{"id":603,"date":"2023-12-10T23:04:00","date_gmt":"2023-12-10T23:04:00","guid":{"rendered":"https:\/\/privacyand.com\/?p=603"},"modified":"2024-01-15T23:10:34","modified_gmt":"2024-01-15T23:10:34","slug":"ok-so-what-about-representation","status":"publish","type":"post","link":"https:\/\/privacyand.com\/?p=603","title":{"rendered":"Ok, so what about Representation?"},"content":{"rendered":"\n<p>While the Popp and Poindexter approach is common within the CS domain, it fails to recognize the instances where security and privacy do not converge, and may in fact conflict.\u00a0\u00a0While the authors highlight the typical privacy protections: privacy appliances, data transformations, anonymization, selective revelation, immutable audit and self-reporting data, they fail to demonstrate an understanding (as\u00a0(Hecker et al., 2008)) that the best privacy protection is to minimize collection.\u00a0\u00a0Other policy research fails to consider the ethical considerations associated with privacy research, suggesting that the individuals\u2019 role is minimal.\u00a0\u00a0<\/p>\n\n\n\n<p>In addition, the authors do not discuss the business purpose behind programs \u2013 a critical legislated privacy requirement is the justification for personal information collection &#8211; and \/ or question the factual evidence that supported the development of IAO and TIA.<\/p>\n\n\n\n<p>Some similarities exist in ontological approaches.\u00a0\u00a0<\/p>\n\n\n\n<p>Each specifies some method of formalized representation of legal requirements, which is significant difference in privacy \u2013 the only legislated area of CS.\u00a0\u00a0They all follow the same steps, outlined by Hecker\u00a0<em>et al<\/em>, in the creation of the privacy ontology, (1) define a glossary of terms, (2) define static model concepts, including resources, entities and relationships, (3) identify safeguards to protect resources, and (4) identify the processes that apply.\u00a0\u00a0<\/p>\n\n\n\n<p>Problems arise upon closer examination.\u00a0<\/p>\n\n\n\n<p>\u00a0Hecker\u00a0<em>et al\u00a0<\/em>notes that the very purpose of Web 2.0 \u2013 information dissemination \u2013 is the anti-thesis of privacy.\u00a0\u00a0They explore the concept of how generic privacy ontology can be used to remake the architecture of e-commerce transactions to be privacy friendly and encourage capitalism, but do not address the core question. For example, what is the possibility of re-architecting the Internet as we know it, so that Web-based transactions simply did not require the transfer of personal information at all?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While the Popp and Poindexter approach is common within the CS domain, it fails to recognize the instances where security and privacy do not converge, and may in fact conflict.\u00a0\u00a0While the authors highlight the typical privacy protections: privacy appliances, data transformations, anonymization, selective revelation, immutable audit and self-reporting data, they fail to demonstrate an understanding &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/privacyand.com\/?p=603\" class=\"more-link\">Read more<span class=\"screen-reader-text\"> &#8220;Ok, so what about Representation?&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-603","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7IDr7-9J","_links":{"self":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=603"}],"version-history":[{"count":1,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/603\/revisions"}],"predecessor-version":[{"id":604,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/603\/revisions\/604"}],"wp:attachment":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=603"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}