Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Communications of the ACM
Reputation in privacy enhancing technologies
Proceedings of the 12th annual conference on Computers, freedom and privacy
Privacy protection, control of information, and privacy-enhancing technologies
ACM SIGCAS Computers and Society
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
Privacy in e-commerce: stated preferences vs. actual behavior
Communications of the ACM - Transforming China
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
The computer and the invasion of privacy
SIGCPR '67 Proceedings of the fifth SIGCPR conference on Computer personnel research
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
A Critique of k-Anonymity and Some of Its Enhancements
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
From t-Closeness to PRAM and Noise Addition Via Information Theory
PSD '08 Proceedings of the UNESCO Chair in data privacy international conference on Privacy in Statistical Databases
Security and privacy in computer systems
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
Security and privacy: similarities and differences
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
System implications of information privacy
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
A brief description of privacy measures in the RUSH time-sharing system
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
A brief description of privacy measures in the multics operating system
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
Towards the development of privacy-aware systems
Information and Software Technology
Proceedings of the 18th international conference on World wide web
Myths and fallacies of "Personally Identifiable Information"
Communications of the ACM
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Hi-index | 0.00 |
"Privacy as confidentiality" has been the dominant paradigm in computer science privacy research. Privacy Enhancing Technologies (PETs) that guarantee confidentiality of personal data or anonymous communication have resulted from such research. The objective of this paper is to show that such PETs are indispensable but are short of being the privacy solutions they sometimes claim to be given current day circumstances. Using perspectives from surveillance studies we will argue that the computer scientists' conception of privacy through data or communication confidentiality is techno-centric and displaces end-user perspectives and needs in surveillance societies. We will further show that the perspectives from surveillance studies also demand a critical review for their human-centric conception of information systems. Last, we rethink the position of PETs in a surveillance society and argue for the necessity of multiple paradigms for addressing privacy concerns in information systems design.