Advertisement

Datenschutz und Datensicherheit - DuD

, Volume 40, Issue 2, pp 79–83 | Cite as

A framework for analysing technology’s negative and positive impacts on freedom and privacy

Schwerpunkt

Abstract

The term ‘privacy’ refers to a cluster of values within the broad framework of human rights. Developments in information technologies have substantial negative impacts on all of the dimensions of privacy. Beyond the well-documented harm to personal data and personal communications, we are imposing on one another increasingly serious intrusions into the privacy of the physical person, of personal behaviour, and of personal experience. The survival of human society and polity are dependent on technology being brought under human control, through actions to prevent harmful applications, to resist their implementation, and to ensure robustness and resilience against their effects. Some technologies offer themselves as weapons in that battle.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  1. APF (2013) Meta-Principles for Privacy Protection’ Australian Privacy Foundation, March 2013, at https://www.privacy.org.au/Papers/PS-MetaP.htmlGoogle Scholar
  2. Cavoukian A. & Hustinx G. (1995) Privacy-Enhancing Technologies: The Path to Anonymity. Information and Privacy Commissioner of Ontario and Registratiekamer (Rijswijk) of The Netherlands, 1995Google Scholar
  3. Clarke R. (1988) Information Technology and Dataveillance. Commun. ACM 31,5 (May 1988) Re-published in C. Dunlop and R. Kling (Eds.), ‘Controversies in Computing’, Academic Press, 1991, PrePrint at http://www.rogerclarke.com/DV/CACM88.htmlGoogle Scholar
  4. Clarke R. (1994) The Eras of Dataveillance. Xamax Consultancy Pty Ltd, March 1994, at http://www.rogerclarke.com/DV/NotesDVEras.htmlGoogle Scholar
  5. Clarke R. (1997-) Introduction to Dataveillance and Information Privacy, and Definitions of Terms. Xamax Consultancy Pty Ltd, August 1997, revisions to March 2015, at http://www.rogerclarke.com/DV/Intro.htmlGoogle Scholar
  6. Clarke R. (1999) Privacy-Enhancing and Privacy-Sympathetic Technologies: Resources. Xamax Consultancy Pty Ltd, April 1999, at http://www.rogerclarke. com/DV/PEPST.htmlGoogle Scholar
  7. Clarke R. (2001) Introducing PITs and PETs: Technologies Affecting Privacy. Privacy Law & Policy Reporter 7, 9 (March 2001) 181-183, 188, PrePrint at http://www.rogerclarke.com/DV/PITsPETs.htmlGoogle Scholar
  8. Clarke R. (2004) Origins and Nature of the Internet in Australia. Xamax Consultancy Pty Ltd, January 2004, various published versions, master-copy at http://www.rogerclarke.com/II/OzI04.html#IImplGoogle Scholar
  9. Clarke R. (2006) What’s ‘Privacy’? Xamax Consultancy Pty Ltd, August 2006, at http://www.rogerclarke.com/DV/Privacy.htmlGoogle Scholar
  10. Clarke R. (2007) The Regulation of Surveillance. Xamax Consultancy Pty Ltd, August 2007, at http://www.rogerclarke.com/DV/SReg.htmlGoogle Scholar
  11. Clarke R. (2009a) Privacy Impact Assessment: Its Origins and Development. Computer Law & Security Review 25, 2 (April 2009) 123-135, PrePrint at http://www.rogerclarke.com/DV/PIAHist-08.htmlGoogle Scholar
  12. Clarke R. (2009b) A Sufficiently Rich Model of (Id)entity, Authentication and Authorisation. Proc. IDIS 2009–The 2nd Multidisciplinary Workshop on Identity in the Information Society, LSE, London, 5 June 2009, at http://www. rogerclarke.com/ID/IdModel-090605.htmlGoogle Scholar
  13. Clarke R. (2009c) A Framework for Surveillance Analysis. Xamax Consultancy Pty Ltd, August 2009, at http://www.rogerclarke.com/DV/FSA.htmlGoogle Scholar
  14. Clarke R. (2011a) An Evaluation of Privacy Impact Assessment Guidance Documents. International Data Privacy Law 1, 2 (March 2011), PrePrint at http://www.rogerclarke.com/DV/PIAG-Eval.htmlGoogle Scholar
  15. Clarke R. (2011b) The Cloudy Future of Consumer Computing. Proc. 24th Bled eConference, June 2011, PrePrint at http://www.rogerclarke.com/EC/CCC.htmlGoogle Scholar
  16. Clarke R. (2013) The Resilience of Society in the Face of Surveillance. Xamax Consultancy Pty Ltd, February 2013, at http://www.rogerclarke.com/DV/IRISSR.html#ResGoogle Scholar
  17. Clarke R. (2014a) Approaches to Impact Assessment. Panellist’s Notes, CPDP’14, Brussels, 22 January 2014, Xamax Consultancy Pty Ltd, January 2014, at http://www.rogerclarke.com/SOS/IA-1401.htmlGoogle Scholar
  18. Clarke R. (2014b) Key Factors in the Limited Adoption of End-User PETs. Proc. Politics of Surveillance Workshop, University of Ottawa, 8-10 May 2014, Pre-Print at http://www.rogerclarke.com/DV/UPETs-1405.htmlGoogle Scholar
  19. Clarke R. (2014c) How to Promote PET Usage. Panellist’s Notes, Politics of Surveillance Workshop, University of Ottawa, Xamax Consultancy Pty Ltd, May 2014, at http://www.rogerclarke.com/DV/PETPromo-1405.htmlGoogle Scholar
  20. Clarke R. (2014d) Surveillance, Resilience and Democracy. Xamax Consultancy Pty Ltd, October 2014, at http://www.rogerclarke.com/DV/SRD14.htmlGoogle Scholar
  21. Clarke R. (2016) Privacy Impact Assessments as a Control Mechanism for Australian National Security Initiatives. Forthcoming, Computer Law & Security Review 32, 2 (Mar-Apr 2016), PrePrint at http://www.rogerclarke.com/DV/IANS.htmlGoogle Scholar
  22. Davies S. (2014) Ideas for Change: Campaign principles that shift the world. The Privacy Surgeon, December 2014, at http://www.privacysurgeon.org/resources/ideas-for-change/Google Scholar
  23. ICCPR (1996) International Covenant on Civil and Political Rights. United Nations, 1966, at http://www.ohchr.org/en/professionalinterest/pages/ccpr.aspxGoogle Scholar
  24. Kissell J. (2014) Take Control of Your Online Privacy. TidBITS Publishing Inc., March 2014, at http://email.agilebits.com/t/r-l-ckltdlt-kjiuxtlh-t/Google Scholar
  25. Morison W.L. (1973) Report on the Law of Privacy. Government Printer, Sydney, 1973Google Scholar
  26. Raab C.D., Jones R. & Szekely I. (2015) Surveillance and Resilience in Theory and Practice. Media and Communication 3, 2 (October 2015), at http://ssrn.com/abstract=2645973Google Scholar
  27. UDHR (1948) Universal Declaration of Human Rights. United Nations, 10 December 1948, at http://www.un.org/en/documents/udhr/index.shtmlGoogle Scholar
  28. Wright D. & De Hert P. (eds) (2012) Privacy Impact Assessments. Springer, 2012Google Scholar
  29. Wright D. & Raab C.D. (2012) Constructing a surveillance impact assessment. Computer Law & Security Review 28, 6 (December 2012) 613–626CrossRefGoogle Scholar
  30. Wright D., Friedewald M. & Gellert R. (2015) Developing and testing a surveillance impact assessment methodology. International Data Privacy Law 5, 1 (2015) 40–53CrossRefGoogle Scholar

Copyright information

© Springer Fachmedien Wiesbaden 2016

Authors and Affiliations

  1. 1.Xamax Consultancy Pty Ltd.CanberraAustralia

Personalised recommendations