“Valuing” Privacy While Exposing Data Utility

  • Ken Barker
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6121)


Protecting data privacy is an area of increasing concern as the general public has become increasingly impacted by its inability to guarantee that those things we wish to hold private remain private. The concept of privacy is found in the earliest writing ofmankind and continues today to be a very high value inmodern society.Unfortunately, challenges to privacy have always existed and at times, these challenges have become so strong that any real sense of personal privacy was assumed to unattainable. This occurred in the middle-ages when communal living was normative, at least among the poor, so it was necessary to accept this as a simple matter of fact. This does not mean that privacy was not valued at the time, simply that it was assumed to be unachievable so the absence of it was accepted. A poll in a recent undergraduate/graduate class at the University of Calgary revealed that over half of the students felt that there was no way to protect their privacy in online systems. It was not that they did not value their privacy but simply felt, much like those in the middle-ages, there was nothing they could do about it. In addition, about half of the students felt that there was value in their private information and felt that they would consider trading it for an economic return under certain conditions that varied widely from individual to individual.


Private Information Data Privacy Online System Early Writing Personal Privacy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Barker, K., Askari, M., Banerjee, M., Ghazinour, K., Mackas, B., Majedi, M., Pun, S., Williams, A.: A Data Privacy Taxonomy. In: Sexton, A.P. (ed.) BNCOD 26. LNCS, vol. 5588, pp. 42–54. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  2. 2.
    Kumaraguru, P., Cranor, L.F.: Privacy indexes: A survey of westin’s studies. Technical Report CMU-ISRI-5-138, Carnegie Mellon University, CMU, Pittsburgh, PA, USA (December 2005)Google Scholar
  3. 3.
    Williams, A., Barker, K.: Controling inference: Avoiding p-level reduction during analysis. Journal of Research and Practice in Information Technology 40(3), 163–185 (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Ken Barker
    • 1
  1. 1.Advanced Database Systems and Applications LaboratoryUniversity of CalgaryCanada

Personalised recommendations