메뉴 건너뛰기




Volumn , Issue , 2012, Pages 331-346

On the principle of privacy by design and its limits: Technology, ethics and the rule of law

Author keywords

Aritificial intelligence and law; Data protection; Ethics of design; Information ethics; Legal ontologies; Privacy by design; Rule of law; Security measures; Self enforcement technology

Indexed keywords


EID: 84883771258     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-94-007-2903-2_16     Document Type: Chapter
Times cited : (32)

References (65)
  • 1
    • 33845439392 scopus 로고    scopus 로고
    • An ontology-based approach for managing and maintaining privacy in information systems
    • Berlin-Heidelberg: Springer
    • Abou-Tair, D. el Diehn I., and Stefan Berlik. 2006. An ontology-based approach for managing and maintaining privacy in information systems. Lectures notes in computer science, 4275: 983-994 (Berlin-Heidelberg: Springer).
    • (2006) Lectures Notes in Computer Science , vol.4275 , pp. 983-994
    • Abou-Tair, D.1    El Diehn, I.2    Berlik, S.3
  • 2
    • 0040269133 scopus 로고    scopus 로고
    • Introduction
    • eds. Philip E. Agre and Mark Rotenberg, Cambridge: The MIT Press
    • Agre, Philip E. 1997. Introduction. In Technology and privacy: The new landscape, eds. Philip E. Agre and Mark Rotenberg, 1-28. Cambridge: The MIT Press.
    • (1997) Technology and Privacy: The New Landscape , pp. 1-28
    • Agre, P.E.1
  • 3
    • 51749107030 scopus 로고    scopus 로고
    • Recaptcha: Human-based character recognition via web security measures
    • von Ahn, Luis, Maurer, Benjamin, McMillen, Colin, Abraham, David, and Manuel Blum. 2008. reCAPTCHA: Human-based character recognition via web security measures. Science 321 (5895): 1465-1468.
    • (2008) Science , Issue.5895 , pp. 1465-1468
    • Von Ahn1    Luis, M.2    Benjamin, M.3    Colin, A.4
  • 4
    • 84873390780 scopus 로고    scopus 로고
    • Designing for human values in an urban simulation system: Value sensitive design and participatory design
    • Toronto: ACM Press, Accessed 23 Dec 2010
    • Borning, Alan, Friedman, Batya, and Peter H. Kahn. 2004. Designing for human values in an urban simulation system: Value sensitive design and participatory design. Proceedings of eighth biennial participatory design conference, 64-67. Toronto: ACM Press. http://www.urbansim.org/pub/Research/ResearchPapers/vsd-and-participatory-design-2004.pdf. Accessed 23 Dec 2010
    • (2004) Proceedings of Eighth Biennial Participatory Design Conference , pp. 64-67
    • Borning, A.1    Friedman, B.2    Kahn, P.H.3
  • 6
    • 84929899694 scopus 로고    scopus 로고
    • Code, control, and choice: Why east is east and west is west
    • Brownsword, Roger. 2005. Code, control, and choice: Why east is east and west is west. Legal Studies 25 (1): 1-21.
    • (2005) Legal Studies , vol.25 , Issue.1 , pp. 1-21
    • Brownsword, R.1
  • 10
    • 84856489990 scopus 로고    scopus 로고
    • Privacy by design: The definitive workshop
    • Cavoukian, Ann. 2010.Privacy by design: The definitive workshop. Identity in the Information Society 3 (2): 247-251.
    • (2010) Identity in the Information Society , vol.3 , Issue.2 , pp. 247-251
    • Cavoukian, A.1
  • 11
    • 33646914062 scopus 로고    scopus 로고
    • Future technologies, dystopic futures and the precautionary principle
    • Clarke, Steve. 2005. Future technologies, dystopic futures and the precautionary principle. Ethics and Information Technology 7 (4): 121-126.
    • (2005) Ethics and Information Technology , vol.7 , Issue.4 , pp. 121-126
    • Clarke, S.1
  • 13
    • 84928413409 scopus 로고    scopus 로고
    • Embodying values in technology: Theory and practice
    • eds. Jeroen van den Hoven and John Weckert, New York: Cambridge University Press
    • Flanagan, Mary, Howe, Daniel C., and Helen Nissenbaum. 2008.Embodying values in technology: Theory and practice. In Information technology and moral philosophy, eds. Jeroen van den Hoven and John Weckert, 322-353. New York: Cambridge University Press.
    • (2008) Information Technology and Moral Philosophy , pp. 322-353
    • Flanagan, M.1    Howe, D.C.2    Nissenbaum, H.3
  • 14
    • 56549095361 scopus 로고    scopus 로고
    • Information ethics, its nature and scope
    • Floridi, Luciano. 2005. Information ethics, its nature and scope. Computers and Society 36 (3): 21-36.
    • (2005) Computers and Society , vol.36 , Issue.3 , pp. 21-36
    • Floridi, L.1
  • 15
    • 33750992195 scopus 로고    scopus 로고
    • Four challenges for a theory of informational privacy
    • Floridi, Luciano. 2006. Four challenges for a theory of informational privacy. Ethics and Information Technology 8 (3): 109-119.
    • (2006) Ethics and Information Technology , vol.8 , Issue.3 , pp. 109-119
    • Floridi, L.1
  • 16
    • 2342647845 scopus 로고
    • Value-sensitive design
    • Friedman, Batya. 1986. Value-sensitive design. Interactions 3 (6): 17-23.
    • (1986) Interactions , vol.3 , Issue.6 , pp. 17-23
    • Friedman, B.1
  • 18
    • 20444478398 scopus 로고    scopus 로고
    • Human values, ethics, and design
    • eds. Julie A. Jacko and Andrew Sear, Mahwah: Lawrence Erlbaum Associates
    • Friedman, Batya, and Peter H. Kahn Jr. 2003. Human values, ethics, and design. In: The human- computer interaction handbook, eds. Julie A. Jacko and Andrew Sear, 1177-1201. Mahwah: Lawrence Erlbaum Associates.
    • (2003) The Human- Computer Interaction Handbook , pp. 1177-1201
    • Friedman, B.1    Kahn, P.H.2
  • 19
  • 21
    • 84856442435 scopus 로고    scopus 로고
    • The social impact of p2p systems
    • eds. Xuemin Shen, Heather Yu, John Buford and Mursalin Akon, Heidelberg: Springer
    • Glorioso, Andrea, Pagallo, Ugo, and Giancarlo Ruffo. 2010.The social impact of P2P systems. In Handbook of peer-to-peer networking, eds. Xuemin Shen, Heather Yu, John Buford and Mursalin Akon, 47-70. Heidelberg: Springer.
    • (2010) Handbook of Peer-To-Peer Networking , pp. 47-70
    • Glorioso, A.1    Pagallo, U.2    Ruffo, G.3
  • 22
    • 84949469832 scopus 로고    scopus 로고
    • Online file sharing: Resolving the tensions between privacy and property interest
    • eds. Terry W. Bynum, Maria Calzarossa, Ivo De Lotto and Simon Rogerson, Mantova: Tipografia Commerciale
    • Grodzinsky, Frances S. and Herman T. Tavani. 2008. Online file sharing: Resolving the tensions between privacy and property interest. In Proceedings of ETHICOMP2008 “Living, Working and Learning Beyond Technology”, eds. Terry W. Bynum, Maria Calzarossa, Ivo De Lotto and Simon Rogerson, 373-383.Mantova: Tipografia Commerciale.
    • (2008) Proceedings of ETHICOMP2008 “Living, Working and Learning beyond Technology” , pp. 373-383
    • Grodzinsky, F.S.1    Tavani, H.T.2
  • 23
    • 84856457741 scopus 로고    scopus 로고
    • Opinion of the european data protection supervisor on the communication from the commission to the european parliament and the council on the follow-up of the work program for better implementation of the data protection directive
    • C
    • Hustinx, Peter. 2007. Opinion of the European data protection supervisor on the communication from the commission to the European parliament and the council on the follow-up of the work program for better implementation of the data protection directive. Official Journal of the European Union 27 Oct. 2007, C 255: 1-12.
    • (2007) Official Journal of the European Union , vol.255 , pp. 1-12
    • Hustinx, P.1
  • 24
    • 37249029813 scopus 로고    scopus 로고
    • Accessed 20 April 2009
    • Jobs, Steve. 2007. Thoughts on music. http://www.apple.com/hotnews/thoughtsonmusic/. Accessed 20 April 2009.
    • (2007) Thoughts on Music
    • Jobs, S.1
  • 27
    • 33344479307 scopus 로고    scopus 로고
    • Pecan: An architecture for user privacy and profiles in electronic commerce contexts on the semantic web
    • Jutla, Dawn N., Bodorik, Peter, and Yanjun Zhan. 2006.PeCAN: An architecture for user privacy and profiles in electronic commerce contexts on the semantic web. Information Systems 31 (4-5): 295-320.
    • (2006) Information Systems , vol.31 , Issue.5 , pp. 295
    • Jutla, D.N.1    Bodorik, P.2    Zhan, Y.3
  • 28
    • 84856450512 scopus 로고    scopus 로고
    • Layering privacy on operating systems, social networks, and other platforms by design
    • Jutla, Dawn N. 2010. Layering privacy on operating systems, social networks, and other platforms by design. Identity in the Information Society 3 (2): 319-341.
    • (2010) Identity in the Information Society , vol.3 , Issue.2 , pp. 319-341
    • Jutla, D.N.1
  • 30
    • 0042306308 scopus 로고    scopus 로고
    • Architecture as crime control
    • Katyal, Neal. 2002. Architecture as crime control. Yale Law Journal 111 (5): 1039-1139.
    • (2002) Yale Law Journal , vol.111 , Issue.5 , pp. 1039-1139
    • Katyal, N.1
  • 31
    • 0742311431 scopus 로고    scopus 로고
    • Digital architecture as crime control
    • Katyal, Neal. 2003.Digital architecture as crime control. Yale Law Journal 112 (6): 101-129.
    • (2003) Yale Law Journal , vol.112 , Issue.6 , pp. 101-129
    • Katyal, N.1
  • 32
    • 33645654600 scopus 로고    scopus 로고
    • Building privacy into the semantic web: Ontology needed now
    • Honolulu, Hawaii, Accessed on 23 Dec 2011
    • Kim, Anya, Hoffman, Lance J., and C. Dianne Martin. 2002. Building privacy into the semantic web: Ontology needed now. Semantic web workshop 2002. Honolulu, Hawaii. http://semanticweb2002.aifb.uni-karlsruhe.de/proceedings/Position/kim2.pdf. Accessed on 23 Dec 2011.
    • (2002) Semantic Web Workshop 2002
    • Kim, A.1    Hoffman, L.J.2    Dianne Martin, C.3
  • 33
    • 33847045636 scopus 로고    scopus 로고
    • Setting software defaults: Perspectives from law, computer science and behavioural economics
    • Kesan, Jay P. and Rajiv C. Shah. 2006. Setting software defaults: Perspectives from law, computer science and behavioural economics. Notre Dame Law Review 82:583-634.
    • (2006) Notre Dame Law Review , vol.82 , pp. 583-634
    • Kesan, J.P.1    Shah, R.C.2
  • 38
    • 33747230391 scopus 로고    scopus 로고
    • Computational models of ethical reasoning: Challenges, initial steps, and future directions
    • McLaren, Bruce. 2006. Computational models of ethical reasoning: Challenges, initial steps, and future directions. IEEE intelligent systems 2006 (July/August): 29-37.
    • (2006) IEEE Intelligent Systems , vol.2006 , pp. 29-37
    • Mc Laren, B.1
  • 39
    • 84949448272 scopus 로고    scopus 로고
    • To be anonymous or not to be, that is the privacy question: Interview to jeffrey rosen
    • Accessed 15 Oct 2010
    • Mills, Elinor. 2008. To be anonymous or not to be, that is the privacy question: interview to jeffrey rosen. News blog. http://news.cnet.com/8301-10784_3-9889255-7.html. Accessed 15 Oct 2010.
    • (2008) News Blog
    • Mills, E.1
  • 40
    • 0347032661 scopus 로고
    • Ethics into design
    • eds. Richard Buchanan and Victor Margolin, Chicago: University of Chicago Press
    • Mitcham, Carl. 1995. Ethics into design. In Discovering design, eds. Richard Buchanan and Victor Margolin, 173-179. Chicago: University of Chicago Press.
    • (1995) Discovering Design , pp. 173-179
    • Mitcham, C.1
  • 41
    • 33845447288 scopus 로고    scopus 로고
    • A legal ontology to support privacy preservation in location-based services
    • Berlin-Heidelberg: Springer
    • Mitre, Hugo, Gonzalez-Tablas, Ana Isabel, Ramos, Benjamin, and Arturo Ribagorda. 2006. A legal ontology to support privacy preservation in location-based services. Lectures notes in computer science, 4278: 1755-1764 (Berlin-Heidelberg: Springer).
    • (2006) Lectures notes in computer scienc , vol.4278 , pp. 1755-1764
    • Mitre, H.1    Gonzalez-Tablas, A.I.2    Ramos, B.3    Ribagorda, A.4
  • 42
    • 33747228513 scopus 로고    scopus 로고
    • The nature, importance, and difficulty of machine ethics
    • Moor, James. 2006. The nature, importance, and difficulty of machine ethics. IEEE intelligent systems 21(4): 18-21.
    • (2006) IEEE Intelligent Systems , vol.21 , Issue.4 , pp. 18-21
    • Moor, J.1
  • 43
    • 0032282474 scopus 로고    scopus 로고
    • Protecting privacy in an information age: The problem of privacy in public
    • Nissenbaum, Helen. 1998.Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy 17 (5-6): 559-596.
    • (1998) Law and Philosophy , vol.17 , Issue.6 , pp. 559-596
    • Nissenbaum, H.1
  • 44
    • 1842538795 scopus 로고    scopus 로고
    • Privacy as contextual integrity
    • Nissenbaum, Helen. 2004. Privacy as contextual integrity.Washington Law Review 79 (1): 119-158.
    • (2004) Washington Law Review , vol.79 , Issue.1 , pp. 119
    • Nissenbaum, H.1
  • 45
    • 78649533283 scopus 로고    scopus 로고
    • Small world-paradigm and empirical research in legal ontologies: A topological approach
    • eds. Gianmaria Ajani, Ginevra Peruginelli, Giovanni Sartor and Daniela Tiscornia, Florence: European Press Academic
    • Pagallo, Ugo. 2007.Small world-paradigm and empirical research in legal ontologies: A topological approach. In The multilanguage complexity of European law: Methodologies in comparison, eds. Gianmaria Ajani, Ginevra Peruginelli, Giovanni Sartor and Daniela Tiscornia, 195-210. Florence: European Press Academic.
    • (2007) The Multilanguage Complexity of European Law: Methodologies in Comparison , pp. 195-210
    • Pagallo, U.1
  • 48
    • 84870661332 scopus 로고    scopus 로고
    • Designing data protection safeguards ethically
    • Pagallo, Ugo. 2011a. Designing data protection safeguards ethically. Information 2 (2): 247-265.
    • (2011) Information , vol.2 , Issue.2 , pp. 247-265
    • Pagallo, U.1
  • 50
    • 84877701103 scopus 로고    scopus 로고
    • The future of rule of law: The challenges and prospects for the field
    • Peerenboom, Randy. 2009.The future of rule of law: The challenges and prospects for the field. Hague Journal on the Rule of Law 1 (1): 5-14.
    • (2009) Hague Journal on the Rule of Law , vol.1 , Issue.1 , pp. 5-14
    • Peerenboom, R.1
  • 51
    • 27844494517 scopus 로고    scopus 로고
    • Against cyberspace
    • Against
    • Post, David G. 2002. Against “Against Cyberspace”.Berkeley Technology Law Journal 17 (4): 1365-1383.
    • (2002) Berkeley Technology Law Journal , vol.17 , Issue.4 , pp. 1365-1383
    • Post, D.G.1
  • 53
    • 70349754413 scopus 로고    scopus 로고
    • A large-scale empirical study on p3p privacy policies: Stated actions vs. Legal obligations
    • Reay, Ian, Dick, Scott, and James Miller. 2009. A large-scale empirical study on P3P privacy policies: Stated actions vs. legal obligations.ACM transactions on the web 3(2): 1-34.
    • (2009) ACM Transactions on the Web , vol.3 , Issue.2 , pp. 1
    • Reay, I.1    Dick, S.2    Miller, J.3
  • 54
    • 84946109953 scopus 로고    scopus 로고
    • The retention of electronic communication traffic data
    • Rodota, Stefano. 2006.The retention of electronic communication traffic data. Revista d’Internet, dret ipoltiica 3:53-60.
    • (2006) Revista d’Internet, Dret Ipoltiica , vol.3 , pp. 53-60
    • Rodota, S.1
  • 57
    • 28844490457 scopus 로고    scopus 로고
    • The future of intellectual property
    • Spinello, Richard A. 2003.The future of intellectual property. Ethics and Information Technology 5 (1): 1-16.
    • (2003) Ethics and Information Technology , vol.5 , Issue.1 , pp. 1-16
    • Spinello, R.A.1
  • 58
    • 84983967502 scopus 로고
    • A formal theory of rule of law
    • Summers, Robert S. 1993.A formal theory of rule of law. Ratio Iuris 6 (2): 127-142.
    • (1993) Ratio Iuris , vol.6 , Issue.2 , pp. 127-142
    • Summers, R.S.1
  • 59
    • 52149113254 scopus 로고    scopus 로고
    • Philosophical theories of privacy: Implications for an adequate online privacy policy
    • Tavani, Herman T. 2007. Philosophical theories of privacy: Implications for an adequate online privacy policy.Metaphilosophy 38 (1): 1-22.
    • (2007) Metaphilosophy , vol.38 , Issue.1 , pp. 1
    • Tavani, H.T.1
  • 60
    • 33744457379 scopus 로고    scopus 로고
    • Privacy as life, liberty, property
    • Volkman, Richard. 2003. Privacy as life, liberty, property.Ethics and Information Technology 5 (4): 199-210.
    • (2003) Ethics and Information Technology , vol.5 , Issue.4 , pp. 199-210
    • Volkman, R.1
  • 61
    • 80052636717 scopus 로고    scopus 로고
    • Using the precautionary principle in nanotechnology policy making
    • Weckert, John and James Moor. 2004. Using the precautionary principle in nanotechnology policy making.Asia Pacific Nanotechnology Forum News Journal 3 (4): 12-14.
    • (2004) Asia Pacific Nanotechnology Forum News Journal , vol.3 , Issue.4 , pp. 12-14
    • Weckert, J.1    Moor, J.2
  • 62
    • 0030138375 scopus 로고    scopus 로고
    • Ethics as design: Doing justice to moral problems
    • Whitbeck, Caroline. 1996. Ethics as design: Doing justice to moral problems. Hastings Center Report 26 (3): 9-16.
    • (1996) Hastings Center Report , vol.26 , Issue.3 , pp. 9-16
    • Whitbeck, C.1
  • 63
    • 84870684462 scopus 로고    scopus 로고
    • 02356/09/EN-W
    • Working Party (WP) Article 29 D-95/46/EC. 2009. The future of privacy. 02356/09/EN-WP 168.
    • (2009) The Future of Privacy , pp. 168
  • 64
    • 85190444478 scopus 로고    scopus 로고
    • Towards an understanding of regulation by design
    • eds. Roger Brownsword and Karen Yeung, London: Hart Publishing
    • Yeung, Karen. 2007. Towards an understanding of regulation by design. In Regulating technologies: Legal futures, regulatory frames and technological fixes, eds. Roger Brownsword and Karen Yeung, 79-108. London: Hart Publishing.
    • (2007) Regulating Technologies: Legal Futures, Regulatory Frames and Technological Fixes , pp. 79-108
    • Yeung, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.