496 pages | 41 B/W Illus.
While traveling the data highway through the global village, most people, if they think about it at all, consider privacy a non-forfeitable right. They expect to have control over the ways in which their personal information is obtained, distributed, shared, and used by any other entity. According to recent surveys, privacy, and anonymity are the fundamental issues of concern for most Internet users, ranked higher than ease-of-use, spam, cost, and security.
Digital Privacy: Theory, Techniques, and Practices covers state-of-the-art technologies, best practices, and research results, as well as legal, regulatory, and ethical issues. Editors Alessandro Acquisti, Stefanos Gritzalis, Costas Lambrinoudakis, and Sabrina De Capitani di Vimercati, established researchers whose work enjoys worldwide recognition, draw on contributions from experts in academia, industry, and government to delineate theoretical, technical, and practical aspects of digital privacy. They provide an up-to-date, integrated approach to privacy issues that spells out what digital privacy is and covers the threats, rights, and provisions of the legal framework in terms of technical counter measures for the protection of an individual’s privacy. The work includes coverage of protocols, mechanisms, applications, architectures, systems, and experimental studies.
Even though the utilization of personal information can improve customer services, increase revenues, and lower business costs, it can be easily misused and lead to violations of privacy. Important legal, regulatory, and ethical issues have emerged, prompting the need for an urgent and consistent response by electronic societies. Currently there is no book available that combines such a wide range of privacy topics with such a stellar cast of contributors. Filling that void, Digital Privacy: Theory, Techniques, and Practices gives you the foundation for building effective and legal privacy protocols into your business processes.
Privacy Enhancing Technologies for the Internet III: Ten Years Later, I. Goldberg
Communication Privacy, A. Pfitzmann, A. Juschka, A.-K. Stange, S. Steinbrecher, and S. Köpsell, and
Privacy-Preserving Cryptographic Protocols, M.J. Atallah and K.B. Frikken
Byzantine Attacks on Anonymity Systems, N. Borisov, G. Danezis, and P. Tabriz
Introducing Traffic Analysis, G. Danezis and R. Clayton
Privacy, Profiling, Targeted Marketing, and Data Mining, J. Vaidya and V. Atluri
Enterprise Privacy Policies and Languages, M. Backes and M. Dürmuth
Uncircumventable Enforcement of Privacy Policies via Cryptographic Obfuscation, A. Narayanan and V. Shmatikov
Privacy Protection with Uncertainty and Indistinguishability, X.S. Wang and S. Jajodia
Privacy-Preserving Techniques in Data Mining, C. Su, J. Zhou, F. Bao, G. Wang, and K. Sakurai
HCI Designs for Privacy-Enhancing Identity Management, S. Fischer-Hübner, J. Sören Pettersson, M. Bergmann, M. Hansen, S. Pearson, and M. Casassa Mont
Privacy Perceptions among Members of Online Communities, M. Karyda and S. Kokolakis
Perceived Control: Scales for Privacy in Ubiquitous Computing, S. Spiekermann
RFID: Technological Issues and Privacy Concerns, P. Nájera and J. Lopez
Privacy of Location Information, C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, and P. Samarati
Beyond Consent: Privacy in Ubiquitous Computing (Ubicomp), J. Camp and K. Connelly
A Risk Model for Privacy Insurance, A.N. Yannacopoulos, S. Katsikas, S. Gritzalis, C. Lambrinoudakis, and S.Z. Xanthopoulos
What Can Behavioral Economics Teach Us About Privacy? A. Acquisti and J. Grossklags
Privacy of Outsourced Data, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, and P. Samarati
Communications Data Retention: A Pandora’s Box for Rights and Liberties? L. Mitrou
Surveillance of Emergent Associations: Freedom of Association in a Network Society, K.J. Strandburg