Business Cases for Privacy-Enhancing Technologies

Business Cases for Privacy-Enhancing Technologies

Roger Clarke (Xamax Consultancy Pty Ltd, Australia)
DOI: 10.4018/978-1-59904-804-8.ch007
OnDemand PDF Download:


Many categories of e-business continue to under-achieve. Their full value cannot be unlocked while key parties distrust the technology or other parties, particularly the scheme’s sponsors. Meanwhile, the explosion in privacy-intrusive technologies has resulted in privacy threats looming ever larger as a key impediment to adoption. Technology can be applied in privacy-enhancing ways, variously to counter invasive technologies, to enable untraceable anonymity, and to offer strong, but more qualified pseudonymity. After their first decade, it is clear that privacy-enhancing technologies (PETs) are technically effective, but that their adoption lags far behind their potential. As a result, they have not delivered the antidote to distrust in e-business. If individuals are not spontaneously adopting PETs, then the opportunity exists for corporations and government agencies to harness PETs as a core element of their privacy strategies. The financial investment required is not all that large. On the other hand, it is challenging to attract the attention of executives to an initiative of this nature, and then to adapt corporate culture to ensure that the strategy is successfully carried through. This chapter examines PETs, their application to business needs, and the preparation of a business case for investment in PETs.

Complete Chapter List

Search this Book:
Table of Contents
Ramesh Subramanian
Ramesh Subramanian
Chapter 1
A. Mishra
People all over the world increasingly are concerned about the privacy issues surrounding the personal information collected by private... Sample PDF
Web Privacy: Issues, Legislations, and Technological Challenges
Chapter 2
John Thomas
This chapter traces the development in the United States of legal protections of the right to privacy. It begins with the common law “right to be... Sample PDF
Is It Safe to Talk,Yet? The Evolution of Electronic Privacy Law
Chapter 3
Sushma Mishra, Amita Goyal Chin
Given the recent monumental events including the September 11th attack on the World Trade Center and the Pentagon as well as the Enron and MCI... Sample PDF
Assessing the Impact of Governmental Regulations on the IT Industry: A Neo Institutional Theory Perspective
Chapter 4
Bernd Carsten Stahl
Privacy is one of the central issues in the information society. New technologies pose new threats to privacy but they may also facilitate new ways... Sample PDF
The Impact of the UK Human Rights Act 1998 on Privacy Protection in the Workplace
Chapter 5
Madhu V. Ahluwalia, Aryya Gangopadhyay
This chapter gives a synopsis of the techniques that exist in the area of privacy preserving data mining. Privacy preserving data mining is... Sample PDF
Privacy Preserving Data Mining: Taxonomy of Existing Techniques
Chapter 6
Yue Liu
The increasing use of biometric technology is often accompanied by grandiose claims about its ability to enhance security and the debate.over the... Sample PDF
Rational Concerns about Biometric Technology: Security and Privacy
Chapter 7
Roger Clarke
Many categories of e-business continue to under-achieve. Their full value cannot be unlocked while key parties distrust the technology or other... Sample PDF
Business Cases for Privacy-Enhancing Technologies
Chapter 8
Ian Allison, Craig Strangwick
The chapter discusses how one small business planned for, and implemented, the security of its data in a new enterprise-wide system. The company’s... Sample PDF
Privacy through Security: Policy and Practice in a Small-Medium Enterprise
Chapter 9
Richard V. McCarthy, Martin Grossman
Enterprise Architecture is a relatively new concept that has been adopted by large organizations for legal, economic, and strategic reasons. It has... Sample PDF
Privacy and Security: where do they fit into the Enterprise Architecture Framework?
Chapter 10
Frederick Ip, Yolande E. Chan
This study assists organizations and researchers in examining investments in IS security. A questionnaire was developed and administered to managers... Sample PDF
Information Systems Security: A Survey of Canadian Executives
Chapter 11
Sue Conger
With each new technology, new ethical issues emerge that threaten both individual and household privacy. This chapter investigates issues relating... Sample PDF
Emerging Technologies, Emerging Privacy Issues
Chapter 12
Anza A. Akram
The purpose of the chapter is to discuss the effects of information and communication technologies on democracy and focuses on the driving forces... Sample PDF
Digital Democracy: Democracy in the Light of Information and Communication Technology
Chapter 13
Zheng Yan, Silke Holtmanns
This chapter introduces trust modeling and trust management as a means of managing trust in digital systems. Transforming from a social concept of... Sample PDF
Trust Modeling and Management: From Social Trust to Digital Trust
Chapter 14
Dan Manson
This chapter introduces the interrelationships of security, privacy and politics in higher education. University curriculum politics are ingrained... Sample PDF
Security, Privacy, and Politics in Higher Education
About the Contributors