2000
DOI: 10.2307/1229519
|View full text |Cite
|
Sign up to set email alerts
|

The Death of Privacy?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
53
0
4

Year Published

2009
2009
2020
2020

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 151 publications
(61 citation statements)
references
References 0 publications
0
53
0
4
Order By: Relevance
“…Conventionally, identifying attributes such as name or social security number are not disclosed, in order to protect privacy. Still, recent research [Froomkin 2000;Sweeney 2002] has demonstrated that this is not sufficient, due to the existence of quasi-identifiers in the released microdata. Quasi-identifiers are sets of attributes (e.g., ZIP, Gender, DateOfBirth ) which can be joined with information obtained from diverse sources (e.g., public voting registration data) in order to reveal the identity of individual records.…”
Section: Introductionmentioning
confidence: 99%
“…Conventionally, identifying attributes such as name or social security number are not disclosed, in order to protect privacy. Still, recent research [Froomkin 2000;Sweeney 2002] has demonstrated that this is not sufficient, due to the existence of quasi-identifiers in the released microdata. Quasi-identifiers are sets of attributes (e.g., ZIP, Gender, DateOfBirth ) which can be joined with information obtained from diverse sources (e.g., public voting registration data) in order to reveal the identity of individual records.…”
Section: Introductionmentioning
confidence: 99%
“…It is now practical-even cheap-for organizations to track Internet usage, sites visited, and software opened; to monitor e-mail communications; to log keystrokes, cookies, clicktrails, and improper distribution of intellectual property (using "snitchware"); to listen in on telephone conversations and meetings; to screen caller IDs; to conduct video surveillance, including the use of recognition technologies to determine gender, age, and even identity on lowresolution security monitor footage; to monitor location through GPS software embedded in mobile devices or vehicles; to track who is meeting with whom using mobile phone sensors; and to conduct sense-enhanced searches which look through clothes or skin to uncover hidden threats, anxiety, or even mood/emotion (Froomkin, 2000;Levinson, 2009;Smith-Butler, 2009). …”
Section: Observation As a Technologymentioning
confidence: 99%
“…Another, by contrast, refers to our online manifestations as "second selves" or "digital doppelgängers" (Andrews, 2012, p. 45), again insisting on the belatedness and inferiority of our online presence when compared to our "real" material selves. e response to this perceived crisis is to call for more privacy safeguards to be built into search engines, online financial transactions, and the uses of data about individuals by the entities with which we interact (e.g., Pentland, 2009;Froomkin, 2000). More "privacy by design" is needed because "[p]rivacy is not something that appear[s] naturally online, it must be deliberately architected" (Castelluccia, 2012, p. 31; see also Lessig, 2013;Witte, 2013).…”
Section: Introductionmentioning
confidence: 99%