories and Application To Learning Anmentioning
confidence: 99%
See 1 more Smart Citation
“…A number of overviews of the PET landscape have already been published (Blarkom, Borking, & Verhaar, 2003;Burkert, 1997;Camp & Osorio, 2003;Goldberg, 2002;Senicar, Jerman-Blazic, & Klobucar, 2003;Tavani & Moor, 2001). However, most of these studies fail to delineate what sorts of privacy the described technologies enhance, which makes it difficult to differentiate between the various PETs.…”
Section: Introductionmentioning
confidence: 99%