Reading questions for:
Herman T. Tavani and James H. More, Privacy Protection, Control of Information, and Privacy-Enhancing Technologies.
CS-80--Senior Seminar
Fall '01

Ned Bingham

October 15, 2001

  1. Throughout their paper, Travani and Moor explore many of the various facits of privacy while arguing for more distinction between concept and control. According to them, what are the ``traditional'' definitions of privacy, and how are they un-satisfactory? Do you think they leave anything out? What is their main complaint with the traditional definitions of privacy, and is their complaint justified? What do they feel makes a good privacy policy? Why do they feel these aspects are important? What is wrong with a policy based solely upon control?

  2. Travani and Moor stipulate that a distinction must be drawn between normative and natural/descriptinve privacy. Is this possible? Why must we be forced to make an ``all or none'' choice, and how does the restricted access theory/model not allow for this choice? They also extrapolate on the potential re-design of the boundries between what we value as private and public. Are these actually necessary in today's world? Do you think their proposals are reasonable, or are they asking for too much?

  3. Despite their bashing of privacy policies which rely solely upon control, Travani and Moor recognize the need for personal control in a privacy system. In the management of privacy, what are the objectives of the 3 manifestations of information/privacy control (choice, consent, and correction) and why are these important to the management of privacy?

  4. In their discussion of PETs, do the authors of this article elaborate on how PETs fit into their idea of an adequate privacy policy? What is one of the major flaws in PETs? Is there any way that these flaws can be prevented in future PETs? What are some of the conceptual flaws in modern PETs? How can these be corrected? How is it that PETs are occasionally used to replace some of the other aspects of a respectable privacy policy and privacy management system? Does this make PETs more or less effective? With respect to e-commerce, entrepreneurs have relied upon users making ``informed decisions'' about disclosing their information and therefor there exists a form of informed consent. In today's market, do you think this is a lagitimate claim? If not, what needs to be changed? How are PETs inadequate in protecting an individual's privacy?

About this document ...


Reading questions for:
Herman T. Tavani and James H. More, Privacy Protection, Control of Information, and Privacy-Enhancing Technologies.
CS-80--Senior Seminar
Fall '01

This document was generated using the LaTeX2HTML translator Version 2K.1beta (1.47)

Copyright © 1993, 1994, 1995, 1996, Nikos Drakos, Computer Based Learning Unit, University of Leeds.
Copyright © 1997, 1998, 1999, Ross Moore, Mathematics Department, Macquarie University, Sydney.

The command line arguments were:
latex2html TavaniMoor_ned

The translation was initiated by Ned Bingham on 2001-10-15


Ned Bingham 2001-10-15