Reading questions for:
Herman T. Tavani and James H. More, Privacy Protection,
Control of Information, and Privacy-Enhancing Technologies.
CS-80--Senior Seminar
Fall '01
Ned Bingham
October 15, 2001
- Throughout their paper, Travani and Moor explore many of the various
facits of privacy while arguing for more distinction between concept and control.
According to them, what are the ``traditional'' definitions of privacy, and how
are they un-satisfactory? Do you think they leave anything out? What is their
main complaint with the traditional definitions of privacy, and is their
complaint justified? What do they feel makes a good privacy policy? Why do they feel these aspects are important? What is wrong with a policy based solely upon
control?
- Travani and Moor stipulate that a distinction must be drawn between
normative and natural/descriptinve privacy. Is this possible? Why must we be
forced to make an ``all or none'' choice, and how does the restricted access
theory/model not allow for this choice? They also extrapolate on the potential
re-design of the boundries between what we value as private and public. Are these
actually necessary in today's world? Do you think their proposals are reasonable,
or are they asking for too much?
- Despite their bashing of privacy policies which rely solely upon control,
Travani and Moor recognize the need for personal control in a privacy system. In
the management of privacy, what are the objectives of the 3 manifestations of
information/privacy control (choice, consent, and correction) and why are these
important to the management of privacy?
- In their discussion of PETs, do the authors of this article elaborate on
how PETs fit into their idea of an adequate privacy policy? What is one of the
major flaws in PETs? Is there any way that these flaws can be prevented in future
PETs? What are some of the conceptual flaws in modern PETs? How can these be
corrected? How is it that PETs are occasionally used to replace some of the other
aspects of a respectable privacy policy and privacy management system? Does this
make PETs more or less effective? With respect to e-commerce, entrepreneurs have
relied upon users making ``informed decisions'' about disclosing their
information and therefor there exists a form of informed consent. In today's
market, do you think this is a lagitimate claim? If not, what needs to be
changed? How are PETs inadequate in protecting an individual's privacy?
Reading questions for:
Herman T. Tavani and James H. More, Privacy Protection,
Control of Information, and Privacy-Enhancing Technologies.
CS-80--Senior Seminar
Fall '01
This document was generated using the
LaTeX2HTML translator Version 2K.1beta (1.47)
Copyright © 1993, 1994, 1995, 1996,
Nikos Drakos,
Computer Based Learning Unit, University of Leeds.
Copyright © 1997, 1998, 1999,
Ross Moore,
Mathematics Department, Macquarie University, Sydney.
The command line arguments were:
latex2html TavaniMoor_ned
The translation was initiated by Ned Bingham on 2001-10-15
Ned Bingham
2001-10-15