scholarly journals Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns

2016 ◽  
Vol 2016 (4) ◽  
pp. 237-254 ◽  
Author(s):  
Christoph Bösch ◽  
Benjamin Erb ◽  
Frank Kargl ◽  
Henning Kopp ◽  
Stefan Pfattheicher

Abstract Privacy strategies and privacy patterns are fundamental concepts of the privacy-by-design engineering approach. While they support a privacy-aware development process for IT systems, the concepts used by malicious, privacy-threatening parties are generally less understood and known. We argue that understanding the “dark side”, namely how personal data is abused, is of equal importance. In this paper, we introduce the concept of privacy dark strategies and privacy dark patterns and present a framework that collects, documents, and analyzes such malicious concepts. In addition, we investigate from a psychological perspective why privacy dark strategies are effective. The resulting framework allows for a better understanding of these dark concepts, fosters awareness, and supports the development of countermeasures. We aim to contribute to an easier detection and successive removal of such approaches from the Internet to the benefit of its users.

2014 ◽  
Vol 15 (7) ◽  
Author(s):  
Marjukka Turunen

In Finnish Social Insurance Institution (Kela) all the operational IT-systems and network services will be renewed during the next ten years. The renewal project is part of Kela´s strategy. What customers need, is the key to all the renewal projects because customers play an important role in developing the services. In the Arkki project the focus is mainly on network services. Kela is investing in its network service channel because these services have been increasingly popular amongst customers. Through the internet services customers can e.g., check their personal data on benefits, apply for benefits and calculate the amounts of benefits. Students, families and unemployed are the biggest customer groups that use Kela´s internet services. Customers have given Kela positive feedback for the internet services.


Symmetry ◽  
2020 ◽  
Vol 12 (12) ◽  
pp. 2039
Author(s):  
Hussain Mutlaq Alnajrani ◽  
Azah Anir Norman

Mobile cloud computing (MCC) is a domain that stemmed from advances in mobile technology and cloud computing. Although debate continues about the best strategies to preserve privacy and personal data protection in MCC, it is essential to explore the effects of applying privacy by design (PbD) to preserve privacy and personal data protection in MCC. PbD is a general philosophy that demonstrates privacy should not be overviewed as an afterthought, but rather as a first-class requirement in the design of IT systems. This study explores the effects of applying PbD to preserve privacy and personal data protection in MCC, and is focused on the privacy of personal data. In this exploration, a framework using PbD has been demonstrated, and seven hypotheses were formulated. Moreover, a survey was implemented where 386 responses were used to test the formulated hypotheses. The results of this study supported the perceived benefits, cues to action of PbD, and perceived threat are positively and directly related to privacy and personal data protection behavior in MCC. Moreover, the results supported that the perceived barriers are negatively and directly related to privacy and personal data protection behavior in MCC. Overall, the results support the utilization of PbD to preserve privacy and personal data protection in MCC and encourage the practitioners to utilize PbD to preserve privacy and personal data protection in MCC.


2017 ◽  
Vol 2017 (1) ◽  
pp. 35-44
Author(s):  
Dawid Zadura

Abstract In the review below the author presents a general overview of the selected contemporary legal issues related to the present growth of the aviation industry and the development of aviation technologies. The review is focused on the questions at the intersection of aviation law and personal data protection law. Massive processing of passenger data (Passenger Name Record, PNR) in IT systems is a daily activity for the contemporary aviation industry. Simultaneously, since the mid- 1990s we can observe the rapid growth of personal data protection law as a very new branch of the law. The importance of this new branch of the law for the aviation industry is however still questionable and unclear. This article includes the summary of the author’s own research conducted between 2011 and 2017, in particular his audits in LOT Polish Airlines (June 2011-April 2013) and Lublin Airport (July - September 2013) and the author’s analyses of public information shared by International Civil Aviation Organization (ICAO), International Air Transport Association (IATA), Association of European Airlines (AEA), Civil Aviation Authority (ULC) and (GIODO). The purpose of the author’s research was to determine the applicability of the implementation of technical and organizational measures established by personal data protection law in aviation industry entities.


2021 ◽  
pp. 1-31
Author(s):  
Sarah E. Lageson ◽  
Elizabeth Webster ◽  
Juan R. Sandoval

Digitization and the release of public records on the Internet have expanded the reach and uses of criminal record data in the United States. This study analyzes the types and volume of personally identifiable data released on the Internet via two hundred public governmental websites for law enforcement, criminal courts, corrections, and criminal record repositories in each state. We find that public disclosures often include information valuable to the personal data economy, including the full name, birthdate, home address, and physical characteristics of arrestees, detainees, and defendants. Using administrative data, we also estimate the volume of data disclosed online. Our findings highlight the mass dissemination of pre-conviction data: every year, over ten million arrests, 4.5 million mug shots, and 14.7 million criminal court proceedings are digitally released at no cost. Post-conviction, approximately 6.5 million current and former prisoners and 12.5 million people with a felony conviction have a record on the Internet. While justified through public records laws, such broad disclosures reveal an imbalance between the “transparency” of data releases that facilitate monitoring of state action and those that facilitate monitoring individual people. The results show how the criminal legal system increasingly distributes Internet privacy violations and community surveillance as part of contemporary punishment.


2019 ◽  
Vol 62 (6) ◽  
pp. 32-34 ◽  
Author(s):  
Thomas Pasquier ◽  
David Eyers ◽  
Jean Bacon

Author(s):  
Vaishnavi Bhagwat Savant ◽  
Rupali D. Kasar ◽  
Priti B. Savant

The explosive growth of the Internet has brought many good things such as E-commercebanking, E-mail, cloud computing, but there is also a dark side such as Hacking, Backdoors, Trapdoors etc. Hacking is the first big problem faced by Governments, companies, and private citizens around the world. Hacking means reading email’s of someone, stealing passwords, stealing credit card numbers etc. An ethical hacker is one who can help the people who are suffered by this hackings. This paper describes about Ethical hackers, it’s types and phases of hacking


2018 ◽  
Vol 10 (9) ◽  
pp. 3130
Author(s):  
Xiaobing Zhang ◽  
Fu-Sheng Tsai ◽  
Chih-Chen Lin ◽  
Ya-Fang Cheng ◽  
Kun-Hwa Lu

As compared to the economic losses, social and psychological losses are of equal importance in discussing the losses when encountering fraud. Taking advantage of a perspective paper form (i.e., free writing style with a mix of description, analysis, and comments) with in-depth discussions and well-developed propositions, we combine considerations from the knowledge gap, platform quality, and risk management to discuss the comparative seriousness of different fraud-caused losses. The conceptual model mainly articulates on a series of relationships among different degrees of knowledge gap, platform quality, and risk management in predicting the various combinative losses in the economic, social, and psychological aspects. Propositions follow. First, when the knowledge gap is higher, the economic losses of being cheated on the internet will be higher, while lower in social and psychological losses. Second, when perceived platform quality is higher, the economic losses of being cheated on the internet will be lower, while higher in social and psychological losses. Third, when platform risk management is better, all aspects of being cheated on the internet will be lower. Based on the assumption of network externality, we also argue that the multiple dimensions of fraud-caused losses may damage e-auction sustainability. Theoretical and practical implications will be discussed.


10.23856/4325 ◽  
2021 ◽  
Vol 43 (6) ◽  
pp. 198-203
Author(s):  
Oleksii Kostenko

The scale, speed and multi-vector development of science and technology are extremely effective in influencing legal, economic, political, spiritual, professional and other social relations. The development of information and communication technologies, the use of the Internet, the creation, storage, transmission, processing and management of information became the driving forces of the new scientific and technological revolution. This facilitates the introduction of technologies for the transmission and use of information in digital form in almost all spheres of public life, namely text data, photo, audio, video images, which are transmitted in various ways via the Internet and other systems and means of communication. One of the key elements of data transmission technologies and systems is the availability of information by which it is possible to identify their subjects and objects by their inherent identification attributes. In Ukrainian legislation, in particular in the Law of Ukraine «On Personal Data Protection», information or a set of information about an individual who is or can be identified specifically is defined as personal data. However, despite its modernity, this law still contains a number of shortcomings and uncertainties, both in terminology and in the legal mechanisms for working with data by which a person can be identified, i.e. identification data.


Sign in / Sign up

Export Citation Format

Share Document