Privacy and e-commerce: A consumer-centric perspective

被引:28
作者
Smith R. [1 ]
Shao J. [1 ]
机构
[1] School of Computer Science, Cardiff University
关键词
E-commerce; Privacy; Privacy enhancing technology;
D O I
10.1007/s10660-007-9002-9
中图分类号
学科分类号
摘要
Privacy is an ancient concept, but its interpretation and application in the area of e-commerce are still new. It is increasingly widely accepted, however, that by giving precedence to consumer privacy bigger benefits can be reaped by all parties involved. There has been much investigation into the concept of privacy, legal frameworks for protecting this most impalpable of human values and, more recently, computing technologies that help preserve an individual's privacy in today's environment. In this paper we review the historical development of this fundamental concept, discussing how advancements both in society and in technology have challenged the right to privacy, and we survey the existing computing technologies that promote consumer privacy in e-commerce. Our study shows that historically the protection of privacy has been driven primarily both by our understanding of privacy and by the advancement of technology, analyses the limitations of privacy protections for current e-commerce applications, and identifies directions for the future development of successful privacy enhancing technologies. © Springer Science+Business Media, LLC 2007.
引用
收藏
页码:89 / 116
页数:27
相关论文
共 83 条
[1]  
Ackerman M.S., Cranor L.F., Reagle J., Privacy in e-commerce: Examining user scenarios and privacy preferences, Proceedings of the 1st ACM Conference on Electronic Commerce, pp. 1-8, (1999)
[2]  
Adam N.R., Worthmann J.C., Security-control methods for statistical databases: A comparative study, ACM Computing Surveys, 21, 4, pp. 515-556, (1989)
[3]  
Agrawal D., Aggarwal C.C., On the design and quantification of privacy preserving data mining algorithms, Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 247-255, (2001)
[4]  
Agrawal R., Srikant R., Privacy-preserving data mining, Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 439-450, (2000)
[5]  
Arendt H., The Human Condition, (1958)
[6]  
Ashley P., Hada S., Karjoth G., Schunter M., E-p3p privacy policies and privacy authorization, Proceeding of the ACM Workshop on Privacy in the Electronic Society, pp. 103-109, (2002)
[7]  
Ashley P., Powers C., Schunter M., From privacy promises to privacy management: A new approach for enforcing privacy throughout an enterprise, Proceedings of the 2002 Workshop on New Security Paradigms, pp. 43-50, (2002)
[8]  
Beck L.L., A security mechanism for statistical databases, ACM Transactions on Database Systems, 5, 3, pp. 316-338, (1980)
[9]  
Benn S.I., Gaus G.F., Public and Private in Social Life, (1983)
[10]  
Bloustein E.J., Privacy as an aspect of human dignity, New York University Law Review, 39, pp. 962-1007, (1964)