Privacy is a huge concern to many citizens, customers, patients, internet users and telephone subscribers especially as the lines are being blurred between professional and private lives.
However, many people are simply unaware of just how much of their personal data is being stored and processed, whether that is in the form of cookie trails that track their internet usage, video from surveillance systems, such as Closed Circuit Television (CCTV), or the purchases they make using credit cards and company loyalty cards.
Marit Hansen is the Deputy Privacy Commissioner of the Data Protection Authority (DPA) of Schleswig-Holstein, Germany and suggests that while the processing of personal data has become a part of everyday life in today's information society, this means that privacy is increasingly under threat. She suggests that conventional approaches to privacy have intensified the problem because these systems store personal and private data, such as your name and address, date of birth, mother's maiden name, and credit details online.
Hansen believes that a user-controlled approach to information management is the only way to solve the problem by allowing individuals to manage their privacy. This approach would allow individuals to create "partial identities" that separated personal data depending on the specific context and allowed the website, healthcare worker, or other interested party access only to the limited data they needed.
"User-controlled identity management systems are not a panacea for all privacy problems, but they can act as a gateway and guardian for individual privacy," explains Hansen. As such, such an approach has the potential to become a key tool for future privacy concepts.
In related work, also published this month in the IJIPM, Ronald Leenes of the Tilburg Institute for Law, Technology, and Society in The Netherlands, says user-centric identity management as an indispensable tool for privacy protection.
Leenes believes that not only is our information privacy being compromised but it is "under siege on the internet." He suggests that a person's digital persona can be used for good in the context obtaining personalised services on the internet, for instance, for bad when that persona is used to discriminate against a particular individual.
There are insufficient legal controls in place, Leenes, says, to allow internet users to control their privacy, which means that new infrastructure on the web must be implemented, based on the aforementioned user-controlled identity management, that allows individuals to control the data they are sharing with websites.
Albert Ang | alfa
Powerful IT security for the car of the future – research alliance develops new approaches
25.05.2018 | Universität Ulm
Supercomputing the emergence of material behavior
18.05.2018 | University of Texas at Austin, Texas Advanced Computing Center
The more electronics steer, accelerate and brake cars, the more important it is to protect them against cyber-attacks. That is why 15 partners from industry and academia will work together over the next three years on new approaches to IT security in self-driving cars. The joint project goes by the name Security For Connected, Autonomous Cars (SecForCARs) and has funding of €7.2 million from the German Federal Ministry of Education and Research. Infineon is leading the project.
Vehicles already offer diverse communication interfaces and more and more automated functions, such as distance and lane-keeping assist systems. At the same...
A research team led by physicists at the Technical University of Munich (TUM) has developed molecular nanoswitches that can be toggled between two structurally different states using an applied voltage. They can serve as the basis for a pioneering class of devices that could replace silicon-based components with organic molecules.
The development of new electronic technologies drives the incessant reduction of functional component sizes. In the context of an international collaborative...
At the LASYS 2018, from June 5th to 7th, the Laser Zentrum Hannover e.V. (LZH) will be showcasing processes for the laser material processing of tomorrow in hall 4 at stand 4E75. With blown bomb shells the LZH will present first results of a research project on civil security.
At this year's LASYS, the LZH will exhibit light-based processes such as cutting, welding, ablation and structuring as well as additive manufacturing for...
There are videos on the internet that can make one marvel at technology. For example, a smartphone is casually bent around the arm or a thin-film display is rolled in all directions and with almost every diameter. From the user's point of view, this looks fantastic. From a professional point of view, however, the question arises: Is that already possible?
At Display Week 2018, scientists from the Fraunhofer Institute for Applied Polymer Research IAP will be demonstrating today’s technological possibilities and...
So-called quantum many-body scars allow quantum systems to stay out of equilibrium much longer, explaining experiment | Study published in Nature Physics
Recently, researchers from Harvard and MIT succeeded in trapping a record 53 atoms and individually controlling their quantum state, realizing what is called a...
25.05.2018 | Event News
02.05.2018 | Event News
13.04.2018 | Event News
25.05.2018 | Event News
25.05.2018 | Machine Engineering
25.05.2018 | Life Sciences