585
Views
9
CrossRef citations to date
0
Altmetric
Original Articles

Privacy and security at risk in the global information society

Pages 420-441 | Published online: 25 Feb 2009

References

  • Bangemann , M. 26 May 1994 . ‘Europe and the Global Information Society, Recommendations to the European Council’ , (Bangemann Report) 26 May , Brussels 1994,
  • Bennett , C. 1997 . “ ‘Convergence Revisited: Toward a Global Policy for Protection of Personal Data?’ ” . In Technology and Privacy. The New Landscape , Edited by: Agre , P. and Rotenberg , M. 99 – 124 . Cambridge, MA and London : MIT Press .
  • Boyan , J. 1997 . ‘The Anomyzer: Protecting User Privacy on the Web’ . Computer‐Mediated Communication Magazine , http://www.december.com/cmc/mag/1997/mag/1997/boyan.html
  • Brunnstein , K. ‘Analysis of JAVA Security and Hostile Applets’ . Information Security in Research and Business — Proceedings of the IFIP TC‐11 13th International Conference on Information Security (Sec’ 97) . May 14–16 1997 , Copenhagen, Denmark. Edited by: Yngstrüm , L. and Carlsen , J. pp. 293 – 5 . Chapman & Hall . London:
  • Brunnstein , K. and Schier , K. ‘Global Digital Commerce: Impacts and Risks for Developments of Global Information Societies’ . An Ethical Global Information Society: Culture and Democracy Revisited — Proceedings of the IFIP WG 9.2 Corfu International Conference, . May 8–10 1997 , Corfu. Edited by: Berleur , J. and Whitehouse , D. pp. 75 – 82 . Chapman & Hall . London:
  • Brunnstein , K. , Fischer‐Hübner , S. and Schaar , P. February 1998 . “ ‘Verbraucherbefragung und Globale Informationsgesellschaft’ ” . In Computer und Recht , February , 125 – 6 . Verlag Dr Otto Schmidt . 1998,
  • Budapest Draft . 1996 . “ ‘Data Protection on the Internet: Report and Guidance’ ” . International Working Group on Data Protection in Telecommunications . http://jilt.law.strath.ac.uk/jilt/consult/iwgdp/default.htm
  • Canadian Information Highway Advisory Council . September 1995 . Connection Community Content: The Challenge of the Information Highway September , final report, 1995.
  • Chaum , D. 1981 . ‘Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms’ . Communications of the ACM , 24 (2) : 84 – 8 .
  • _____ . 1985 . ‘Security without Identification: Transaction Systems to Make Big Brother Obsolete’ . Communications of the ACM , 28 (10) : 1030 – 44 .
  • _____ . 1992 . ‘Achieving Electronic Privacy’ . Scientific American , 8 : 76 – 81 .
  • Common Criteria (CC) Editorial Board . 1998 . ‘Common Criteria for Information Technology Security Evaluation’ . May Version 2.0, 1998
  • Cottrell , L. 1997 . ‘Mixmaster and Re‐mailer Attacks’ . http://www.obscura.com/∼loki/re‐mailer/re‐mailer‐essay.html
  • EFGA (Electronic Frontiers Georgia) . 1998 . Reliable Re‐mailer List , http://anon.efga.org/anon/rlist.html
  • EPIC (Electronic Privacy Information Center) . 1997 . ‘Surfer Beware: Personal Privacy and the Internet’ . June 1997, http://www.epic.org /reports/surfer‐beware.html
  • EU Directive . 1995 . Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with regard to the Processing of Personal Data and on the Free Movement of Such Data . http://www2.echo.lu/legal/en/dataprot/directiv/directiv.html
  • Fischer‐Hübner , S. ‘Towards a Privacy‐Friendly Design and Use of IT‐Security Mechanisms’ . Proceedings of the 17th National Computer Security Conference . October 1994 , Baltimore, MD. pp. 142 – 52 .
  • _____ . ‘Privacy at Risk in the Global Information Society’ . An Ethical Global Information Society: Culture and Democracy Revisited — Proceedings of the IFIP WG 9.2 Corfu International Conference . May 8–10 1997 , Corfu. Edited by: Berleur , J. and Whitehouse , D. pp. 261 – 74 . Chapman & Hall . London:
  • Garfinkel , S. and Spafford , G. 1997 . Web Security and Commerce , Cambridge, Köln, Paris, Sebastopol, Tokyo : O'Reilly and Associates .
  • Greenleaf , G. 1995 . ‘The 1995 EU Directive on Data Protection – An Overview’ . The International Privacy Bulletin , 3 (2) : 10 – 21 .
  • Holvast , J. ‘Vulnerability and Privacy: Are We on the Way to a Risk‐Free Society?’ . Facing the Challenge of Risk and Vulnerability in an Information Society, Proceedings of the IFIP‐WG9.2 Conference . May 20–22 1993 , Namur. Edited by: Berleur , J. pp. 267 – 79 . Elsevier Science . Amsterdam:
  • IITF (Information Infrastructure Task Force) — Privacy Working Group . June 1995 . Privacy and the National Information Infrastructure: Principles for Providing and Using Personal Information June , final version, 1995.
  • IITF (Information Infrastructure Task Force) — Information Policy Committee . April 1997 . Options for Promoting Privacy on the NII, Executive Summary April , 1997
  • ITSEC (Information Technology Security Evaluation Criteria) . 1991 . Provisional Harmonised Criteria ,
  • Koch , F. ‘European Data Protection — Against the Internet?’ . paper presented at Privacy International Conference on Advanced Surveillance Technologies . September 1995 , Copenhagen.
  • Lundheim , R. and Sindre , G. ‘Privacy and Computing: A Cultural Perspective’ . Security and Control of Information Technology in Society, IFIP WG 9.6 Working Conference . August 1993 , St Petersburg. Edited by: Sizer , R. pp. 25 – 40 . Elsevier Science . Amsterdam:
  • Madsen , W. 1992 . Handbook of Personal Data Protection , New York : Stockton Press .
  • _____ . ‘Securing Access and Privacy on the Internet’ . Proceedings of the C0MPSEC‐Conference . October 1995 , London. Elsevier Science .
  • Mayer‐Schönberger , V. 1997 . ‘The Internet and Privacy Legislation: Cookies for a Threat?’ . West Virginia Journal of Law and Technology , 1 ( 1 ) http://www.wvjolt.wvu.edu/wvjolt/current/issuel/articles/mayer/mayer.htm.
  • MITI (Ministry of International Trade and Industry) . May 1994 . Programme for Advanced Information Infrastructure May , Japan 1994
  • NCB (National Computer Board) . August 1991 . IT2000 ‐ A Vision of an Intelligent Island August , Singapore 1991
  • Netscape . 1997 . ‘The Open Profiling Standard (OPS)’ . http://developers.netscape.com/ops/ops.html
  • Registratiekamer (Dutch Data Protection Authority) . 1995 . Privacy‐Enhancing Technologies: The Path to Anonymity , vol. 2 , Rijswijk, , The Netherlands : Achtergrondstudies en Verkenningen 5B .
  • Registratiekamer (Dutch Data Protection Authority)/IPC (Information and Privacy Commissioner/Ontario, Canada) . 1995 . Privacy‐Enhancing Technologies: The Path to Anonymity , vol. 1 , Ontario, , Canada : Achtergrondstudies en Verkenningen 5A, The Netherlands .
  • Rosenberg , R. 1992 . The Social Impact of Computers , Academic Press .
  • TCSEC . 1985 . DoD Trusted Computer Systems Evaluation Criteria , Washington, DC : Department of Defense . DoD 5200.28 STD,
  • US Department of Commerce . June 1997 . Privacy and Self‐Regulation in the Information Age June , Washington DC 1997, http://www.ntia.doc.gov/reports/privacy/
  • US Government . 1993 . The National Information Infrastructure: Agenda for Action
  • Westin , A. 1967 . Privacy and Freedom New York

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.