[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
opinion
Free access

Privacy research directions

Published: 25 January 2016 Publication History

Abstract

What must we learn in order to support privacy requirements as technology advances?

References

[1]
National Academy of Science Raymond and Beverly Sackler U.S.-U.K. Scientific Forum on Cybersecurity, Dec. 8-9, 2014, Washington, D.C.
[2]
Networking and Information Technology Research and Development (NITRD) Program. Report on Privacy Research Within NITRD. (Apr. 2014); http://1.usa.gov/1lUFakz
[3]
Networking and information Technology Research and Development (NITRD) Program. Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program. (Dec. 2011); http://1.usa.gov/1NgEUFN
[4]
Nissenbaum, H. Privacy as contextual integrity. Washington Law Review 79 (2004), 119--158.
[5]
2015 NSF Secure and Trustworthy Cyberspace PI meeting (Jan. 5--7, 2015), Washington, D.C.; http://bit.ly/1OXJxVV
[6]
President's Review Group on Communications and Intelligence Technologies. Liberty and Security in a Changing World. (Dec. 12, 2013); http://1.usa.gov/1cBct0k
[7]
President's Council of Advisors on Science and Technology, Big Data and Privacy: A Technological Perspective. (May 2014); http://1.usa.gov/1rTipM2
[8]
Privacy and Civil Liberties Oversight Board, Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act, July 2, 2014; http://bit.ly/1FJat9g
[9]
Privacy and Civil Liberties Oversight Board. Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court. (Jan. 23, 2014); http://bit.ly/1SRiPke
[10]
Records, Computers, and the Rights of Citizens: Report of the Secretary's Committee on Automated Personal Data Systems (July 1973). Dept. of Health, Education and Welfare, DHEW(OS), 73--94; http://1.usa.gov/1RIZLom
[11]
Second Annual CATO Surveillance Conference (Oct. 21, 2015), Washington, D.C.; http://bit.ly/1MEsY05
[12]
U.S. Privacy and Civil Liberties Oversight Board (PCLOB) Workshop "Defining Privacy", Nov. 12, 2014, Washington, D.C.; http://bit.ly/1ReOmgT

Cited By

View all
  • (2024)Implementation of a Partial-Order Data Security Model for the Internet of Things (IoT) Using Software-Defined Networking (SDN)Journal of Cybersecurity and Privacy10.3390/jcp40300234:3(468-493)Online publication date: 20-Jul-2024
  • (2024)The impact of information privacy concerns on information systems use behaviors in non-volitional surveillance contexts: A moderated mediation approachInformation Systems Frontiers10.1007/s10796-024-10549-zOnline publication date: 30-Oct-2024
  • (2021)Cybercrime and CybercriminalsCyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM10.4018/978-1-7998-4162-3.ch001(1-31)Online publication date: 2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 59, Issue 2
February 2016
110 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/2886013
  • Editor:
  • Moshe Y. Vardi
Issue’s Table of Contents
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 January 2016
Published in CACM Volume 59, Issue 2

Check for updates

Qualifiers

  • Opinion
  • Popular
  • Un-reviewed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)161
  • Downloads (Last 6 weeks)39
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Implementation of a Partial-Order Data Security Model for the Internet of Things (IoT) Using Software-Defined Networking (SDN)Journal of Cybersecurity and Privacy10.3390/jcp40300234:3(468-493)Online publication date: 20-Jul-2024
  • (2024)The impact of information privacy concerns on information systems use behaviors in non-volitional surveillance contexts: A moderated mediation approachInformation Systems Frontiers10.1007/s10796-024-10549-zOnline publication date: 30-Oct-2024
  • (2021)Cybercrime and CybercriminalsCyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM10.4018/978-1-7998-4162-3.ch001(1-31)Online publication date: 2021
  • (2021)A Comprehensive Analysis of Privacy Protection Techniques Developed for COVID-19 PandemicIEEE Access10.1109/ACCESS.2021.31306109(164159-164187)Online publication date: 2021
  • (2021)Multi-level models for data security in networks and in the Internet of thingsJournal of Information Security and Applications10.1016/j.jisa.2021.10277858(102778)Online publication date: May-2021
  • (2019)Computing the Identification Capability of SQL Queries for Privacy ComparisonProceedings of the ACM International Workshop on Security and Privacy Analytics10.1145/3309182.3309188(47-52)Online publication date: 13-Mar-2019
  • (2019)Configuring Data Flows in the Internet of Things for Security and Privacy RequirementsInteger Programming and Combinatorial Optimization10.1007/978-3-030-18419-3_8(115-130)Online publication date: 14-Apr-2019
  • (2018)Multi-level Access Control, Directed Graphs and Partial Orders in Flow Control for Data Secrecy and PrivacyFoundations and Practice of Security10.1007/978-3-319-75650-9_8(111-123)Online publication date: 17-Feb-2018
  • (2017)Cyber-rumor sharing under a homeland security threat in the context of government Internet surveillance: The case of South-North Korea conflictGovernment Information Quarterly10.1016/j.giq.2017.04.00234:2(307-316)Online publication date: Apr-2017
  • (2017)Do managerial ethics and legal education influence online privacy policies in Greater China?Asian Journal of Business Ethics10.1007/s13520-017-0080-z7:2(117-136)Online publication date: 6-Sep-2017
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media